-
-
Notifications
You must be signed in to change notification settings - Fork 196
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add example to add iam policies to task role #68
Add example to add iam policies to task role #68
Conversation
Interesting. It does look like it's needed in the execution role and surprisingly not in the task role. |
/test all |
I'm torn about this since Secrets are things that usually have more access restrictions and having blanket access to the secret will not work with many ISO, CIS compliant companies. We output the roles and is easy enough to add this permission to it which in many cases is a to a few specific secrets. Maybe we can add examples on how to do this. |
Just a suggestion, but we could have a separate Resource section with the specific ARNs that should be allowed access. These would be inferred from the Secrets section of the task definition. I do not know how to do this programmatically, but I suspect it would be a foreach over each secret valueFrom like
Alternatively, pass a wildcard path for granting access as a variable.
|
that will work, it will give you the flexibility and only permission to the specific ARNs of the secrets. @EvilPlankton could you update your PR with that? |
I agree more with this statement than integrating this PR. It seems a lot easier and allows this module to be less rigid. If we can easily attach a role policy outside of the module, why would we bake it in here if we don't have to? |
I agree with @nitrocode and @jamengual - we should just use IAM policy attachments on the role outside of this module. |
Perhaps this example would help. Like @jamengual said, we could add this to the docs to make it more clear.
|
yes the example should more than enough for people to implement it, I will only suggest to add a Secret manager Example and Parameter Store example. |
@EvilPlankton do you want to have a stab at updating the docs? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
doc updates should suffice
@EvilPlankton ping |
Let us know if you're interested in taking this up @EvilPlankton and we'll re-open. |
what
Add permission to get SecretsManager values form exec task
why
Needed for Fargate to access SecretsManager when task is instantiated by service
references
should close #67