-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Support assuming an intermediate role when using the AWS-MSK-IAM SASL mechanism #67
base: master
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
-- hopefully @roman-ef can test #64 .
Yes, we're looking into this. Hopefully we'll get back to you by the end of this week. Sorry it's taking so long |
Hi @erikdw @yolken, I have done some tests using build from this branch and it appears that assume-role does not seem to work as expected as I get AWS Profile used in tests A) main-profile: one which should be able to assume role intended. Cluster Configs: A) cluster-config-with-assume-role.yaml: Cluster config which has
B) cluster-config-with-NO-assume-role.yaml: Cluster config which has NO Tests Test 1: ❌ Using AWS Profile = A, Custer Config = A, command get topics
(NOTE: Test # 2 is regression test and it works as expected)
Test 3: ❌ Using AWS Profile = A, Custer Config = B but with
Test 4: ❌ Using AWS Profile = A, Custer Config = B but with
Test 5: ❌ Using AWS Profile = A, Custer Config = B but with
Based on Test 4/5, it appears Please let us know if you need more information around tests. NB: I have XX/YY/ZZ the org specific stuff. |
@vijaya314, got it, so you'd like to be able to set the assume role on the command line even if using a config? I just made some updates to support this, let me know if they work for you. |
Hi @yolken. I wanted assume role to work either via config Or via command line. But I performed tests using both methods just in case either of method works. Today, I have pulled recent changes and run the same tests again.
Let me know if you need more details. Thank you. |
@vijaya314 @yolken I think the issue you've run into with the tests is similar to #110. Which seems to be an issue with how the AWS Session is created. Would you be able to confirm if passing the cluster region into the |
Description
This change updates the AWS-MSK-IAM SASL mechanism to optionally support assuming an intermediate role to get the MSK credentials. See #64 for more background and motivation.
The intermediate role ARN can be specified in the cluster config (by setting
assumeRole
in the SASL section) or, for subcommands that don't require a cluster config, on the command-line (by setting the--sasl-assume-role
flag).Testing
TBD