-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support assuming an intermediate role when using the AWS-MSK-IAM SASL mechanism #67
base: master
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
-- hopefully @roman-ef can test #64 .
Yes, we're looking into this. Hopefully we'll get back to you by the end of this week. Sorry it's taking so long |
Hi @erikdw @yolken, I have done some tests using build from this branch and it appears that assume-role does not seem to work as expected as I get AWS Profile used in tests A) main-profile: one which should be able to assume role intended. Cluster Configs: A) cluster-config-with-assume-role.yaml: Cluster config which has
B) cluster-config-with-NO-assume-role.yaml: Cluster config which has NO Tests Test 1: ❌ Using AWS Profile = A, Custer Config = A, command get topics
(NOTE: Test # 2 is regression test and it works as expected)
Test 3: ❌ Using AWS Profile = A, Custer Config = B but with
Test 4: ❌ Using AWS Profile = A, Custer Config = B but with
Test 5: ❌ Using AWS Profile = A, Custer Config = B but with
Based on Test 4/5, it appears Please let us know if you need more information around tests. NB: I have XX/YY/ZZ the org specific stuff. |
@vijaya314, got it, so you'd like to be able to set the assume role on the command line even if using a config? I just made some updates to support this, let me know if they work for you. |
Hi @yolken. I wanted assume role to work either via config Or via command line. But I performed tests using both methods just in case either of method works. Today, I have pulled recent changes and run the same tests again.
Let me know if you need more details. Thank you. |
@vijaya314 @yolken I think the issue you've run into with the tests is similar to #110. Which seems to be an issue with how the AWS Session is created. Would you be able to confirm if passing the cluster region into the |
Description
This change updates the AWS-MSK-IAM SASL mechanism to optionally support assuming an intermediate role to get the MSK credentials. See #64 for more background and motivation.
The intermediate role ARN can be specified in the cluster config (by setting
assumeRole
in the SASL section) or, for subcommands that don't require a cluster config, on the command-line (by setting the--sasl-assume-role
flag).Testing
TBD