We want to use Vault with cert-manager through Pulumi. According to the cert-manager Vault docs for authentication through AppRole, we need a secretId
. So, we’re trying to generate it by following the Pulumi Vault docs. But we're getting this error:
Diagnostics:
vault:appRole:AuthBackendRoleSecretId (new-auth-backend-role-secret-id):
error: unrecognized resource type (Check): vault:appRole/authBackendRoleSecretId:AuthBackendRoleSecretId
Our code with the offending line at the bottom using approle.NewAuthBackendRoleSecretId:
import (
mount "github.com/pulumi/pulumi-vault/sdk/v5/go/vault"
// One person pointed out that the docs say this path should be "appRole" but it really isn't
// The repo is at https://github.com/pulumi/pulumi-vault/tree/master/sdk/go/vault/approle
approle "github.com/pulumi/pulumi-vault/sdk/v5/go/vault/approle"
"github.com/pulumi/pulumi-vault/sdk/v5/go/vault/pkisecret"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
...
vaultprovider, _ := mount.NewProvider(pulumiContext, "vaultprovider", &v.Vaultprovider)
caRole, _ := pkisecret.NewSecretBackendRole(pulumiContext, "ca-role", &pkisecret.SecretBackendRoleArgs{
Backend: pulumi.String(enginePath),
Name: pulumi.String(caRoleName),
AllowedDomains: pulumi.StringArray{
pulumi.String("example.com"),
},
AllowSubdomains: pulumi.Bool(true),
MaxTtl: pulumi.String("2592000"),
}, pulumi.Provider(vaultprovider))
appRole, _ := mount.NewAuthBackend(pulumiContext, "approle", &mount.AuthBackendArgs{
Type: pulumi.String("approle"),
}, pulumi.Provider(vaultprovider))
backendRole, _ := approle.NewAuthBackendRole(pulumiContext, "pkiapprole", &approle.AuthBackendRoleArgs{
Backend: appRole.Path,
RoleName: pulumi.String("test-role"),
TokenPolicies: pulumi.StringArray{
pulumi.String("default"),
pulumi.String("dev"),
pulumi.String("prod"),
},
}, pulumi.Provider(vaultprovider), pulumi.DependsOn([]pulumi.Resource{
appRole,
}))
policy, _ := mount.NewPolicy(pulumiContext, "my-policy", &mount.PolicyArgs{
Name: pulumi.String("cert-issuer-policy"),
Policy: pulumi.String(`path "intermediate-ca/sign/cert-issuer-role" {
capabilities = ["read", "list", "create", "update"]
}`),
}, pulumi.Provider(vaultprovider), pulumi.DependsOn([]pulumi.Resource{
caRole, appRole,
}))
secretId, _ := approle.NewAuthBackendRoleSecretId(pulumiContext, "new-auth-backend-role-secret-id", &approle.AuthBackendRoleSecretIdArgs{
Backend: appRole.Path,
RoleName: backendRole.RoleName,
}, pulumi.Provider(vaultprovider), pulumi.DependsOn([]pulumi.Resource{
caRole, appRole, backendRole, policy,
}))
What does the error mean? Seems like some people experience this by passing in the wrong provider but in our case we pass in the same Vault provider throughout.
What are we missing?
In the end we thought this could be a bug in the package (we didn't have enough time to investigate fully) and decided to circumvent it by executing a command in the pod directly.
Can be done in different ways but here's our solution:
Our colleague mentions it's better to use the Vault SDK so we'll probably refactor in future.