AWS auth for Vault Connect CA ignores "role" param #17887
Labels
theme/certificates
Related to creating, distributing, and rotating certificates in Consul
theme/consul-vault
Relating to Consul & Vault interactions
Overview of the Issue
When configuring Connect to use a Vault CA, with the AWS auth method - Consul does not pass the Vault role name in the login request when one is configured. By default, Vault falls back to the EC2 instance AWS IAM role name which will not exist.
Reproduction Steps
consul connect ca set-config -config-file ca.conf
Operating system and Environment details
Amazon Linux 2023, x86 running Consul 1.15.3+ent.
Log Fragments
The text was updated successfully, but these errors were encountered: