Skip to content

Commit

Permalink
Add agent approle method example (hashicorp#12297)
Browse files Browse the repository at this point in the history
  • Loading branch information
mikegreen authored and jartek committed Sep 11, 2021
1 parent f5ab835 commit fbccc96
Showing 1 changed file with 62 additions and 1 deletion.
63 changes: 62 additions & 1 deletion website/content/docs/agent/autoauth/methods/approle.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,8 @@ cached.
- `secret_id_file_path` `(string: optional)` - The path to the file with secret
ID.
If not set, only the `role-id` will be used. \
In that case, the AppRole should have `bind_secret_id` set to `false` otherwise Vault Agent wouldn't be able to login.
In that case, the AppRole should have `bind_secret_id` set to `false` otherwise
Vault Agent wouldn't be able to login.

- `remove_secret_id_file_after_reading` `(bool: optional, defaults to true)` -
This can be set to `false` to disable the default behavior of removing the
Expand All @@ -35,3 +36,63 @@ cached.
containing the output of the secret ID retrieval endpoint for the role (e.g.
`auth/approle/role/webservers/secret-id`) and the creation path for the
response-wrapping token must match the value set here.

## Example Configuration

An example configuration, using approle to enable [auto-auth](/docs/agent/autoauth)
and creating both a plaintext token sink and a [response-wrapped token sink file](/docs/agent/autoauth#wrap_ttl), follows:

```python
pid_file = "./pidfile"

vault {
address = "https://127.0.0.1:8200"
}

auto_auth {
method {
type = "approle"

config = {
role_id_file_path = "roleid"
secret_id_file_path = "secretid"
remove_secret_id_file_after_reading = false
}
}

sink {
type = "file"
wrap_ttl = "30m"
config = {
path = "sink_file_wrapped_1.txt"
}
}

sink {
type = "file"
config = {
path = "sink_file_unwrapped_2.txt"
}
}
}


cache {
use_auto_auth_token = true
}

listener "tcp" {
address = "127.0.0.1:8100"
tls_disable = true
}

template {
source = "/etc/vault/server.key.ctmpl"
destination = "/etc/vault/server.key"
}

template {
source = "/etc/vault/server.crt.ctmpl"
destination = "/etc/vault/server.crt"
}
```

0 comments on commit fbccc96

Please sign in to comment.