-
Notifications
You must be signed in to change notification settings - Fork 542
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot create Vault Auth Backend Role without also enabling inferencing #378
Comments
Actually, I looked into this a little further and tried to create the Vault role directly from the CLI (not using Terraform). It turns out that one does need inferencing enabled to use the bind features, so I'm going to close this. |
I got this same error when using config like:
But weirdly, if I added inferred_entity_type and inferred_aws_region it worked. Then afterwards I was able to remove inferred_entity_type, and it applied successfully. and using the api worked as well. I think there is something weird with how terraform is using the api. Maybe something is being set to a default value that should be undefined? |
I checked with vault cli, if you remove inferred_aws_region and inferred_entity_type after applying they are not removed and stay the same in the aws role. |
We may need to make |
I'm hitting the same issue today. I have the same results as mentioned here #378 (comment) When configuring via
And of course, I can't remove the parameters |
Terraform Version
Affected Resource(s)
Terraform Configuration Files
Debug Output
Link to a GitHub Gist containing the complete debug output
Expected Behavior
It should have created the
vault_aws_auth_backend_role
resource without problems.Actual Behavior
It failed to create the resource, giving this error:
Steps to Reproduce
terraform apply
Important Factoids
Obviously you need to point it to a real Vault server and use a real (root) token.
I noticed that if I add in both of these fields:
...then it saves the resource successfully. However I specifically don't want to add these fields. Looking at the Vault API code, it should be able to work without them. Since I already do specify two bindings (
bound_iam_role_arns
andbound_iam_instance_profile_arns
), this would lead me to believe that this Terraform provider is calling the Vault API in a weird way.The text was updated successfully, but these errors were encountered: