-
Notifications
You must be signed in to change notification settings - Fork 51
provider: added workload identity federation auth support #567
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
679ec34 to
8bd56ba
Compare
8bd56ba to
f6490e0
Compare
oxtoacart
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally LGTM, just a couple of nits.
| Description: "The API key to use for authenticating requests to the API. Can be set via the TAILSCALE_API_KEY environment variable. Conflicts with 'oauth_client_id' and 'oauth_client_secret'.", | ||
| Sensitive: true, | ||
| }, | ||
| "identity_token": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you want to name this and the environment variable something that makes it clear it's for workload identity federation?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't have a strong preference, do you mean wif_identity_token? @mpminardi any thoughts on the naming?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Follow-up from a Slack conversation, Sam felt against the wif prefix and we'll support both TAILSCALE_IDENTITY_TOKEN and IDENTITY_TOKEN env vars to be consistent with the OAuth fields.
6313cb2 to
c891e9f
Compare
Updates #485 Signed-off-by: mcoulombe <[email protected]>
c891e9f to
2133416
Compare
oxtoacart
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Still LGTM.
What this PR does / why we need it:
Allows the Tailscale Terraform provider to dynamically generate an API access token by exchanging an identity token. This way providers do not need to be configured with sensitive information like an authkey or oauth_client_secret.
Configuring a federated identity OAuth client is private at the time of this PR but public access is coming soon™️.
Updates #485
Special notes for your reviewer:
Depends on this PR on the client. I'll update the dependency with the proper stable release before merging.