Replies: 1 comment
-
|
What reasons led you to use the Vault AWS secrets engine? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
HashiCorp Vault AWS secrets engine provides four methods for generating dynamic creds:
iam_user - not working with RustFS, because many required iam methods not implemented in the RustFS.
federation_token - not working, because sts:GetFederationToken not implemented in the RustFS.
session_token - not working, because sts:GetSessionToken not implemented in the RustFS.
session_token - also not working, because HashiCorp Vault AWS secrets engine using aws go sdk and this code of vault AWS secrets engine fails with error:
source code of `could not obtain sts client` Vault AWS secrets engine generating this error
file: https://github.com/hashicorp/vault/blob/main/builtin/logical/aws/client.go#L263
sts.New(sess) fron aws go sdk try to call
Action=GetCallerIdentityand RustFS return400 Bad Requeststatus withcontent-type: application/xmlmessage<?xml version="1.0" encoding="UTF-8"?><Error><Code>InvalidArgument</Code><Message>not support action</Message></Error>.but using aws cli from https://pypi.org/project/awscli/ works without any problems:
RustFS STS Client Example (aws cli)
also in message https://github.com/orgs/rustfs/discussions/1125 contains working code how to obtain dynamic creds using sts:AssumeRole method:
RustFS STS Client Example (boto3)
Is it possible to implement sts:GetCallerIdentity method on the RustFS side, to make Vault AWS secrets engine working with RustFS and generating dynamic creds for working with RustFS ?
@loverustfs
@GatewayJ
or some other workarounds exists, how to use HashiCorp Vault AWS secrets engine with RustFS ?
or any alternatives, what to use instead of HashiCorp Vault AWS secrets engine to obtain dynamic creds for RustFS ?
UPD.
P.S.
Static roles method as described in HashiCorp Vault AWS secrets engine documentation also not work, RustFS return xml with
<Error><Code>NotImplemented</Code><Message>unknown service</Message></Error>So, all available in HashiCorp Vault AWS secrets engine methods are tested, but nothing work right now with current RustFS version 1.0.0-alpha.82.
Beta Was this translation helpful? Give feedback.
All reactions