Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Analyze possibility of cross-account messaging #1654

Closed
DavidBoike opened this issue Oct 11, 2022 · 3 comments
Closed

Analyze possibility of cross-account messaging #1654

DavidBoike opened this issue Oct 11, 2022 · 3 comments

Comments

@DavidBoike
Copy link
Member

DavidBoike commented Oct 11, 2022

If two teams in the same organization had two accounts, it would be impossible for the SQS transport to send messages from one account to the other without using the transport bridge. It would be interesting to analyze if it would be possible and beneficial for the transport to offer this directly.

Where queues are currently just a name, I would imagine that the transport would need to be smart enough to recognize the difference between just a name, which must be a local queue, and something like a full queue ARN that would allow sending to a different account if IAM permissions were set appropriately.

I would also imagine headers would have to be added or modified so that reply messages could be properly routed, and so that failed messages processed by a centralized ServiceControl instance could be replayed to the correct account as well.

Analysis would also need to include whether there are security risks inherent in transmitting a full queue ARN which includes information like the account number, and what could be done to mitigate those risks.

@danielmarbach
Copy link
Contributor

In theory when the bridge would be allowed to be hosted as part of the endpoint as mentioned in Particular/NServiceBus.MessagingBridge#118 the transport wouldn't have to be extended with this capability.

@danielmarbach
Copy link
Contributor

FYI this issue is also related #433

@mauroservienti
Copy link
Member

Closed in favor of #2365

@mauroservienti mauroservienti closed this as not planned Won't fix, can't repro, duplicate, stale Nov 27, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants