Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[VAULT-2789] Enable AWS Auth to read credentials from named profiles #12602

Closed
wants to merge 3 commits into from

Conversation

vinay-gopalan
Copy link
Contributor

@vinay-gopalan vinay-gopalan commented Sep 21, 2021

This PR adds a Profile field to the AWS Client Config. This field is passed on to HashiCorp's internal awsutil package where it is used to enable the Shared Credentials provider. This PR is in conjunction with this PR in the go-secure-stdlib repo: hashicorp/go-secure-stdlib#11

Example config:

[profile default-user]
region=us-east-1
output=json
role_arn=arn:aws:iam::501359222269:role/vault_team_dev-developer

[profile dev-role-iam]
role_arn=arn:aws:iam::501359222269:role/*
role_session_name=dev-role-iam
region=us-east-1
output=json
source_profile=default-user

Example credentials:

[default-user]
aws_access_key=...
aws_secret_access_key=...
aws_session_token=...

The addition of these changes allows the use of source_profile fields that point to a named profile with credentials for assuming roles. This aims to fix:

@vercel vercel bot temporarily deployed to Preview – vault September 21, 2021 22:26 Inactive
@vercel vercel bot temporarily deployed to Preview – vault-storybook September 21, 2021 22:26 Inactive
@vercel vercel bot temporarily deployed to Preview – vault September 21, 2021 22:28 Inactive
@vercel vercel bot temporarily deployed to Preview – vault-storybook September 21, 2021 22:28 Inactive
@vinay-gopalan vinay-gopalan deleted the aws-auth-source-profile branch May 6, 2024 15:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant