Does Vault KMS Seal support AWS_CONFIG_FILE and AWS_PROFILE env without providing AWS_SECRET_ACCESS_KEY and AWS_ACCESS_KEY_ID? I hope the AWS Client would assume the IAM role for me before fetching KMS key info.
I already set the AWS_CONFIG_FILE and AWS_PROFILE thinking that Vault would use the config file for the KMS credentials, but it still requires me to provide AWS_SECRET_ACCESS_KEY and AWS_ACCESS_KEY_ID in the environment.
Error parsing Seal configuration: error fetching AWS KMS wrapping key information: NoCredentialProviders: no valid providers in chain. Deprecated.
I’ve tried this with vault dev server as well as the production server.
./aws/config
[default]
aws_access_key_id = xxxx
aws_secret_access_key = xxxx
region = us-east-1
[profile vault-admin]
role_arn = xxxx
source_profile = default