-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bound_iam_role_arn is not bound to a role ARN but rather an instance-profile ARN #1769
Comments
@vishalnayak Thoughts on this? Maybe we need to switch the behavior for 0.6.2 and support both of these? (In the meantime we could update the docs.) @skippy Any reason to support one over the other, or are both useful? |
A role ARN is a bit more generic (I think) as it tied to a set of credentials (whether from the ec2 instance or passed in as separate iam access keys) vs an instance-profile, which is only available if the credentials are gathered from the local ec2 meta provider. Another way to say this is if I passed in an access_key and secret directly into (sorry for the |
@vishalnayak @skippy I've been thinking about this, and here's my thoughts -- let me know if they sound reasonable. The current behavior is a bug. Changing that behavior will unfortunately undoubtedly make some people unhappy, but the parameter clearly says one thing but actually uses another, and the documentation also says the same thing ( I think we should change the behavior to actually use the IAM Role ARN as documented, and add an additional bind against the instance profile ARN. We could potentially be backwards-compatible by detecting |
@jefferai one thought on backwards compatibility; the other option besides what you suggested is to add a new bind
that way if someone has a thanks folks |
@skippy That may be what we need to do if the locking situation is too difficult, but ideally we'll just migrate the value over. That way it will be properly set in the right place, and will additionally show up correctly on a read of the role. |
@jefferai I could not find a way to retrieve the "IAM Role ARN" set on the instance. So, I am simply fixing the issue of wrong nomenclature of the field and handling the upgrade and also the deprecation warnings. I did not add another bound restriction to the role for the role ARN. |
After discussing internally, we did figure out a way to support both |
thanks! |
Perhaps I'm missing something, but when I read the directions, I thought this was a role arn, such as:
arn:aws:iam::[acct_id]:role/proxy
, and that it would look for that role from the aws instance profile. However, I received this error msg from vault:The proxy role is actually a part of this instance-profile, but that doesn't seem to be what the code is expecting.
when I set
bound_iam_role_arn
to the instance profile, such asbound_iam_role_arn=arn:aws:iam::[acct_id]:instance-profile/proxy_profile
it works. That is fine, but it seems from the feature name and description that it is looking for a role arn and not an instance-profile arn.BUT, this is a nice
bound_
and it fits a nice middle ground between ami and account bounds; thank you for adding it!The text was updated successfully, but these errors were encountered: