Replies: 1 comment
-
Hi @bigeasy, I'm not sure what is wrong, I've just tested it with this configuration: {
"type": "GCP",
"name": "GCP Provisioner",
"serviceAccounts": ["REDACTED"],
"projectIDs": ["REDACTED"],
"disableCustomSANs": false,
"disableTrustOnFirstUse": false,
"instanceAge": "0s"
} And running: $ step ssh certificate --force --provisioner "GCP Provisioner" --host --principal sandbox.prettyrobots.com --sign sandbox.prettyrobots.com test.pub
✔ Provisioner: GCP Provisioner (GCP)
✔ CA: https://redacted
✔ Certificate: test-cert.pub
$ step ssh inspect test-cert.pub
test-cert.pub:
Type: [email protected] host certificate
Public key: ECDSA-CERT SHA256:/FtJtNVo7s1rVV2/Rc5y/hxsEXUvdMW7yID+vJD6zkI
Signing CA: ECDSA SHA256:ETe0/7qtAOEkC3IKmL/MIjC9HIa8n6JL3C7jyFEP/3s
Key ID: "REDACTED"
Serial: 70329803775670899
Valid: from 2021-12-28T12:47:50 to 2022-01-27T12:48:50
Principals:
sandbox.prettyrobots.com
Critical Options: (none)
Extensions: (none) And it also works with In my case, My This is the default one used on GCP, here we use the principals passed using {
"type": {{ toJson .Type }},
"keyId": {{ toJson .KeyID }},
{{- if .Insecure.CR.Principals }}
"principals": {{ toJson .Insecure.CR.Principals }},
{{- else }}
"principals": {{ toJson .Principals }},
{{- end }}
"extensions": {{ toJson .Extensions }}
} |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I've been working through DIY tutorial with GCP as my target for hosts instead of AWS. I've adapted the
cloud-init
script to use the GCP provisioner. This is the script below.When I run this script it will not add the additional principals to the signature.
However when I sign using the JWK provisioner the principals appear.
I noticed in the logs that the GCP provisioner request does not send the principals. It makes me wonder if I have something configured incorrectly on the client side of if I've neglected to add a command line switch.
The payload from the JWT token given to GCP is above The following is for JWK.
Here is the configuration for for GCP provisioner. It's been softened to allow for debugging.
The above examples were run in the order presented on a fresh GCP instance.
I've since moved onto using the JWK-based strategy and I'm happy with it, but I'm curious as to what I was doing wrong here.
Beta Was this translation helpful? Give feedback.
All reactions