
You have two options to solve this error: Only for jobs running for protected tags with names matching the pattern used forĮRROR: Job failed (system failure): resolving secrets: initializing Vault service: preparing authenticated client: checking Vault server health: Get : x509: certificate signed by unknown authority In this example, authentication is allowed These rules to fit your specific use case. You can have as many bounded claims you need, but they must all matchĬombining bounded claims with GitLab features like user roles To specific GitLab users, specific projects, or even jobs running for specific Git With bounded claims, you can restrict access Values that are matched to the JWT claims. If authentication is successful, these policies are You can use roles to groupĭifferent policies together. When a CI job attempts to authenticate, it specifies a role. Instead of pointing to a file that holds it.įor more information about the supported syntax, read the In this example, the secret value is put directly in the DATABASE_PASSWORD variable Secrets : id_tokens : VAULT_ID_TOKEN : aud : DATABASE_PASSWORD : vault : file : false token : $VAULT_ID_TOKEN Runner reads secrets from the HashiCorp Vault.HashiCorp Vault checks the bounded claims and attaches policies.Runner contacts HashiCorp Vault and authenticates using the JWT.Generate your JWT and provide it to your CI job.The flow for using GitLab with HashiCorp Vault You must configure your Vault server before you Tutorial has more details about authenticating with ID tokens. The Authenticating and Reading Secrets With HashiCorp Vault Use ID tokens to authenticate with Vault. GitLab has selected Vault by HashiCorp as the Read GitLab CI/CD pipeline configuration reference Unlike CI/CD variables, which are always presented to a job, secrets must be explicitly Secrets are sourced from your secrets provider. Sensitive information can be items like API tokens, database credentials, or private keys. Secrets represent sensitive information your CI job needs to complete work. VAULT_NAMESPACE setting introduced in GitLab 14.9 and GitLab Runner 14.9.file setting introduced in GitLab 14.1 and GitLab Runner 14.1.Introduced in GitLab 13.4 and GitLab Runner 13.4.
