-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: Wrong url for SSO refresh in Govcloud with fips #29350
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
Is there any workaround for this? |
I think this was mostly likely caused by the upgrade from aws-sdk-go-base from v2.0.0-beta-22 to v2.0.0-beta-23 |
It looks like this is a bug in upstream. But it isn't possible to work around, because any endpoint override for sso isn't applied to the credentials provider. It does look like the endpoints for iam and sts are though. So at least maybe pass the sso endpoint override through to the awsbase package for the credentials provider. |
This is an upstream AWS issue. Looking through the changes in hashicorp/aws-sdk-go-base (where credentials are handled) from v2.0.0-beta.22 (AWS provider v4.53.0) to v2.0.0-beta.23 (AWS provider v4.54.0), our changes were rather minor and I don't see anything that would cause or contribute to this FIPS problem except the changes in AWS package dependencies. In order of likelihood of being the problem, below are the changes in AWS packages we were using from beta.22 to beta.23.
|
From my memory when I investigated before, I think this was likely the source. |
There are a couple workarounds to try:
|
It is correct.
The problem is with the SSO endpoint. And setting that in the provider doesn't impact the credentials provider. |
It sounds like the upstream issue has been fixed: aws/aws-sdk-go-v2#2166 (comment) |
|
This functionality has been released in v5.21.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Terraform Core Version
1.3.6
AWS Provider Version
4.54.0
Affected Resource(s)
All. This error is with configuring the provider itself.
Expected Behavior
Terraform should be able to refresh the token when using a profile that uses AWS SSO.
Actual Behavior
Error when refreshing the token which results in not being able to
Relevant Error/Panic Output Snippet
Terraform Configuration Files
Steps to Reproduce
Run a plan, apply, refresh etc. with config like above, using an AWS profile that uses AWS IAM Identity Center (previously SSO)
Debug Output
No response
Panic Output
No response
Important Factoids
This appears to be a regression in version 4.54.0. I don't get this error in version 4.53.0.
References
Possibly related to #23619
Would you like to implement a fix?
None
The text was updated successfully, but these errors were encountered: