From 619c3c9c74e54c58891b2d9bfeae68fb7886f3ba Mon Sep 17 00:00:00 2001 From: Pankaj Date: Sun, 21 Apr 2024 13:35:33 +0530 Subject: [PATCH] Add docs --- .../secrets-backends/hashicorp-vault.rst | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/docs/apache-airflow-providers-hashicorp/secrets-backends/hashicorp-vault.rst b/docs/apache-airflow-providers-hashicorp/secrets-backends/hashicorp-vault.rst index f5b8d4e9be47de..c0006099c77a26 100644 --- a/docs/apache-airflow-providers-hashicorp/secrets-backends/hashicorp-vault.rst +++ b/docs/apache-airflow-providers-hashicorp/secrets-backends/hashicorp-vault.rst @@ -217,6 +217,18 @@ Add "verify": "absolute path to ca-certificate file" backend = airflow.providers.hashicorp.secrets.vault.VaultBackend backend_kwargs = {"connections_path": "airflow-connections", "variables_path": null, "mount_point": "airflow", "url": "http://127.0.0.1:8200", "verify": "/etc/ssl/certs/ca-certificates"} +Vault authentication with AWS Assume Role STS +"""""""""""""""""""""""""""""""""""""""""""" + +Add parameter "arn_role": "The AWS ARN of the role to assume" + +.. code-block:: ini + + [secrets] + backend = airflow.providers.hashicorp.secrets.vault.VaultBackend + backend_kwargs = {"connections_path": "airflow-connections", "variables_path": null, "mount_point": "airflow", "url": "http://127.0.0.1:8200", "auth_type": "aws_iam", "arn_role": "arn:aws:iam::123456789000:role/hashicorp-aws-iam-role"} + + Using multiple mount points """""""""""""""""""""""""""