-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPBUGS-19757: bump controller iam policy to v2.4.7 #114
Conversation
@alebedev87: This pull request references Jira Issue OCPBUGS-19757, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/test e2e-aws-rosa-operator |
/jira refresh |
@alebedev87: This pull request references Jira Issue OCPBUGS-19757, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@alebedev87: This pull request references Jira Issue OCPBUGS-19757, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/test e2e-aws-operator |
/test e2e-aws-proxy-operator |
df27c7d
to
738b1c0
Compare
/assign @thejasn |
/lgtm |
738b1c0
to
5bd86f4
Compare
5bd86f4
to
dea608f
Compare
/test e2e-aws-rosa-operator |
@alebedev87: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
/lgtm |
go fmt -mod=vendor $(IAMCTL_OUTPUT_DIR)/$(IAMCTL_OUTPUT_FILE) | ||
go vet -mod=vendor $(IAMCTL_OUTPUT_DIR)/$(IAMCTL_OUTPUT_FILE) | ||
# generate controller's IAM policy without minify. | ||
@# This policy is for STS clusters as it's turned into a role policy which is limited to 10240 by AWS. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Okay, so if I understand this correctly, you could minify for STS clusters as well, but by not minifying, you help expose issues with the non-minified IAM Policy, of which QE uses to install clusters and is documented Option 2. Using the AWS CLI
in install.md
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, exactly.
I just had a clarifying question, but thanks for the very detailed description. It took me couple of re-reads, but I think I understand your motivation. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: gcs278 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@alebedev87: Jira Issue OCPBUGS-19757: All pull requests linked via external trackers have merged: Jira Issue OCPBUGS-19757 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Context
AWS changed the required permissions to create a LB target group: upstream issue describing the change.
Why didn't we catch this in CI?
The problem started to be visible after AWS CLI commands were published. With these commands the upstream IAM policy started to be used instead of the generated controller's credentials request. The difference between the two is that the latter is minified to meet the AWS limit for inline policies. The minified CredentialsRequest has a broader set of permissions and since it's used in the CI to create the controller's role we never saw the missing permissions.
Changes
The main change is a bump of the upstream IAM policy (
assets
directory). However to catch similar problems in the future we need to have the controller's CredentialsRequest to be the same as the upstream's IAM policy. For this we need to stop minifying. This in turn requires significant changes iniamctl
binary to be able to support:CredentialsRequest
's resource field is not a slice (-s
flag added)-f
flag)Result
The IAM policy is bumped enabling the users of AWS CLI command to use the right set of permissions for the controller's role. The controller's
CredentialsRequest
is not minified anymore so that the role created in ROSA e2e usingccoctl
is as similar as possible to the upstream.Note
The IAM policy generated for non-STS clusters must still be minified as the AWS limit is still there. A new IAM policy for STS will be added in this PR to be used in case the STS role is given to the controller.