1
0
Fork 0
mirror of https://github.com/Luzifer/vault-user-token.git synced 2024-10-18 08:04:21 +00:00
This project is intended to constantly renew a Vault token derived from a role id
Find a file
Knut Ahlers f71b814cdf
Rewrite, add support for secret override file
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2022-10-18 12:58:07 +02:00
.repo-runner.yaml Add build env 2017-04-23 20:02:32 +02:00
CONTRIBUTING.md Add metadata 2017-04-23 19:45:54 +02:00
go.mod Rewrite, add support for secret override file 2022-10-18 12:58:07 +02:00
go.sum Rewrite, add support for secret override file 2022-10-18 12:58:07 +02:00
History.md prepare release v0.3.0 2022-07-02 18:19:01 +02:00
LICENSE Add metadata 2017-04-23 19:45:54 +02:00
main.go Rewrite, add support for secret override file 2022-10-18 12:58:07 +02:00
Makefile Add build env 2017-04-23 20:02:32 +02:00
README.md Rewrite, add support for secret override file 2022-10-18 12:58:07 +02:00

Luzifer / vault-user-token

This project is intended to constantly renew a Vault token derived from a role id.

That way the machine only contains a temporary token expiring after a short while if the program is no longer running. So if a machine is lost (physically) the corresponding secret can be revoked and the machine will no longer be able to access the vault instance.

As secret multiple strings are possible:

  • Full Hostname (--full-hostname=true)
  • Short Hostname (--full-hostname=false)
  • Secret from disk (~/.config/vault-user-token.secret, file must have 0o400 or 0o600 permission, content is stripped for whitespaces)

project status