You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The AWS Secrets Manager component should work with fine grained authorization policies that allow for reading only a specific secret. This behaviour was present on Dapr 1.12.
Starting on Dapr 1.13, the policy above won't work anymore, requiring a "Resource": "*" to function correctly. This removes the fine-grained security control and fails in regression testing.
Steps to Reproduce the Problem
On Dapr 1.13+
Create an AWS Secrets manager resouce
Create a new secret
Create a policy with the information above, setting the resource to the secret ARN.
Create a new AWS Secrets Manager component in Dapr
Try to read the secret
See error:
FATA[0000] Fatal error from runtime: process component awssecretmanager error: [INIT_COMPONENT_FAILURE]: initialization error occurred for awssecretmanager (secretstores.aws.secretmanager/v1): [INIT_COMPONENT_FAILURE]: initialization error occurred for awssecretmanager (secretstores.aws.secretmanager/v1): error validating access to the aws.secretmanager secret store: AccessDeniedException: User: is not authorized to perform: secretsmanager:GetSecretValue on resource: because no identity-based policy allows the secretsmanager:GetSecretValue action
status code: 400, request id: app_id=go-secret instance=diagrid.local scope=dapr.runtime type=log ver=1.14.1
❌ The daprd process exited with error code: exit status 1
Release Note
RELEASE NOTE:
The text was updated successfully, but these errors were encountered:
In what area(s)?
/area runtime
What version of Dapr?
Expected Behavior
The AWS Secrets Manager component should work with fine grained authorization policies that allow for reading only a specific secret. This behaviour was present on Dapr 1.12.
Policy example:
Actual Behavior
Starting on Dapr 1.13, the policy above won't work anymore, requiring a "Resource": "*" to function correctly. This removes the fine-grained security control and fails in regression testing.
Steps to Reproduce the Problem
Release Note
RELEASE NOTE:
The text was updated successfully, but these errors were encountered: