-
Notifications
You must be signed in to change notification settings - Fork 554
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add STS signing for AWS auth #1060
Conversation
I might be able to mock IAM similar to how Vault does it, so I'm looking into this: https://github.com/hashicorp/vault/blob/master/builtin/credential/aws/path_login_test.go#L548. |
There's an ec2 metadata mock that you could use potentially. I use it on my bash scripted vault-iam-auth I linked in the other issue linked here... Check it out. I also have the Google metadata mock service there too so you could add that provider as well if you're fired up at the keyboard. I'm willing to help test! |
May need to sort both ec2 instance auth and iam auth for AWS, etc al |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
6dda697
to
6de2e4c
Compare
Thanks to all involved for getting this feature built and merged in so quickly. This is extremely useful for me. |
Hey @jasonodonnell ,
This has been fixed by introducing the parameter |
This might relate to the defaults for region APIs. i.e., some APIs while they have a short form ( |
* Add STS signing for AWS auth * Update go mod * Merge * go mod
Community Note
Relates OR Closes #0000
Release note for CHANGELOG:
I'm still looking for a way to unit test this since it requires instances profiles on AWS, but this has tested well on an EC2 VM using:
Bash script to setup test:
Fixes #866.