You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I don't believe there is, unfortunately. I have found the same misfeature in the AD secrets engine too, though I hadn't got around to opening an issue for that when I saw yours.
Vault is really in need of a systematic separation of config and credentials, especially in every secret engine that implements a rotate-root endpoint. The way it's currently done, it becomes impossible to reconfigure a secret engine once you've used the rotate-root functionality.
@maxb@allyunion Would adding a PATCH endpoint similar to the ones in PKI work? Vault 1.13 will have a vault patch CLI option, so with more server endpoints supporting PATCH capabilities, it could make for a nice release if someone wants to propose a PR some new handlers... :-)
Is there a way to retain the existing access_key and secret_key credentials and still update the sts_endpoint?
vault/builtin/logical/aws/path_config_root.go
Lines 92 to 128 in 2a1753a
Thanks!
The text was updated successfully, but these errors were encountered: