Does Vault KMS Seal support AWS_CONFIG_FILE
and AWS_PROFILE
env without providing AWS_SECRET_ACCESS_KEY
and AWS_ACCESS_KEY_ID
? I hope the AWS Client would assume the IAM role for me before fetching KMS key info.
I already set the AWS_CONFIG_FILE
and AWS_PROFILE
thinking that Vault would use the config file for the KMS credentials, but it still requires me to provide AWS_SECRET_ACCESS_KEY
and AWS_ACCESS_KEY_ID
in the environment.
Error parsing Seal configuration: error fetching AWS KMS wrapping key information: NoCredentialProviders: no valid providers in chain. Deprecated.
I’ve tried this with vault dev server as well as the production server.
./aws/config
[default]
aws_access_key_id = xxxx
aws_secret_access_key = xxxx
region = us-east-1
[profile vault-admin]
role_arn = xxxx
source_profile = default