-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow configuring token version for global STS endpoint #10707
Comments
@mikn Could you try setting |
For me, either changing this setting on the AWS account, or setting |
@ewbankkit I'm sorry, I don't think I answered the question you actually were asking. I think this still belongs in a resource, as a provider configuration flag only would cover the Terraform use-case but not other AWS API clients. Most implementations (and even the official AWS libraries) work under the assumption that a token from the global STS endpoint is valid for all regions (an assumption that they now broke unless you flip this flag). By exposing the configuration of token version on the global STS service through a resource, you can provision accounts through Terraform with this setting on, making this assumption true again, and it would mitigate most "wtf" moments across most clients (unless they assume a fixed token size). In other words, we would most likely need to change this configuration setting no matter whether Terraform works or not. |
My recommendation here would be to split off the new provider configuration into its own feature request, while treating this feature request as implementing a new resource such as:
That uses the following APIs:
|
I'm going to close this issue due to inactivity (90 days without response ⏳ ). This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Description
With the introduction of
ap-east-1
andme-south-1
, they are the first regions to only accept V2 STS tokens. However, to allow for backwards compatibility the global STS endpoint (https://sts.amazonaws.com) issues V1 tokens per default. This means that you cannot use a token from the global STS endpoint to authenticate against regional endpoints for these two new regions (and any following regions).It would be helpful to be able to use terraform to configure this setting. Here's the API documentation for the call: https://docs.aws.amazon.com/IAM/latest/APIReference/API_SetSecurityTokenServicePreferences.html
New or Affected Resource(s)
I'm not sure under which resource this configuration flag should be put, as it is an AWS account setting under IAM, but it isn't bound to any specific IAM resource. I'm open to suggestions!
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: