-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
provider/vault: vault_auth_backend resource #10988
Conversation
Hi @Mongey! Thanks for implementing this. Am I understanding correctly that this is for enabling Vault auth backends? If so, I'd like to suggest to call it One other bit of design feedback is that although by default Vault will mount a given auth backend at a path whose name matches the backend name, this is not actually required and it's possible to mount the same auth backend multiple times e.g. to support multiple different AWS accounts, or Github organizations. To support that, perhaps we could have an additional optional+computed I didn't have time yet to dig into the code in detail or test it but I will take a look at this more deeply soon. |
Thanks for the feedback @apparentlymart
💯 I'll update
Ah cool, I didn't really understand what the path arg was when I was implementing this.
Makes sense, ^ mimics the behaviour of the vault cli |
158c4a6
to
85fee47
Compare
Hi @Mongey! There are a few changes that need to be made to this before it can be merged. I'm going to go ahead and pull it down locally to fix it up, and then will open a new PR with the changes. |
Any update on this? |
@stack72 / @apparentlymart 👀 This might need to be re-assigned 😓 |
@stack72 🙇 rebased the conflict away |
} | ||
} | ||
|
||
// If we fell out here then we didn't find our Auth in the list. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think if we fall out, we should log a message to let the user know that their state has been refreshed - because it wasn't found
Hi @Mongey So I just tested this and it works as expected :) When i ran your tests, I could see my Vault log as follows:
The tests are also green:
I left 1 minor nit - but that's not worth blocking the PR over :) Paul |
Also, just a FYI, the failure in the build here is unrelated to this PR. The failure is as follows:
Merging this for now and will speak to the team about the failure |
Actually, will speak to the team first - I believe the test failure is because of the updated vendoring |
Any progress on this? I'm pretty excited about having more of Vault configured via Terraform. Avoids the custom provisioning scripts. |
@stack72 looks like |
This LGTM now @Mongey :) Nice work on this! Paul |
Sounds interesting! Any docs for this? |
@allandrick I can follow up with a PR. (This might help in the time being) |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
mitchellh/mapstructure bump is needed to handle a conversion from
json.Number
toint
invault/api