Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS Auth Backend rotate-root not working #12214

Closed
danieldethloff1993 opened this issue Jul 30, 2021 · 4 comments
Closed

AWS Auth Backend rotate-root not working #12214

danieldethloff1993 opened this issue Jul 30, 2021 · 4 comments
Labels
auth/aws bug Used to indicate a potential bug ecosystem

Comments

@danieldethloff1993
Copy link

danieldethloff1993 commented Jul 30, 2021

Describe the bug
AWS Auth Backend rotate-root does not work, when previously configured the backend with static access_key and secret_key, the aws credentails were rotated but the new access_key and secret_key were not injected in the aws auth backend config.

To Reproduce
Steps to reproduce the behavior:

  1. Run vault auth enable aws
  2. Run vault write /auth/aws/config/client access_key=XXXXXXXXXXXXX secret_key=yyyyyyyyyyyyyyyy
  3. Run vault read auth/aws/config/client and notice the previously added access_key matches
  4. Run vault write -force /auth/aws/config/rotate-root and take a look to the access_key in the output
  5. Run vault read auth/aws/config/client and notice the access_key from rotate-root output doesn't match

Expected behavior
The Output from vault write -force /auth/aws/config/rotate-root and the access_key from vault read auth/aws/config/client after the rotation should match.

Environment:

  • Vault Server Version 1.7.2 (also tested 1.8.0)
  • Vault CLI Version 1.7.2 (also tested 1.8.0)
  • Server Operating System/Architecture: CentOS 7.9.2009
  • Client CLI OS: Ubuntu 18.04. Windows WSL

Vault server configuration file(s):

{
  "backend":
    {
     "consul":
       {
        "address":"<some-ip>:8500",
        "advertise_addr":"http://<server-ip>:8200",
        "path":"vault/"
       }
    },
  "listener":
    {
     "tcp":
      {
        "address":"0.0.0.0:8200",
        "tls_cert_file":"/vault/file/<cert.file>",
        "tls_key_file": "/vault/file/<key.file>",
      }
    },
    "ui": true,
    "telemetry": {
        "statsd_address": "<statsd_address>:<statsd-port>"
    }
}
@danieldethloff1993
Copy link
Author

Does nobody have an idea?

@pmmukh pmmukh added auth/aws bug Used to indicate a potential bug ecosystem labels Sep 1, 2021
@soeirosantos
Copy link

+1 I'm having the same problem here and the odd behavior is easily reproducible.

@hsimon-hashicorp
Copy link
Contributor

Hi folks! I've raised this with our engineering team, please hang tight while we review it. Appreciate your patience. :)

@Zlaticanin
Copy link
Contributor

Fixed with #12715 .

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auth/aws bug Used to indicate a potential bug ecosystem
Projects
None yet
Development

No branches or pull requests

5 participants