-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update azure docs to include new param #27680
Conversation
CI Results: |
Build Results: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does there need to be an update to the plugin version or is that handled separately?
@@ -216,6 +216,8 @@ information about roles. | |||
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time. | |||
- `max_ttl` (`string: ""`) – Specifies the maximum TTL for service principals generated using this role. Accepts time | |||
suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine max TTL time. | |||
- `explicit_max_ttl` (`string: ""`) – Specifies the explicit maximum lifetime of the lease and service principal. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How about:
Limits the lifetime of the service principal secret in Azure and sets an upper bound on the corresponding lease's TTL. This lifetime cannot be changed once a lease is created, and the lease cannot be renewed beyond the expiration of this lifetime. If not set or set to zero, the service principal secret will be created with a default duration of 10 years and deleted once the corresponding lease in Vault expires.
Sorry – Looks like my comments posted after this was merged 🤷♂️ It was a small improvement anyway. |
Very small PR to update azure docs to include new param
explicit_max_ttl
.PR: hashicorp/vault-plugin-secrets-azure#199