-
Notifications
You must be signed in to change notification settings - Fork 57
feat(vault-jwt): allow specifying the vault jwt token directly #436
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
fbf7312
e3bb4e7
c171d28
248c31c
407655b
28a70b0
41f875e
49d6765
65860cb
bd2fcf6
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -20,6 +20,13 @@ variable "vault_addr" { | |
description = "The address of the Vault server." | ||
} | ||
|
||
variable "vault_jwt_token" { | ||
type = string | ||
description = "The JWT token used for authentication with Vault." | ||
default = null | ||
sensitive = true | ||
} | ||
|
||
Comment on lines
+23
to
+29
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Can you add an example use case on how you would provide that token to the module? Are you fetching it externally through some API or another provider? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. https://gist.github.com/moo-im-a-cow/002e18137f5956893e610f85096e04e9#file-main-tf-L394-L422 i'm doing this because i'd like to use a dedicated jwt token issued by coder for the workspace instead of passing through the token used to authenticate to coder more info here: coder/coder#13127 (comment) do you want the examples added to the commit in some way? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
We usually add example Terraform snippets in the There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. i've now added an example There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Thanks. I would appreciate it if we could also add a vault policy that can use this new jwt token, scoped to workspace metadata. |
||
variable "vault_jwt_auth_path" { | ||
type = string | ||
description = "The path to the Vault JWT auth method." | ||
|
@@ -46,7 +53,7 @@ resource "coder_script" "vault" { | |
display_name = "Vault (GitHub)" | ||
icon = "/icon/vault.svg" | ||
script = templatefile("${path.module}/run.sh", { | ||
CODER_OIDC_ACCESS_TOKEN : data.coder_workspace_owner.me.oidc_access_token, | ||
CODER_OIDC_ACCESS_TOKEN : var.vault_jwt_token != null ? var.vault_jwt_token : data.coder_workspace_owner.me.oidc_access_token, | ||
VAULT_JWT_AUTH_PATH : var.vault_jwt_auth_path, | ||
VAULT_JWT_ROLE : var.vault_jwt_role, | ||
VAULT_CLI_VERSION : var.vault_cli_version, | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.