Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Azure ServicePrinciple secret type / continue support for individual credentials for withAzureKeyVault #266

Open
admalledd opened this issue Sep 26, 2024 · 0 comments
Labels
enhancement New feature or request

Comments

@admalledd
Copy link

admalledd commented Sep 26, 2024

What feature do you want to see added?

Due to multiple compounding things, such as the lack of multi-key-vault and folder support, etc, we have a setup of a "Primary/System/Root" keyvault that is to contain (and scope) the minimal secrets required for inside a project's JenkinsFile to use withAzureKeyvault or azureKeyVault.

such an example

        withAzureKeyvault(
          keyVaultURLOverride: '....', 
          applicationIDOverride: "${AzureKV_AppID}",
          applicationSecretOverride: "${AzureKV_AppSecret}",
          tenantIdOverride: "${AzureKV_TenantID}",
          azureKeyVaultSecrets: [...]

However, doing this results in warnings:

Deprecated: Use a credential ID instead of individual values for the service principal.
If you can't then please raise an issue at https://github.com/jenkinsci/azure-keyvault-plugin/issues.
This will be removed at some point.

We for various reasons can't/don't want to store the Service Principle itself in Jenkins and prefer to pull it from our main KV.

Thus the ask of:

  1. Continue to support the manual parameters/appId/appSec/tentantId until a viable alternate is officially supported (relates-to Add Folder Credentials Provider #97 )
  2. Add a secret type that can hold/transform into an Azure Service Principal somehow.

Even if (1) is done, we would want the ASP/Credentials used to be pulled from our KV as well.

Upstream changes

No response

Are you interested in contributing this feature?

Due to my work contract, I am not allowed to work on external projects at this time. :(

@admalledd admalledd added the enhancement New feature or request label Sep 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant