settings_reader-vault_resolver 0.4.6 → 0.4.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e7cf89396af4e1bdd661243b99672359c0da0ae19af41e89b25e4564765a8c9a
4
- data.tar.gz: 0a4e19ad01365e9c5b40e7192fc4c6fc259a238bad1d0c7c08f0e9ab20a15fec
3
+ metadata.gz: f365d1804568ddfb924bd52094e4a26f39ed13473f8e01c0c7ece3fd6ff7711f
4
+ data.tar.gz: 84863176a7db5f01ae1caaf05dbb1fb465d644ca193854fe366d5ef9f856b25a
5
5
  SHA512:
6
- metadata.gz: 0275337c5c6c561972cacaf4cfa91576950f024a8062669b74678836328f890b5a93cd4803f65352e5d6d40998c1e6f635d54a045458ec51e24224167cbfe5c4
7
- data.tar.gz: fe1bebe19a8f0334bd893fe84c9b162d5b2ffb06c6c253f088f74269bf2cbb64b37499bd6da2253bdb0b7261fe322268031a35086d1ceb299ec874e37a9f1188
6
+ metadata.gz: 7f05c10c485d163765e36cd56fecf1b4bd931be8fc9c97d19868903bc39e45d17512b3b5cfbc0a90b250e4a24109a375a193dc946c6113e953898af32d20acba
7
+ data.tar.gz: 1b88c952495f2679e89023b98a17928bdb67184675896a5d8a619aee2c05dd5be46ce9fee200f401570edd16681bee50e0a278585afb9024ed60546a4c13b5de
@@ -4,7 +4,8 @@ module SettingsReader
4
4
  # Adapter to retrieve / renew auth tokens
5
5
  class Auth < Abstract
6
6
  MOUNT = 'auth'.freeze
7
- K8S_AUTH = 'kubernetes/login'.freeze
7
+ AUTH_BACKEND = ENV['VAULT_AUTH_BACKEND'] || 'kubernetes'
8
+ K8S_AUTH = "#{AUTH_BACKEND}/login".freeze
8
9
 
9
10
  def retrieves?(address)
10
11
  address.mount == MOUNT
@@ -10,7 +10,8 @@ module SettingsReader
10
10
  def authenticate_via_k8s(role, route: nil, service_token_path: nil)
11
11
  params = { role: role, route: route, service_token_path: service_token_path, no_cache: true }
12
12
  url_params = URI.encode_www_form(params.compact)
13
- resolver.resolve("vault://auth/kubernetes/login?#{url_params}#client_token", FAKE_RESOLVER_PATH)
13
+ backend = SettingsReader::VaultResolver::Engines::Auth::AUTH_BACKEND
14
+ resolver.resolve("vault://auth/#{backend}/login?#{url_params}#client_token", FAKE_RESOLVER_PATH)
14
15
  end
15
16
 
16
17
  private
@@ -2,7 +2,7 @@ module Vault
2
2
  # Monkey patch to support k8s authenticaiton. Taken from https://github.com/hashicorp/vault-ruby/pull/202
3
3
  class Authenticate < Request
4
4
  def kubernetes(role, route: nil, service_token_path: nil)
5
- route ||= '/v1/auth/kubernetes/login'
5
+ route ||= "/v1/auth/#{SettingsReader::VaultResolver::Engines::Auth::AUTH_BACKEND}/login"
6
6
  service_token_path ||= '/var/run/secrets/kubernetes.io/serviceaccount/token'
7
7
 
8
8
  payload = {
@@ -1,5 +1,5 @@
1
1
  module SettingsReader
2
2
  module VaultResolver
3
- VERSION = '0.4.6'.freeze
3
+ VERSION = '0.4.8'.freeze
4
4
  end
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: settings_reader-vault_resolver
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.6
4
+ version: 0.4.8
5
5
  platform: ruby
6
6
  authors:
7
7
  - Volodymyr Mykhailyk
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2022-10-02 00:00:00.000000000 Z
11
+ date: 2022-10-24 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: concurrent-ruby