Created
December 6, 2019 21:23
-
-
Save kawsark/f659cf6644cbac94527ae7f062dbdb63 to your computer and use it in GitHub Desktop.
Envconsul output with GCP dynamic credentials from Vault
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
➜ envconsul envconsul -config testgcp1.hcl | |
2019/12/06 16:01:41 [DEBUG] (logging) enabling syslog on LOCAL5 | |
2019/12/06 21:01:41.417692 [INFO] envconsul v0.9.1 (b5e928a7) | |
2019/12/06 21:01:41.417753 [INFO] (runner) creating new runner (once: false) | |
2019/12/06 21:01:41.418195 [DEBUG] (runner) final config: {"Consul":{"Address":"","Auth":{"Enabled":false,"Username":"","Password":""},"Retry":{"Attempts":12,"Backoff":250000000,"MaxBackoff":60000000000,"Enabled":true},"SSL":{"CaCert":"","CaPath":"","Cert":"","Enabled":false,"Key":"","ServerName":"","Verify":true},"Token":"","Transport":{"DialKeepAlive":30000000000,"DialTimeout":30000000000,"DisableKeepAlives":false,"IdleConnTimeout":90000000000,"MaxIdleConns":100,"MaxIdleConnsPerHost":9,"TLSHandshakeTimeout":10000000000}},"Exec":{"Command":"/Users/kawsark/code/local/envconsul/app-wrapper.sh","Enabled":true,"Env":{"Blacklist":[],"Custom":[],"Pristine":false,"Whitelist":[]},"KillSignal":2,"KillTimeout":30000000000,"ReloadSignal":null,"Splay":5000000000,"Timeout":0},"KillSignal":2,"LogLevel":"debug","MaxStale":2000000000,"PidFile":"/tmp/envconsul.pid","Prefixes":[],"Pristine":false,"ReloadSignal":1,"Sanitize":true,"Secrets":[{"Format":"GOOGLE_APPLICATION_CREDENTIALS{{ .data.private_key_data }}","NoPrefix":false,"Path":"gcp/key/viewer"}],"Syslog":{"Enabled":true,"Facility":"LOCAL5"},"Upcase":true,"Vault":{"Address":"http://127.0.0.1:32773","Enabled":true,"Grace":15000000000,"Namespace":"","RenewToken":false,"Retry":{"Attempts":12,"Backoff":250000000,"MaxBackoff":60000000000,"Enabled":true},"SSL":{"CaCert":"","CaPath":"","Cert":"","Enabled":true,"Key":"","ServerName":"","Verify":false},"Transport":{"DialKeepAlive":30000000000,"DialTimeout":30000000000,"DisableKeepAlives":false,"IdleConnTimeout":90000000000,"MaxIdleConns":100,"MaxIdleConnsPerHost":9,"TLSHandshakeTimeout":10000000000},"UnwrapToken":false},"Wait":{"Enabled":false,"Min":0,"Max":0}} | |
2019/12/06 21:01:41.418348 [WARN] (clients) disabling vault SSL verification | |
2019/12/06 21:01:41.418395 [INFO] (runner) creating watcher | |
2019/12/06 21:01:41.418422 [INFO] looking at vault gcp/key/viewer | |
2019/12/06 21:01:41.418587 [INFO] (runner) starting | |
2019/12/06 21:01:41.418722 [INFO] creating pid file at "/tmp/envconsul.pid" | |
2019/12/06 21:01:41.419210 [DEBUG] (watcher) adding vault.read(gcp/key/viewer) | |
2019/12/06 21:01:42.917229 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:01:42.917275 [INFO] (runner) running | |
2019/12/06 21:01:42.919931 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:01:42.920056 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:01:42.920237 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="ewo<BASE64-KEY>=" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:01:42.921312 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY> | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:02:20.693992 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "22s"; TTL value is capped accordingly | |
2019/12/06 21:02:20.694334 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:02:21.929026 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:02:21.929070 [INFO] (runner) running | |
2019/12/06 21:02:21.929230 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:02:21.929323 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:02:21.929509 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="ewo<BASE64-key>==" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:02:21.930337 [INFO] (runner) stopping existing child process | |
2019/12/06 21:02:21.930353 [DEBUG] (runner) stopping child process | |
2019/12/06 21:02:21.930361 [INFO] (child) stopping process | |
2019/12/06 21:02:21.930676 [DEBUG] (child) waiting 2.82s for random splay | |
2019/12/06 21:02:54.759606 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:02:54.760934 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY>== | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:02:58.401651 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "23s"; TTL value is capped accordingly | |
2019/12/06 21:02:58.401712 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:02:59.710927 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:02:59.710964 [INFO] (runner) running | |
2019/12/06 21:02:59.711090 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:02:59.711168 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:02:59.711290 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="ewo<BASE64-KEY>==" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:02:59.711934 [INFO] (runner) stopping existing child process | |
2019/12/06 21:02:59.711949 [DEBUG] (runner) stopping child process | |
2019/12/06 21:02:59.711957 [INFO] (child) stopping process | |
2019/12/06 21:02:59.711970 [DEBUG] (child) waiting 3.18s for random splay | |
2019/12/06 21:03:32.897023 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:03:32.897944 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY>== | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:03:35.692211 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "24s"; TTL value is capped accordingly | |
2019/12/06 21:03:53.998207 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "6s"; TTL value is capped accordingly | |
2019/12/06 21:03:53.998253 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:03:55.318016 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:03:55.318060 [INFO] (runner) running | |
2019/12/06 21:03:55.318225 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:03:55.318338 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:03:55.318517 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="ewo<BASE64-KEY>=" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:03:55.319194 [INFO] (runner) stopping existing child process | |
2019/12/06 21:03:55.319209 [DEBUG] (runner) stopping child process | |
2019/12/06 21:03:55.319217 [INFO] (child) stopping process | |
2019/12/06 21:03:55.319233 [DEBUG] (child) waiting 2.96s for random splay | |
2019/12/06 21:04:28.282941 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:04:28.284061 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY>= | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:04:32.175333 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "23s"; TTL value is capped accordingly | |
2019/12/06 21:04:32.175387 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:04:33.555718 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:04:33.555782 [INFO] (runner) running | |
2019/12/06 21:04:33.555926 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" from vault.read(gcp/key/viewer) | |
2019/12/06 21:04:33.556072 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="ewo<BASE64-KEY>=" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:04:33.556966 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" (was "ewo<BASE64-KEY>=") from vault.read(gcp/key/viewer) | |
2019/12/06 21:04:33.557528 [INFO] (runner) stopping existing child process | |
2019/12/06 21:04:33.557546 [DEBUG] (runner) stopping child process | |
2019/12/06 21:04:33.557555 [INFO] (child) stopping process | |
2019/12/06 21:04:33.557573 [DEBUG] (child) waiting 0.45s for random splay | |
2019/12/06 21:05:04.015924 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:05:04.016928 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
KEY_ALG_RSA_2048 | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:05:11.014510 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "22s"; TTL value is capped accordingly | |
2019/12/06 21:05:11.014563 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:05:12.428780 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:05:12.428857 [INFO] (runner) running | |
2019/12/06 21:05:12.429072 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:05:12.429163 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:05:12.429341 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="ewo<BASE64-KEY>==" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:05:12.430171 [INFO] (runner) stopping existing child process | |
2019/12/06 21:05:12.430186 [DEBUG] (runner) stopping child process | |
2019/12/06 21:05:12.430193 [INFO] (child) stopping process | |
2019/12/06 21:05:12.430210 [DEBUG] (child) waiting 2.61s for random splay | |
2019/12/06 21:05:45.045617 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:05:45.046128 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY>== | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:05:49.900280 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "23s"; TTL value is capped accordingly | |
2019/12/06 21:05:49.900335 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:05:51.445542 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:05:51.445588 [INFO] (runner) running | |
2019/12/06 21:05:51.445726 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:05:51.445815 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:05:51.446018 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="ewo<BASE64-KEY>==" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:05:51.446953 [INFO] (runner) stopping existing child process | |
2019/12/06 21:05:51.446976 [DEBUG] (runner) stopping child process | |
2019/12/06 21:05:51.446986 [INFO] (child) stopping process | |
2019/12/06 21:05:51.447000 [DEBUG] (child) waiting 0.76s for random splay | |
2019/12/06 21:06:22.219515 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:06:22.220953 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY>== | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:06:31.304689 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "20s"; TTL value is capped accordingly | |
2019/12/06 21:06:31.304745 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:06:32.463091 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:06:32.463138 [INFO] (runner) running | |
2019/12/06 21:06:32.463304 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:06:32.463422 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:06:32.463607 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="ewo<BASE64-KEY>=" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:06:32.464336 [INFO] (runner) stopping existing child process | |
2019/12/06 21:06:32.464353 [DEBUG] (runner) stopping child process | |
2019/12/06 21:06:32.464362 [INFO] (child) stopping process | |
2019/12/06 21:06:32.464382 [DEBUG] (child) waiting 1.32s for random splay | |
2019/12/06 21:07:03.784235 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:07:03.785798 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY>= | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:07:08.799773 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "24s"; TTL value is capped accordingly | |
2019/12/06 21:07:08.799836 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:07:10.087021 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:07:10.087062 [INFO] (runner) running | |
2019/12/06 21:07:10.087366 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:07:10.087571 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:07:10.087741 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="ewo<BASE64-KEY>==" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:07:10.088392 [INFO] (runner) stopping existing child process | |
2019/12/06 21:07:10.088409 [DEBUG] (runner) stopping child process | |
2019/12/06 21:07:10.088416 [INFO] (child) stopping process | |
2019/12/06 21:07:10.088433 [DEBUG] (child) waiting 0.68s for random splay | |
2019/12/06 21:07:40.773611 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:07:40.775139 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY>== | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:07:47.249707 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "23s"; TTL value is capped accordingly | |
2019/12/06 21:07:47.249771 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:07:48.485833 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:07:48.485872 [INFO] (runner) running | |
2019/12/06 21:07:48.485999 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:07:48.486099 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:07:48.486315 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="<BASE64-KEY>" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:07:48.486969 [INFO] (runner) stopping existing child process | |
2019/12/06 21:07:48.486985 [DEBUG] (runner) stopping child process | |
2019/12/06 21:07:48.487001 [INFO] (child) stopping process | |
2019/12/06 21:07:48.487014 [DEBUG] (child) waiting 2.30s for random splay | |
2019/12/06 21:08:20.791692 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:08:20.792079 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY> | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:08:25.968468 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "23s"; TTL value is capped accordingly | |
2019/12/06 21:08:25.968522 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
2019/12/06 21:08:27.076049 [DEBUG] (runner) receiving dependency vault.read(gcp/key/viewer) | |
2019/12/06 21:08:27.076104 [INFO] (runner) running | |
2019/12/06 21:08:27.076328 [DEBUG] (runner) setting GOOGLE_APPLICATION_CREDENTIALS="KEY_ALG_RSA_2048" from vault.read(gcp/key/viewer) | |
2019/12/06 21:08:27.076420 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="TYPE_GOOGLE_CREDENTIALS_FILE" (was "KEY_ALG_RSA_2048") from vault.read(gcp/key/viewer) | |
2019/12/06 21:08:27.076645 [DEBUG] (runner) overwriting GOOGLE_APPLICATION_CREDENTIALS="<BASE64-KEY>==" (was "TYPE_GOOGLE_CREDENTIALS_FILE") from vault.read(gcp/key/viewer) | |
2019/12/06 21:08:27.077527 [INFO] (runner) stopping existing child process | |
2019/12/06 21:08:27.077549 [DEBUG] (runner) stopping child process | |
2019/12/06 21:08:27.077559 [INFO] (child) stopping process | |
2019/12/06 21:08:27.077578 [DEBUG] (child) waiting 1.63s for random splay | |
2019/12/06 21:08:58.712515 [INFO] (child) spawning: /Users/kawsark/code/local/envconsul/app-wrapper.sh | |
2019/12/06 21:08:58.713543 [DEBUG] (cli) receiving signal "child exited" | |
~~~~~~~ Application wrapper invoked, starting loop | |
Loop # 0 | |
Checking for GOOGLE_APPLICATION_CREDENTIALS | |
ewo<BASE64-KEY>== | |
Checking for GCP_KEY_VIEWER_PRIVATE_KEY_DATA | |
Going to sleep for 120s | |
2019/12/06 21:09:03.994608 [WARN] vault.read(gcp/key/viewer): TTL of "50s" exceeded the effective max_ttl of "23s"; TTL value is capped accordingly | |
2019/12/06 21:09:03.994675 [WARN] vault.read(gcp/key/viewer): renewer returned (maybe the lease expired) | |
^C2019/12/06 21:09:04.518086 [DEBUG] (cli) receiving signal "interrupt" | |
Cleaning up... | |
2019/12/06 21:09:04.518147 [INFO] (runner) stopping | |
2019/12/06 21:09:04.518174 [DEBUG] (runner) stopping watcher | |
2019/12/06 21:09:04.518186 [DEBUG] (watcher) stopping all views | |
2019/12/06 21:09:04.518219 [DEBUG] (runner) stopping child process | |
2019/12/06 21:09:04.518230 [INFO] (child) stopping process | |
2019/12/06 21:09:04.518252 [DEBUG] (child) waiting 3.34s for random splay | |
2019/12/06 21:09:07.857673 [DEBUG] removing pid file at "/tmp/envconsul.pid" | |
2019/12/06 21:09:07.858079 [INFO] (runner) received finish |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment