mirror of https://github.com/kubernetes/kops.git
Merge pull request #9773 from victorfrancax1/7286
Adding support for permission boundaries for AWS IAM Roles
This commit is contained in:
commit
8a81d94c7b
|
@ -889,6 +889,8 @@ spec:
|
||||||
type: boolean
|
type: boolean
|
||||||
legacy:
|
legacy:
|
||||||
type: boolean
|
type: boolean
|
||||||
|
permissionsBoundary:
|
||||||
|
type: string
|
||||||
required:
|
required:
|
||||||
- legacy
|
- legacy
|
||||||
type: object
|
type: object
|
||||||
|
|
|
@ -252,8 +252,9 @@ type Assets struct {
|
||||||
// IAMSpec adds control over the IAM security policies applied to resources
|
// IAMSpec adds control over the IAM security policies applied to resources
|
||||||
type IAMSpec struct {
|
type IAMSpec struct {
|
||||||
// TODO: remove Legacy in next APIVersion
|
// TODO: remove Legacy in next APIVersion
|
||||||
Legacy bool `json:"legacy"`
|
Legacy bool `json:"legacy"`
|
||||||
AllowContainerRegistry bool `json:"allowContainerRegistry,omitempty"`
|
AllowContainerRegistry bool `json:"allowContainerRegistry,omitempty"`
|
||||||
|
PermissionsBoundary *string `json:"permissionsBoundary,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// HookSpec is a definition hook
|
// HookSpec is a definition hook
|
||||||
|
|
|
@ -249,8 +249,9 @@ type Assets struct {
|
||||||
|
|
||||||
// IAMSpec adds control over the IAM security policies applied to resources
|
// IAMSpec adds control over the IAM security policies applied to resources
|
||||||
type IAMSpec struct {
|
type IAMSpec struct {
|
||||||
Legacy bool `json:"legacy"`
|
Legacy bool `json:"legacy"`
|
||||||
AllowContainerRegistry bool `json:"allowContainerRegistry,omitempty"`
|
AllowContainerRegistry bool `json:"allowContainerRegistry,omitempty"`
|
||||||
|
PermissionsBoundary *string `json:"permissionsBoundary,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// HookSpec is a definition hook
|
// HookSpec is a definition hook
|
||||||
|
|
|
@ -3203,6 +3203,7 @@ func Convert_kops_IAMProfileSpec_To_v1alpha2_IAMProfileSpec(in *kops.IAMProfileS
|
||||||
func autoConvert_v1alpha2_IAMSpec_To_kops_IAMSpec(in *IAMSpec, out *kops.IAMSpec, s conversion.Scope) error {
|
func autoConvert_v1alpha2_IAMSpec_To_kops_IAMSpec(in *IAMSpec, out *kops.IAMSpec, s conversion.Scope) error {
|
||||||
out.Legacy = in.Legacy
|
out.Legacy = in.Legacy
|
||||||
out.AllowContainerRegistry = in.AllowContainerRegistry
|
out.AllowContainerRegistry = in.AllowContainerRegistry
|
||||||
|
out.PermissionsBoundary = in.PermissionsBoundary
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -3214,6 +3215,7 @@ func Convert_v1alpha2_IAMSpec_To_kops_IAMSpec(in *IAMSpec, out *kops.IAMSpec, s
|
||||||
func autoConvert_kops_IAMSpec_To_v1alpha2_IAMSpec(in *kops.IAMSpec, out *IAMSpec, s conversion.Scope) error {
|
func autoConvert_kops_IAMSpec_To_v1alpha2_IAMSpec(in *kops.IAMSpec, out *IAMSpec, s conversion.Scope) error {
|
||||||
out.Legacy = in.Legacy
|
out.Legacy = in.Legacy
|
||||||
out.AllowContainerRegistry = in.AllowContainerRegistry
|
out.AllowContainerRegistry = in.AllowContainerRegistry
|
||||||
|
out.PermissionsBoundary = in.PermissionsBoundary
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -836,7 +836,7 @@ func (in *ClusterSpec) DeepCopyInto(out *ClusterSpec) {
|
||||||
if in.IAM != nil {
|
if in.IAM != nil {
|
||||||
in, out := &in.IAM, &out.IAM
|
in, out := &in.IAM, &out.IAM
|
||||||
*out = new(IAMSpec)
|
*out = new(IAMSpec)
|
||||||
**out = **in
|
(*in).DeepCopyInto(*out)
|
||||||
}
|
}
|
||||||
if in.EncryptionConfig != nil {
|
if in.EncryptionConfig != nil {
|
||||||
in, out := &in.EncryptionConfig, &out.EncryptionConfig
|
in, out := &in.EncryptionConfig, &out.EncryptionConfig
|
||||||
|
@ -1581,6 +1581,11 @@ func (in *IAMProfileSpec) DeepCopy() *IAMProfileSpec {
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *IAMSpec) DeepCopyInto(out *IAMSpec) {
|
func (in *IAMSpec) DeepCopyInto(out *IAMSpec) {
|
||||||
*out = *in
|
*out = *in
|
||||||
|
if in.PermissionsBoundary != nil {
|
||||||
|
in, out := &in.PermissionsBoundary, &out.PermissionsBoundary
|
||||||
|
*out = new(string)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -936,7 +936,7 @@ func (in *ClusterSpec) DeepCopyInto(out *ClusterSpec) {
|
||||||
if in.IAM != nil {
|
if in.IAM != nil {
|
||||||
in, out := &in.IAM, &out.IAM
|
in, out := &in.IAM, &out.IAM
|
||||||
*out = new(IAMSpec)
|
*out = new(IAMSpec)
|
||||||
**out = **in
|
(*in).DeepCopyInto(*out)
|
||||||
}
|
}
|
||||||
if in.EncryptionConfig != nil {
|
if in.EncryptionConfig != nil {
|
||||||
in, out := &in.EncryptionConfig, &out.EncryptionConfig
|
in, out := &in.EncryptionConfig, &out.EncryptionConfig
|
||||||
|
@ -1747,6 +1747,11 @@ func (in *IAMProfileSpec) DeepCopy() *IAMProfileSpec {
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *IAMSpec) DeepCopyInto(out *IAMSpec) {
|
func (in *IAMSpec) DeepCopyInto(out *IAMSpec) {
|
||||||
*out = *in
|
*out = *in
|
||||||
|
if in.PermissionsBoundary != nil {
|
||||||
|
in, out := &in.PermissionsBoundary, &out.PermissionsBoundary
|
||||||
|
*out = new(string)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -110,6 +110,11 @@ func (b *IAMModelBuilder) buildIAMTasks(igRole kops.InstanceGroupRole, iamName s
|
||||||
RolePolicyDocument: fi.WrapResource(rolePolicy),
|
RolePolicyDocument: fi.WrapResource(rolePolicy),
|
||||||
ExportWithID: s(strings.ToLower(string(igRole)) + "s"),
|
ExportWithID: s(strings.ToLower(string(igRole)) + "s"),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if b.Cluster.Spec.IAM != nil && b.Cluster.Spec.IAM.PermissionsBoundary != nil {
|
||||||
|
iamRole.PermissionsBoundary = b.Cluster.Spec.IAM.PermissionsBoundary
|
||||||
|
}
|
||||||
|
|
||||||
c.AddTask(iamRole)
|
c.AddTask(iamRole)
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1363,7 +1363,8 @@
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"Version": "2012-10-17"
|
"Version": "2012-10-17"
|
||||||
}
|
},
|
||||||
|
"PermissionsBoundary": "arn:aws:iam:00000000000:policy/boundaries"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"AWSIAMRolenodescomplexexamplecom": {
|
"AWSIAMRolenodescomplexexamplecom": {
|
||||||
|
@ -1381,7 +1382,8 @@
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"Version": "2012-10-17"
|
"Version": "2012-10-17"
|
||||||
}
|
},
|
||||||
|
"PermissionsBoundary": "arn:aws:iam:00000000000:policy/boundaries"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"AWSRoute53RecordSetapicomplexexamplecom": {
|
"AWSRoute53RecordSetapicomplexexamplecom": {
|
||||||
|
|
|
@ -29,7 +29,8 @@ spec:
|
||||||
- instanceGroup: master-us-test-1a
|
- instanceGroup: master-us-test-1a
|
||||||
name: us-test-1a
|
name: us-test-1a
|
||||||
name: events
|
name: events
|
||||||
iam: {}
|
iam:
|
||||||
|
permissionsBoundary: arn:aws:iam:00000000000:policy/boundaries
|
||||||
kubeAPIServer:
|
kubeAPIServer:
|
||||||
serviceNodePortRange: 28000-32767
|
serviceNodePortRange: 28000-32767
|
||||||
auditWebhookBatchThrottleQps: 3.14
|
auditWebhookBatchThrottleQps: 3.14
|
||||||
|
|
|
@ -29,7 +29,8 @@ spec:
|
||||||
- instanceGroup: master-us-test-1a
|
- instanceGroup: master-us-test-1a
|
||||||
name: us-test-1a
|
name: us-test-1a
|
||||||
name: events
|
name: events
|
||||||
iam: {}
|
iam:
|
||||||
|
permissionsBoundary: arn:aws:iam:00000000000:policy/boundaries
|
||||||
kubeAPIServer:
|
kubeAPIServer:
|
||||||
serviceNodePortRange: 28000-32767
|
serviceNodePortRange: 28000-32767
|
||||||
auditWebhookBatchThrottleQps: 3.14
|
auditWebhookBatchThrottleQps: 3.14
|
||||||
|
|
|
@ -266,13 +266,15 @@ resource "aws_iam_role_policy" "nodes-complex-example-com" {
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "aws_iam_role" "masters-complex-example-com" {
|
resource "aws_iam_role" "masters-complex-example-com" {
|
||||||
assume_role_policy = file("${path.module}/data/aws_iam_role_masters.complex.example.com_policy")
|
assume_role_policy = file("${path.module}/data/aws_iam_role_masters.complex.example.com_policy")
|
||||||
name = "masters.complex.example.com"
|
name = "masters.complex.example.com"
|
||||||
|
permissions_boundary = "arn:aws:iam:00000000000:policy/boundaries"
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "aws_iam_role" "nodes-complex-example-com" {
|
resource "aws_iam_role" "nodes-complex-example-com" {
|
||||||
assume_role_policy = file("${path.module}/data/aws_iam_role_nodes.complex.example.com_policy")
|
assume_role_policy = file("${path.module}/data/aws_iam_role_nodes.complex.example.com_policy")
|
||||||
name = "nodes.complex.example.com"
|
name = "nodes.complex.example.com"
|
||||||
|
permissions_boundary = "arn:aws:iam:00000000000:policy/boundaries"
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "aws_internet_gateway" "complex-example-com" {
|
resource "aws_internet_gateway" "complex-example-com" {
|
||||||
|
|
|
@ -40,8 +40,9 @@ type IAMRole struct {
|
||||||
ID *string
|
ID *string
|
||||||
Lifecycle *fi.Lifecycle
|
Lifecycle *fi.Lifecycle
|
||||||
|
|
||||||
Name *string
|
Name *string
|
||||||
RolePolicyDocument *fi.ResourceHolder // "inline" IAM policy
|
RolePolicyDocument *fi.ResourceHolder // "inline" IAM policy
|
||||||
|
PermissionsBoundary *string
|
||||||
|
|
||||||
// ExportWithId will expose the name & ARN for reuse as part of a larger system. Only supported by terraform currently.
|
// ExportWithId will expose the name & ARN for reuse as part of a larger system. Only supported by terraform currently.
|
||||||
ExportWithID *string
|
ExportWithID *string
|
||||||
|
@ -72,6 +73,9 @@ func (e *IAMRole) Find(c *fi.Context) (*IAMRole, error) {
|
||||||
actual := &IAMRole{}
|
actual := &IAMRole{}
|
||||||
actual.ID = r.RoleId
|
actual.ID = r.RoleId
|
||||||
actual.Name = r.RoleName
|
actual.Name = r.RoleName
|
||||||
|
if r.PermissionsBoundary != nil {
|
||||||
|
actual.PermissionsBoundary = r.PermissionsBoundary.PermissionsBoundaryArn
|
||||||
|
}
|
||||||
if r.AssumeRolePolicyDocument != nil {
|
if r.AssumeRolePolicyDocument != nil {
|
||||||
// The AssumeRolePolicyDocument is URI encoded (?)
|
// The AssumeRolePolicyDocument is URI encoded (?)
|
||||||
actualPolicy := *r.AssumeRolePolicyDocument
|
actualPolicy := *r.AssumeRolePolicyDocument
|
||||||
|
@ -147,6 +151,10 @@ func (_ *IAMRole) RenderAWS(t *awsup.AWSAPITarget, a, e, changes *IAMRole) error
|
||||||
request.AssumeRolePolicyDocument = aws.String(policy)
|
request.AssumeRolePolicyDocument = aws.String(policy)
|
||||||
request.RoleName = e.Name
|
request.RoleName = e.Name
|
||||||
|
|
||||||
|
if e.PermissionsBoundary != nil {
|
||||||
|
request.PermissionsBoundary = e.PermissionsBoundary
|
||||||
|
}
|
||||||
|
|
||||||
response, err := t.Cloud.IAM().CreateRole(request)
|
response, err := t.Cloud.IAM().CreateRole(request)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("error creating IAMRole: %v", err)
|
return fmt.Errorf("error creating IAMRole: %v", err)
|
||||||
|
@ -183,6 +191,31 @@ func (_ *IAMRole) RenderAWS(t *awsup.AWSAPITarget, a, e, changes *IAMRole) error
|
||||||
return fmt.Errorf("error updating IAMRole: %v", err)
|
return fmt.Errorf("error updating IAMRole: %v", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if changes.PermissionsBoundary != nil {
|
||||||
|
klog.V(2).Infof("Updating IAMRole PermissionsBoundary %q", *e.Name)
|
||||||
|
|
||||||
|
var err error
|
||||||
|
|
||||||
|
if e.PermissionsBoundary == nil {
|
||||||
|
request := &iam.DeleteRolePermissionsBoundaryInput{}
|
||||||
|
request.RoleName = e.Name
|
||||||
|
|
||||||
|
_, err = t.Cloud.IAM().DeleteRolePermissionsBoundary(request)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error updating IAMRole: %v", err)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
request := &iam.PutRolePermissionsBoundaryInput{}
|
||||||
|
request.RoleName = e.Name
|
||||||
|
request.PermissionsBoundary = e.PermissionsBoundary
|
||||||
|
|
||||||
|
_, err = t.Cloud.IAM().PutRolePermissionsBoundary(request)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error updating IAMRole: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO: Should we use path as our tag?
|
// TODO: Should we use path as our tag?
|
||||||
|
@ -190,8 +223,9 @@ func (_ *IAMRole) RenderAWS(t *awsup.AWSAPITarget, a, e, changes *IAMRole) error
|
||||||
}
|
}
|
||||||
|
|
||||||
type terraformIAMRole struct {
|
type terraformIAMRole struct {
|
||||||
Name *string `json:"name" cty:"name"`
|
Name *string `json:"name" cty:"name"`
|
||||||
AssumeRolePolicy *terraform.Literal `json:"assume_role_policy" cty:"assume_role_policy"`
|
AssumeRolePolicy *terraform.Literal `json:"assume_role_policy" cty:"assume_role_policy"`
|
||||||
|
PermissionsBoundary *string `json:"permissions_boundary,omitempty" cty:"permissions_boundary"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (_ *IAMRole) RenderTerraform(t *terraform.TerraformTarget, a, e, changes *IAMRole) error {
|
func (_ *IAMRole) RenderTerraform(t *terraform.TerraformTarget, a, e, changes *IAMRole) error {
|
||||||
|
@ -205,6 +239,10 @@ func (_ *IAMRole) RenderTerraform(t *terraform.TerraformTarget, a, e, changes *I
|
||||||
AssumeRolePolicy: policy,
|
AssumeRolePolicy: policy,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if e.PermissionsBoundary != nil {
|
||||||
|
tf.PermissionsBoundary = e.PermissionsBoundary
|
||||||
|
}
|
||||||
|
|
||||||
if fi.StringValue(e.ExportWithID) != "" {
|
if fi.StringValue(e.ExportWithID) != "" {
|
||||||
t.AddOutputVariable(*e.ExportWithID+"_role_arn", terraform.LiteralProperty("aws_iam_role", *e.Name, "arn"))
|
t.AddOutputVariable(*e.ExportWithID+"_role_arn", terraform.LiteralProperty("aws_iam_role", *e.Name, "arn"))
|
||||||
t.AddOutputVariable(*e.ExportWithID+"_role_name", e.TerraformLink())
|
t.AddOutputVariable(*e.ExportWithID+"_role_name", e.TerraformLink())
|
||||||
|
@ -220,6 +258,7 @@ func (e *IAMRole) TerraformLink() *terraform.Literal {
|
||||||
type cloudformationIAMRole struct {
|
type cloudformationIAMRole struct {
|
||||||
RoleName *string `json:"RoleName"`
|
RoleName *string `json:"RoleName"`
|
||||||
AssumeRolePolicyDocument map[string]interface{}
|
AssumeRolePolicyDocument map[string]interface{}
|
||||||
|
PermissionsBoundary *string `json:"PermissionsBoundary,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (_ *IAMRole) RenderCloudformation(t *cloudformation.CloudformationTarget, a, e, changes *IAMRole) error {
|
func (_ *IAMRole) RenderCloudformation(t *cloudformation.CloudformationTarget, a, e, changes *IAMRole) error {
|
||||||
|
@ -239,6 +278,10 @@ func (_ *IAMRole) RenderCloudformation(t *cloudformation.CloudformationTarget, a
|
||||||
AssumeRolePolicyDocument: data,
|
AssumeRolePolicyDocument: data,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if e.PermissionsBoundary != nil {
|
||||||
|
cf.PermissionsBoundary = e.PermissionsBoundary
|
||||||
|
}
|
||||||
|
|
||||||
return t.RenderResource("AWS::IAM::Role", *e.Name, cf)
|
return t.RenderResource("AWS::IAM::Role", *e.Name, cf)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue