open-vault/builtin/logical/aws
Joel Thompson 0941c7a24a Make AWS credential types more explicit (#4360)
* Make AWS credential types more explicit

The AWS secret engine had a lot of confusing overloading with role
paramemters and how they mapped to each of the three credential types
supported. This now adds parameters to remove the overloading while
maintaining backwards compatibility.

With the change, it also becomes easier to add other feature requests.
Attaching multiple managed policies to IAM users and adding a policy
document to STS AssumedRole credentials is now also supported.

Fixes #4229
Fixes #3751
Fixes #2817

* Add missing write action to STS endpoint

* Allow unsetting policy_document with empty string

This allows unsetting the policy_document by passing in an empty string.
Previously, it would fail because the empty string isn't a valid JSON
document.

* Respond to some PR feedback

* Refactor and simplify role reading/upgrading

This gets rid of the duplicated role upgrade code between both role
reading and role writing by handling the upgrade all in the role
reading.

* Eliminate duplicated AWS secret test code

The testAccStepReadUser and testAccStepReadSTS were virtually identical,
so they are consolidated into a single method with the path passed in.

* Switch to use AWS ARN parser
2018-08-16 06:38:13 -04:00
..
backend.go Make AWS credential types more explicit (#4360) 2018-08-16 06:38:13 -04:00
backend_test.go Make AWS credential types more explicit (#4360) 2018-08-16 06:38:13 -04:00
client.go Errwrap everywhere (#4252) 2018-04-05 11:49:21 -04:00
path_config_lease.go Add context to storage backends and wire it through a lot of places (#3817) 2018-01-19 01:44:44 -05:00
path_config_root.go Spelling (#4119) 2018-03-20 14:54:10 -04:00
path_roles.go Make AWS credential types more explicit (#4360) 2018-08-16 06:38:13 -04:00
path_roles_test.go Make AWS credential types more explicit (#4360) 2018-08-16 06:38:13 -04:00
path_user.go Make AWS credential types more explicit (#4360) 2018-08-16 06:38:13 -04:00
rollback.go Don't run rollback and upgrade functionality if we are a replication secondary (#3900) 2018-02-02 20:28:25 -05:00
secret_access_keys.go Make AWS credential types more explicit (#4360) 2018-08-16 06:38:13 -04:00
secret_access_keys_test.go Allow use of pre-existing policies for AWS users 2015-12-30 18:05:54 +00:00