You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Expected Behavior:
Vault (via the golang aws SDK, I suppose) should get AWS credentials from the environment, connect properly, and renew the credentials periodically as necessary.
Actual Behavior:
The server panics, fails to start, and crashes. Providing credentials manually either via the config file or the more traditional environment variables works fine.
Steps to Reproduce:
Start an ECS container and run the vault server against a DynamoDB storage backend. Do not make any effort to specify any AWS credentials.
Important Factoids:
This is in a docker container run via ECS. The AWS_CONTAINER_CREDENTIALS_RELATIVE_URI value is set, and when you pull it via curl 169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI, it returns the proper role and a set of credentials.
If you parse that payload and export them to environment variables, vault server will run properly, but it will fail as soon as those credentials expire (24h?), requiring the server to be restart, which means it'll be sealed. (I was hoping that the "reload via SIGHUP" might work for this in a pinch, but obviously no one's complained about AWS credentials needing a reload)
Environment:
docker-vault
image.Vault Config File:
Startup Log Output:
Expected Behavior:
Vault (via the golang aws SDK, I suppose) should get AWS credentials from the environment, connect properly, and renew the credentials periodically as necessary.
Actual Behavior:
The server panics, fails to start, and crashes. Providing credentials manually either via the config file or the more traditional environment variables works fine.
Steps to Reproduce:
Start an ECS container and run the vault server against a DynamoDB storage backend. Do not make any effort to specify any AWS credentials.
Important Factoids:
This is in a docker container run via ECS. The
AWS_CONTAINER_CREDENTIALS_RELATIVE_URI
value is set, and when you pull it viacurl 169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI
, it returns the proper role and a set of credentials.If you parse that payload and export them to environment variables,
vault server
will run properly, but it will fail as soon as those credentials expire (24h?), requiring the server to be restart, which means it'll be sealed. (I was hoping that the "reload viaSIGHUP
" might work for this in a pinch, but obviously no one's complained about AWS credentials needing a reload)References:
The text was updated successfully, but these errors were encountered: