Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Are you using this plugin? #46

Open
davidsbond opened this issue Nov 30, 2022 · 4 comments
Open

Are you using this plugin? #46

davidsbond opened this issue Nov 30, 2022 · 4 comments
Labels
question Further information is requested

Comments

@davidsbond
Copy link
Owner

Recently I've noticed this repo getting a lot of stars over the last week. I say a lot, by my standards it's a lot.

Just curious if you're using this plugin at home/work successfully, let me know!

@davidsbond davidsbond added the question Further information is requested label Nov 30, 2022
@davidsbond davidsbond pinned this issue Nov 30, 2022
@aelbarkani
Copy link

I'm planning to test it shortly then probably use it !

@dgivens
Copy link

dgivens commented May 23, 2023

I used it previously to get auth keys through the Vault pulumi provider, but found that they were getting revoked before the instances could start and switched to using the Tailscale provider. That said, I would like to start using it again once you get #65 done. I almost picked it up to see if I could help, but just don't have the time to spare. The expiring api keys are a bummer.

@kvizdos
Copy link

kvizdos commented Jul 22, 2023

I used it previously to get auth keys through the Vault pulumi provider, but found that they were getting revoked before the instances could start and switched to using the Tailscale provider. That said, I would like to start using it again once you get #65 done. I almost picked it up to see if I could help, but just don't have the time to spare. The expiring api keys are a bummer.

Is the key expiring still an issue? If I’m reading correctly, we can tag the Hashicorp Vault Authkey, and that should disable expirations:
“Key expiry for a tagged device is disabled by default. If you change the tags on the device via the admin console, Tailscale CLI, or Tailscale API, the device’s key expiry will not change unless you are asked to re-authenticate. That is, if it is enabled, it stays enabled; and if it is disabled, it stays disabled. Once you re-authenticate, the device’s key expiry will be disabled.”

https://tailscale.com/kb/1085/auth-keys/

Anybody able to test this//confirm? I’m still relatively new to Tailscale, so I may not be reading it correctly. Thanks for the help!

@dgivens
Copy link

dgivens commented Aug 3, 2023

The issue isn't with the auth keys. It's that the API keys have a fixed expiry. They've added oauth client auth that can serve in place of API keys, but with scoped access.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

4 participants