Open jameshartig opened 3 months ago
Hi @jameshartig, I'm fairly sure we tried the signJwt
endpoint at first, but it wasn't working correctly for this auth flow. The people we talked with at Google recommended generateIdToken
instead. Perhaps something's changed in the meantime?
@tvoran I appreciate the context. I'll work on an MR and test it in our environment. Let me also see if I can get someone from Google to confirm either way.
Is your feature request related to a problem? Please describe. Currently VSO generates JWTs that are 1 hour long using the
generateIdToken
endpoint, which is longer than the defaultmax_jwt_exp
on the Vault side leading to errors unless you manually increasemax_jwt_exp
.Describe the solution you'd like Instead, the
signJwt
endpoint could be used andexp
could be set to a shorter value. I believe the existing iamcredentials package has aSignJwt
method that could be used instead and the response includes aSignedJwt
string that I believe is the same format as the existing token response.Describe alternatives you've considered Alternatively we can just increase the
max_jwt_exp
but it would be good if vault-secrets-operator worked with the defaults and the change seems small.Additional context