-
Notifications
You must be signed in to change notification settings - Fork 423
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lookup assumed role ARN with IAM API #144
Conversation
Previously, arn.Canonicalize assumed that the full IAM role ARN could be extracted from an assumed-role ARN. This is not the case for IAM roles with a path, in which case only the role name is encoded in the assumed-role ARN. This change uses the IAM API to determine the correct IAM role ARN for a given assuemd-role ARN.
/assign @nckturner |
Hey @nckturner are you able to take a look at this? Or is there someone else you would suggest to have review this PR? Thanks! |
@jpb Apologies, I have been out of the office for a bit. Taking a look! |
@jpb Quick update--I engaged some folks in the AWS security org to discuss the best way to handle paths in roles moving forward. I will keep this issue updated. I totally agree that the current behavior leaves something to be desired. The role ARN does have the path in it, whereas the assumed-role ARN does not. The current behavior basically forces you to construct an ARN for the role that does not include the path to put in your map. |
Holding based on nckturner's comment. /hold |
Thanks for following up @nckturner. If it helps, the documentation specifies that IAM roles include the path in their ARN ( |
Any progress on this PR, @nckturner any update about this from the AWS security folks? |
Can someone suggest me whats wrong with the following aws-auth configmap entry?
This role is associated with a policy, that is attached to a group, and no one from that group is able to access the cluster. |
@romil-punetha I guess this is due to #114. |
@alex-berger Im using |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: jpb If they are not already assigned, you can assign the PR to them by writing The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Previously,
arn.Canonicalize
assumed that the full IAM role ARN could be extracted from an assumed-role ARN. This is not the case for IAM roles with a path, in which case only the role name is encoded in the assumed-role ARN. This change uses the IAM API to determine the correct IAM role ARN for a given assumed-role ARN.The
aws
package was (initially) added to resolve circular dependencies betweenserver
andarn
, but it turns out more thanserver
needs use of the newly introducediamProvider
.ec2Provider
was moved to this package to keep things symmetrical.This is a potential proper fix for #98 / #103 (see #103 (comment))