-
Notifications
You must be signed in to change notification settings - Fork 549
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve AWS secret backend client configuration #539
Improve AWS secret backend client configuration #539
Conversation
Now that Vault supports reading the config/root endpoint, we can read out the AWS access key and region that have been configured to allow Terraform to detect for and fix drift.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for doing this!
Quick question that I want to include in the changelog, do you happen to know off-hand which version of Vault (and forward) this is compatible with? (If you don't, I can look it up.)
1.3 -- it hasn't been released yet, it was only merged to master last Friday. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Moving this back from "approved" to "comment" for now because, upon chatting more about this, it would be awesome if this could be backwards-compatible. Typically we don't worry too much about that, but in this case we'd like to add this feature, and also give users of the repo a little more time to upgrade Vault after it's merged and released.
Also update docs
Done -- mostly didn't want to add additional code if it wasn't needed/desired. I've run acceptance tests against the official Vault binary for the latest release (1.2.3), a local build of Vault one commit before the support went into Vault, and a local build of Vault for the latest master, so should be good to go! |
…s_config Improve AWS secret backend client configuration
Now that Vault supports reading the config/root endpoint, we can read
out the AWS access key and region that have been configured to allow
Terraform to detect for and fix drift.
Note that there's a little bit of a nasty hack in here to prevent unexpected but probably innocuous config diffs in the region selected as explained in the comments. This can be removed if it's not a big deal, but I went with keeping maximum backwards compatibility.
Fixes #538
I ran the relevant acceptance tests based off a local build of the most recent Vault master: