-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
v1.14.0 breaks AWS EKS IRSA credentials for DynamoDB backend #21465
Comments
We are running into the same issue and would appreciate a resolution. The new support for ACME is a feature we have been waiting for, since a long time. |
We are running into the similar issue after upgrading from 1.13 to 1.14, but in our case the seal configuration is causing problems:
The issue #21478 mentions a workaround, but it is not working for us. |
@SeanKnight Based on #21478 you may need to add |
I added both storage "dynamodb" {
ha_enabled = "true"
table = "vault-dynamo-table"
region = "us-east-1"
role_arn = "arn:aws:iam::012345678901:role/nonprod-vault-role"
web_identity_token_file = "/var/run/secrets/eks.amazonaws.com/serviceaccount/token"
} |
@ubajze adding |
We have exactly the same issue, I tried to add, role_arn and web_identity_token_file to the both storage config block and awskms block but still getting role assumption errors. Error initializing storage of type
|
Getting exactly the same error. Vault pods are ignoring the IRSA and using the node role. We have to use the IRSA because of multi-tenancy. Hope you can prioritize this issue. |
same thing here, the vault pods are ignoring the IRSA. |
I'm seeing this error as well and find it odd that the suggested fixes are to include the |
Hello and thanks for reporting. We will be looking into this issue soon. I will post any updates here as soon as I get them. |
Ran into the same issue. Any resolution in sight? |
The issue is because of how awsutil is used to derive credentials. The NewCredentialsConfig constructor method needs to be called instead of starting with an empty struct. the logic to determine which method to use to derive credentials has been moved from GenerateCredentialChain to NewCredentialsConfig.
See #21930 |
Describe the bug
Startup logs:
To Reproduce
Steps to reproduce the behavior:
0.23.0
or0.25.0
) using image tag1.14.0
Expected behavior
Vault starts up like it did on version
1.13.4
Environment:
vault status
):1.14.0
vault version
): n/aVault server configuration excerpt:
Helm values excerpt:
Additional context
Image tag
1.13.4
works but1.14.0
does notPossibly related since the version of
hashicorp/go-secure-stdlib
has changed ingo.mod
for vault1.14.0
:The text was updated successfully, but these errors were encountered: