-
Notifications
You must be signed in to change notification settings - Fork 53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document that in order to use chef_vault_secret, the client must be an admin #46
Comments
Note that trying to add a client to the admin group via the manage.chef.io results in an error, you must do it via |
I'm going to try removing the requirement for the admin attribute. |
Looking forward to this fix. |
I don't think it's really usable at all in current state, but I don't have the time/resources to look into this further atm. |
Agreed :( I am hoping chef will find a real fix for this since I think the RBAC / databags implementation is mutually exclusive to the implementation of chef-vault (cookbook and gem). |
|
admins is a required attribute:
https://github.com/chef-cookbooks/chef-vault/blob/master/libraries/chef_vault_secret.rb#L38
However I haven't found a way to configure chef to allow clients to read user pubic keys without providing full admin access:
You can do the following to read clients:
But the only way to get them to read users is to give the node full admin privs:
We should document this, and maybe look at creating a ticket around allowing access to public keys. Github does it by default to the entire world: https://github.com/hh.keys
The text was updated successfully, but these errors were encountered: