-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to create/update AWS authentication role after 1.17.0 - unable to resolve ARN to internal ID: InvalidParameter: 1 validation error(s) found #27765
Comments
Possible offending update in version 1.17.0 is this: |
This broke for us too. 1.17 can no longer use the standard STS and assume role to use AWS AUTH engine. I used the GENERIC to add the external_id to the STS config to get it working again. `resource "vault_generic_endpoint" "aws" { data_json = <<EOT |
Hitting this issue as well, and with the same issue as @jskilton on the Terraform Provider. Overwriting the auth role to add external_id manually even if not required by the target STS fixes the issue.
So either the must here is a should, or there is another bug hidden that make it works. I followed the code in the linked MR a bit, and shouldn't the default value passed to AWS here be nil if the value is unset instead of empty string? (https://github.com/aws/aws-sdk-go/blob/main/aws/credentials/stscreds/assume_role_provider.go#L162) |
We are hitting the same issue with 1.17+ versions. |
Same here with Vault
This is not the first Vault issue related to AWS auth method I encountered. |
Currently on Vault
Once I manually added the
Thanks #27765 (comment) for the suggestion. Would have been nice if the |
same issues for me
|
Hi, The fix for this has been merged and will be included in the next release. #27858 Thank you for flagging this! |
Describe the bug
Unable to create/update AWS authentication role after 1.17.0
Error: unable to resolve ARN to internal ID: InvalidParameter: 1 validation error(s) found
To Reproduce
Steps to reproduce the behavior:
Expected behavior
After upgrading to version 1.17.0, the STS configuration requires the external_id parameter to be defined (even though it is defined in the documentation as an optional parameter). It is not possible to make changes to AWS authentication roles for accounts that already have the STS configuration defined.
Environment:
vault status
): 1.17.0vault version
): 1.17.0The text was updated successfully, but these errors were encountered: