Replies: 10 comments
-
@kkronenb If I understand your use case, I'm curious why creating multiple roles (vs explicitly setting reduced scope) are not desirable. |
Beta Was this translation helpful? Give feedback.
-
That is a possibility, but is undesirable from a maintenance stand point. When we new repo/group is added to artifactory, we must make a corresponding configuration update to Vault as well. If we have the ability to request a token with a specific scope, this dual configuration goes away. We currently have 28 groups in artifactory for example. This quickly becomes an administrative hurdle in Vault. |
Beta Was this translation helpful? Give feedback.
-
My reasoning for wanting scoped down tokens is that it decouples artifactory administration from vault administration. When a new group is added to artifactory, there is no need to make a corresponding role in vault which requires additional overhead. |
Beta Was this translation helpful? Give feedback.
-
Turns out adding this functionality was pretty trivial.
|
Beta Was this translation helpful? Give feedback.
-
@kkronenb Yes, that's right. The coding part is straightforward, I'm thinking through the ramification of allowing This is provisionally in our plan for Q1 2024. |
Beta Was this translation helpful? Give feedback.
-
That is tricky, even if you limited the scope to I definitely do not think you should allow requestors to specify whatever raw scope they want, because if you do that, you might as well just create an admin role and be done with it. :) Tommy |
Beta Was this translation helpful? Give feedback.
-
First, thank you both for the conversation around this, I appreciate enumerating the issues. @TJM This is exactly what I want. We use the same pattern with the github plugin where Vault is a vending machine for github PATs and can mint anything from org readonly to repo admin from a single plugin role. This is all controlled by Vault policies. By definition in the instructions, the Vault Access Token is already an admin token. All this change is doing is moving from an implicit scope with multiple roles to an explicit scope via request. Both of these cases need to be addressed by Vault policies; either granting it based on This change could be an opt in when configuring the plugin where the existing behavior is the default. |
Beta Was this translation helpful? Give feedback.
-
@kkronenb @TJM I'm considering transferring this to the Discussion section. This will allow better threading, etc. What do you think? |
Beta Was this translation helpful? Give feedback.
-
Is there anything I can do to move this request forward? Right now, we are testing these changes in a development environment, but would rather not have to maintain this change in the long run. |
Beta Was this translation helpful? Give feedback.
-
Are there any other thoughts on incorporating this in the baseline? If not, we will have to fork this repo. |
Beta Was this translation helpful? Give feedback.
-
Is your feature request related to a problem? Please describe.
I am working on setting up this integration and would like to configure our CI role be able to create tokens for any scope, i.e.
applied-permissions/groups:*
. Currently when a token is created for a role, it uses the scope that is configured without the ability to set an explicitly reduced scope.Describe the solution you'd like
When calling
vault read artifactory/token/jenkins
, I'd like to be able to specify a scope such asscope=readonly
.Describe alternatives you've considered
The current behavior is a blocker for our implementation.
Additional context
Add any other context or screenshots about the feature request here.
Beta Was this translation helpful? Give feedback.
All reactions