-
Notifications
You must be signed in to change notification settings - Fork 547
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault Provider Lacks IAM Assume Role Capability #1086
Comments
Hi @jschwartzy , thanks for submitting the issue. Would you mind sharing the output for the TF config file above? Thanks! |
I'm having the same issue. My Tf code looks like this: provider "vault" {
address = "https://vault.example.com/"
token_name = "test-local"
namespace = "aws/test"
auth_login {
path = "auth/aws/login"
method = "aws"
namespace = "aws/test"
parameters = {
role = "test-role"
sts_region="us-east-1"
}
}
}
data "vault_generic_secret" "test" {
path = "secrets/test"
} I have tried running the following with the following command |
@emmaroberts-nbs I used your TF config file and was able to assume a role and login with AWS by running
|
Thanks for following up. In our case, the Vault Provider is unable to use a
Terraform Config:
Output:
In this case
|
Hi @jschwartzy thanks for the additional info. This issue was tracked in Vault instead of the Vault Provider for TF, and the bug was found and resolved down the ladder in the AWS util package hashicorp/go-secure-stdlib#11 |
Closing this issue since fix was merged and should be released with Vault 1.9. Please feel free to open another issue if the problem persists, thanks! |
We recommend using the first-class aws login support. See #1588 (comment) for related info. |
Terraform Version
Terraform v0.14.11
Affected Resource(s)
Vault Provider Authentication
Terraform Configuration Files
We have used an external script to generate credentials from sts for the assumed role:
Debug Output
Panic Output
n/a
Expected Behavior
Vault Provider should work similarly to the AWS Provider and support assume role
Actual Behavior
Vault Provider supports credentials from ~/.aws/credentials (but not from source_profile) or explicitly passed credentials in the parameter configuration
Steps to Reproduce
terraform apply
Important Factoids
References
The text was updated successfully, but these errors were encountered: