This project is intended to constantly renew a Vault token derived from a role id
|
All checks were successful
renovate/stability-days Updates have met minimum release age requirement
|
||
|---|---|---|
| .github/workflows | ||
| .gitignore | ||
| CONTRIBUTING.md | ||
| go.mod | ||
| go.sum | ||
| History.md | ||
| LICENSE | ||
| main.go | ||
| Makefile | ||
| README.md | ||
| renovate.json | ||
Luzifer / vault-user-token
This project is intended to constantly renew a Vault token derived from a role id.
That way the machine only contains a temporary token expiring after a short while if the program is no longer running. So if a machine is lost (physically) the corresponding secret can be revoked and the machine will no longer be able to access the vault instance.
As secret multiple strings are possible:
- Full Hostname (
--full-hostname=true) - Short Hostname (
--full-hostname=false) - Secret from disk (
~/.config/vault-user-token.secret, file must have0o400or0o600permission, content is stripped for whitespaces)