CDK --role-arn parameter and suppling permission boundaries #20321
Closed
dguisinger
started this conversation in
General
Replies: 1 comment 2 replies
-
Duplicate-ish of #19715 and #21937 There is a customer article on a process similar to yours that may be of interest: https://medium.com/@imageryan/bootstrapping-aws-cdk-in-a-secure-environment-9bc778ea6d94 |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hey guys, I've had a frustrating few days getting acquainted with CDK. The organization I am working for isn't sold on CDK and my experience is not going to help.
I ran into two issues:
When I use this parameter, the CDK attempts to use the role but says it can't assume it. Yet when I go to the same command prompt and type "aws sts assume-role" using the same ARN, I get a valid set of credentials back.
I worked around it by adding a role profile to my .aws/config file which assumes the role. Its a work around, and we use a script to get our AWS credentials using our Active Directory accounts which timeout every 30 minutes - and that script overwrites our .aws/config and .aws/credential files. As you can imagine, having to maintain a profile in the config file after it gets wiped out every 30 minutes is just not useful to us.
I was able to work around it by using --show-template > template.yaml, manually editing all of the roles, and then running again with --template template.yaml....
But anytime we want to update our bootstrapped environment, we have to repeat this.
Is it just me or is this way too complicated? I can't sell my organization on using this if every time they go to use it they have to put in motion a whole series of kludges just to get it to run.....
Beta Was this translation helpful? Give feedback.
All reactions