feat(cli): add sts:TagSession permission to trusted accounts on bootstrap #762
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Accounts bootstrapped with
--trust
or--trust-for-lookup
needsts:TagSession
permissions in AssumeRolePolicy.I got errors during
cdk deploy
run in CD pipelines executed on EKS cluster on the trusted account.Error message:
Could not assume role in target account using current credentials (which are for account
<TRUSTED_ACCOUT>
) User:arn:aws:sts::<TRUSTED_ACCOUT>:assumed-role/<eks-pod-role>
is not authorized to perform:sts:TagSession
on resource:arn:aws:iam::<TARGET_ACCOUNT>:role/cdk-hnb659fds-lookup-role-<TARGET_ACCOUNT>-us-east-1
Troubleshooting revealed that DeploymentActionRole, FilePublishingRole, ImagePublishingRole, LookupRole don't have
sts:TagSession
. After updating AssumeRolePolicycdk deploy
worked normally.Fixes aws/aws-cdk#31557
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license