-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws auth backend fail to verify signature #4014
Comments
Hey @jippi -- I dug into this a bit, and I think this is caused by fullsailor/pkcs7#29 (the PKCS7 library Vault uses internally) which is triggered by 0.9.4's upgrade to golang 1.10. As a workaround, you can use the
|
@joelthompson alright, I've just rolled back to 0.9.3 for now - didn't need anything from 0.9.4 anyway - is it possible to add a test to Vault to cover this case so it won't be a regression in the future? |
There already is a test for this and it caught the regression, but that test is a manually run acceptance test because it makes real AWS API calls and so requires a valid EC2 instance identity document from an EC2 instance that is currently running, and it also requires valid AWS credentials in order to validate the instance. That's why it's not run as part of Travis builds for each PR, and I can only speculate that that's also probably why it wasn't run post-go1.10 upgrade but can't speak with any authority on that (I'm not a Vault team member, just a community member who works mostly on the AWS auth backend). I have been thinking a bit recently about how to improve overall testability so that these kinds of tests don't require valid EC2 instances, API creds, etc., and this is another great use case of why that would be valuable, but I don't have anything concrete (yet). |
Acceptance tests were failing due to hashicorp#4014 so, as a workaround for now, passing in the identity document and the RSA signature rather than the PKCS7 document.
@jippi We have some things in progress internally to get a test server up for exactly this kind of thing. |
Environment:
auth backend:
aws-ec2
auth role
auth_type
:ec2
Expected Behavior:
successful ec2 auth
Actual Behavior:
failed ec2 auth:
Steps to Reproduce:
Important Factoids:
Worked on 0.9.3
The text was updated successfully, but these errors were encountered: