-
Notifications
You must be signed in to change notification settings - Fork 547
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault Provider - auth_login_aws does not use environment variables for AWS_SECRET_ACCESS_KEY, AWS_ACCESS_KEY_ID, AWS_SESSION_TOKEN #1754
Comments
I've got the same issue. Currently working around by using the
|
@alexanderchadwick I suppose there's no way to specify which IAM role to assume when using that approach, right? |
Having the same issue, I can't assume a role with the |
The |
Is there any update on this? This is quite an annoying issue to get around. |
Same problem, are you guys have plan to make auth_login_aws more useful? Really waiting for support SSO creds and ability assume role via aws_role_arn. |
I've got these environment variables defined:
Terraform Version
v1.3.7
Affected Resource(s)
Vault Provider 3.12
Terraform Configuration Files
Debug Output
https://gist.github.com/whathelll/9b97fefda12ec2e428617bf52bdc6458
Expected Behavior
it should use the environment variables to authenticate with vault
Actual Behavior
Steps to Reproduce
Please list the steps required to reproduce the issue, for example:
terraform plan
Important Factoids
References
If I use auth_login instead of auth_login_aws, it will pick up the environment variables.
The text was updated successfully, but these errors were encountered: