-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS auth backend client unable to use IAM credentials from ECS task metadata #8847
Comments
There is additional configuration via environment variables which I realize I neglected to include. I have |
Hi. Vault 1.4.0 updated the AWS SDK, and along with that began using IMDSv2. In researching this issue, I've come across various issues raised against the SDK and in other projects concerning IMDSv2 within container services. A common recommendation is to increase the response hop limit for the underlying instances. I was wondering if you'd tried that? This is not desirable requirement, and it looks like there requests into AWS to improve it. Nonetheless, it would be very useful to know if this is at least a workaround for now. References:
|
I was able to fix this, but not with the hop limit. On my ECS hosts, I have a rule in the |
I believe #7738 should fix this |
Closing since the original issue has been resolved. |
This is a regression
Worked in version: 1.3.0
Broken in version: 1.4.0
Bug Description
I have Vault deployed as an ECS service, using an ECS task definition with an associated task role. I have an AWS auth backend configured with a client that uses the IAM credentials from ECS task metadata. This configuration was working without issues with Vault 1.3.0. After upgrading Vault to version 1.4.0, I am unable to create AWS auth backend roles. Vault is unable to resolve the ARN and produces the following output (IDs and URLs redacted or modified):
The backend client is apparently able to use the AWS access key id and secret access key from ECS metadata, but not the token which is also required to authenticate.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
I expect Vault to use AWS credentials (access key, secret key, and token) from ECS metadata, successfully resolve the IAM role, and create the auth role.
Environment:
Vault server configuration file template:
The text was updated successfully, but these errors were encountered: