-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Error while using aws-secretsmanager with aws-java-sdk-sts #55
Comments
Hello, Did you manage to find a solution? I was thinking to download the library, add the sts dependency in the pom.xml, build it and then use (hoping that something will change). |
I've checked this library, it uses a pretty old version of aws as of now which doesn't support web identity token so even including sts module won't belp in this case. This needs an update to use compatible aws sdk version. As of now I've not found a solution for this. I'll be mostly using at sealed secrets for the time being. May also look into modifications needed in this code to support sts |
I added this dependency in my
and it worked for me. However, I get an exception the first time the application starts:
As a consequence the application restarts and then it works. |
So it's using the node's iam role instead of the service account injected into pod right. I didn't want the node to have dB access so decided to dropped it. Was running short of time so had to look into alternative approaches |
No, it is using the |
@ktzevelekidis you mentioned initially that it was picking nodes iam role can you clarify more. For me when I add sts module which supports it, the pod just throws a stack trace. It looked to me like circular dependency error but it never managed to work |
Maybe I confused you. So, let me explain. If the I hope it is more clear now! |
Thank you for opening this issue - we are looking into it. |
I'm getting the same error - when I use the |
still not working for service role? |
We have the same issue on EKS. |
This needs to be made clear and more visible. Thanks for the solution. |
For those of you facing issues, could you tell me
We're going to document this to make it clearer how to ensure you are using the correct role for calls to Secrets Manager in this library. The behavior described in the issue seems consistent with other AWS APIs and libraries. Please let us know if you find discrepancies that suggest otherwise. |
Hey @simonmarty, I'm running into this issue too. Meaning: When I do NOT include sts dependecy, it tries to use the IAM role of the node. When I do include the 2.x version of the sts dependecy I get the following error message:
You mentioned
However, I do see inconsistent behaviour. As, with the sts library v2 I was able to use the
However, the |
Apparently I mixed to different version of the sts library. There is You can see the dependencies I used to get it working for both the (1)
|
You can't use the V1 version of the AWS SDK STS library ('com.amazonaws`) with version 2 of the JDBC caching library, and vice versa. It's worth nothing that the Java SDK changed classpaths when moving from V1( If you want to use the V2 SDK, make sure to add version 2 of this library to your project file, and vice versa. |
Hi,
I'm working to deploy spring boot applicaiton with aws-secretsmanager-jdbc integrated. It works fine with the the usual flow where I set AWS_ACCESS_KEY_ID and and VALUE in env variable. when i'm trying to deploy the app in eks, ive created a service role with access to a particular secret, and included aws-java-sdk-sts to assume the role which is injected in the pod.
when i'm not adding the sdk-sts to pom, it tries to assume the role of the managed nodes, which doesn't have access to secrets. whenever I add the above library, it is able to assume the proper role but gives the below stack trace.
The text was updated successfully, but these errors were encountered: