-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Are you using this plugin? #46
Comments
I'm planning to test it shortly then probably use it ! |
I used it previously to get auth keys through the Vault pulumi provider, but found that they were getting revoked before the instances could start and switched to using the Tailscale provider. That said, I would like to start using it again once you get #65 done. I almost picked it up to see if I could help, but just don't have the time to spare. The expiring api keys are a bummer. |
Is the key expiring still an issue? If I’m reading correctly, we can tag the Hashicorp Vault Authkey, and that should disable expirations: https://tailscale.com/kb/1085/auth-keys/ Anybody able to test this//confirm? I’m still relatively new to Tailscale, so I may not be reading it correctly. Thanks for the help! |
The issue isn't with the auth keys. It's that the API keys have a fixed expiry. They've added oauth client auth that can serve in place of API keys, but with scoped access. |
Recently I've noticed this repo getting a lot of stars over the last week. I say a lot, by my standards it's a lot.
Just curious if you're using this plugin at home/work successfully, let me know!
The text was updated successfully, but these errors were encountered: