You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I update an STS policy in vault that uses a federation_token and the AWS secrets backend. Unknown at the time the policy was too large for the PackedPolicySize.
I think that it would be nice if vault did not allow creating bad policies, because then it started erroring out in my clients when they tried to get the policy instead of erroring when I created it. It would be nice to have vault validate the policy, maybe by just issuing a token from AWS before it saved the update.
The text was updated successfully, but these errors were encountered:
I update an STS policy in vault that uses a
federation_token
and the AWS secrets backend. Unknown at the time the policy was too large for thePackedPolicySize
.I think that it would be nice if vault did not allow creating bad policies, because then it started erroring out in my clients when they tried to get the policy instead of erroring when I created it. It would be nice to have vault validate the policy, maybe by just issuing a token from AWS before it saved the update.
The text was updated successfully, but these errors were encountered: