-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
5844 AWS Root Credential Rotation #9921
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mostly did a diff scan since the original PR has been reviewed and approved.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved a bit too quick without looking at CI, but left some follow-up comments :)
23fe029
to
57320a3
Compare
Had to update the vendor files in order to get CI passing. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally LGTM. Given the endpoint in question, I don't think the race is likely to happen, but it also seems unnecessary to me. Perhaps I am just missing some context though.
@@ -138,6 +138,46 @@ $ curl \ | |||
http://127.0.0.1:8200/v1/auth/aws/config/client | |||
``` | |||
|
|||
## Rotate Config Credentials |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit: Would Rotate Root Credentials
be a slightly better title?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I copied all of the docs from a previous PR, unsure what others think about this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The equivalent on AWS Secrets Engine refers this operation as "Rotate Root [IAM] Credentials", so I I think using that here as well is fine :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sounds good. Change to docs will be made after manual testing is finished 👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Everything looks good, just pushed up a new commit to take care of this. :D
Region: aws.String(region), | ||
|
||
// Prevents races. | ||
HTTPClient: cleanhttp.DefaultClient(), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Wow TIL. I never thought about the need for this before.
Co-authored-by: Calvin Leung Huang <[email protected]>
57320a3
to
d723743
Compare
This is to re-introduce the changes found in #7131
Output of a live run: