-
Notifications
You must be signed in to change notification settings - Fork 548
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
terraform cannot provision snowflake secret engine role with credential_type="rsa_public_key" #1585
Comments
I'm getting same error today. Does anyone know this issue has solution or not ? |
@jhfeng @breathe Hello, sorry you are having trouble. Have you tried setting the credential_type field on the database_secret_backend_role? If this isn't working, can you please provide the terraform config to reproduce the issue and any relevant logs or errors? Thanks! |
@fairclothjm i tested database_secret_backend_role, that seems works. problem is only with static role. 1 terraform { Error: Unsupported argument |
@jhfeng Thanks for the information! Yes, it looks like |
Apologies if I misuse some terraform nomenclature as I consume
terraform-provider-vault
via pulumi. But from what I can tell its not possible to provision a snowflake secret engine role withcredential_type="rsa_public_key"
from terraform.The snowflake secrets engine supports configuration options for creating rsa based authentication which, from what I can tell, cannot be specified when provisioning a
vault_database_secret_backend_role
using the snowflake secrets engineIn particular, in order to provision users with rsa_private_key auth rather than password auth, the role needs to be created with
credential_type="rsa_private_key"
-- without specifying that parameter the vault secrets engine doesn't pass an appropriate value for the{{public_key}}
template parameter when rendering the creation statements and an error like this is produced when attempting to read the secret ...I'm able to make the above command succeed if I manually provision the role with a command like this:
But the equivalent terraform version of the above will fail because there is no way to specify credential_type. (nor I believe is there a way to specify any other credential_config's -- but that is less important)
Affected Resource(s)
credential_type
somehow ...)References
The text was updated successfully, but these errors were encountered: