Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update azure docs to include new param #27680

Merged
merged 2 commits into from
Jul 3, 2024

Conversation

Zlaticanin
Copy link
Contributor

Very small PR to update azure docs to include new param explicit_max_ttl.
PR: hashicorp/vault-plugin-secrets-azure#199

@Zlaticanin Zlaticanin requested a review from a team as a code owner July 3, 2024 19:32
@github-actions github-actions bot added the hashicorp-contributed-pr If the PR is HashiCorp (i.e. not-community) contributed label Jul 3, 2024
Copy link

github-actions bot commented Jul 3, 2024

CI Results:
All Go tests succeeded! ✅

Copy link

github-actions bot commented Jul 3, 2024

Build Results:
All builds succeeded! ✅

@Zlaticanin Zlaticanin merged commit f7ccefa into main Jul 3, 2024
31 of 32 checks passed
@Zlaticanin Zlaticanin deleted the VAULT-27228/add-docs-explicit-max-ttl branch July 3, 2024 19:53
Copy link

@gsantos-hc gsantos-hc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does there need to be an update to the plugin version or is that handled separately?

@@ -216,6 +216,8 @@ information about roles.
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
- `max_ttl` (`string: ""`) – Specifies the maximum TTL for service principals generated using this role. Accepts time
suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine max TTL time.
- `explicit_max_ttl` (`string: ""`) – Specifies the explicit maximum lifetime of the lease and service principal.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How about:

Limits the lifetime of the service principal secret in Azure and sets an upper bound on the corresponding lease's TTL. This lifetime cannot be changed once a lease is created, and the lease cannot be renewed beyond the expiration of this lifetime. If not set or set to zero, the service principal secret will be created with a default duration of 10 years and deleted once the corresponding lease in Vault expires.

@gsantos-hc
Copy link

Sorry – Looks like my comments posted after this was merged 🤷‍♂️ It was a small improvement anyway.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
docs hashicorp-contributed-pr If the PR is HashiCorp (i.e. not-community) contributed pr/no-changelog pr/no-milestone
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants