-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VAULT-12226: Add Static Roles to the AWS plugin #20536
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM otherwise 🎉
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I reviewed and approve the docs changes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Great work @kpcraig !
This PR adds the ability for the aws engine to manage static roles, analogous to the way we do it in the various database plugins.
In this PR we provide two new endpoints at
<aws>/static-roles
and<aws>/static-creds
.At
static-roles/<name>
, we provide a read/write/delete set for specifying a new static role that points at an existing IAM User, which the aws engine will then adopt and manage. (I apologize for the slightly mismatched terminology here).At
static-creds/<name>
we provide a read route that will return the current aws credential for the managed user.Under the hood, we place newly created roles into a priority queue ordered by time left until rotation, and assign a backend
PeriodicFunc
to handle all roles past rotation time and requeue for the next rotation.