CDK --role-arn parameter and suppling permission boundaries #20321
Closed
dguisinger
started this conversation in
General
Replies: 1 comment 2 replies
-
Duplicate-ish of #19715 and #21937 There is a customer article on a process similar to yours that may be of interest: https://medium.com/@imageryan/bootstrapping-aws-cdk-in-a-secure-environment-9bc778ea6d94 |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hey guys, I've had a frustrating few days getting acquainted with CDK. The organization I am working for isn't sold on CDK and my experience is not going to help.
I ran into two issues:
When I use this parameter, the CDK attempts to use the role but says it can't assume it. Yet when I go to the same command prompt and type "aws sts assume-role" using the same ARN, I get a valid set of credentials back.
I worked around it by adding a role profile to my .aws/config file which assumes the role. Its a work around, and we use a script to get our AWS credentials using our Active Directory accounts which timeout every 30 minutes - and that script overwrites our .aws/config and .aws/credential files. As you can imagine, having to maintain a profile in the config file after it gets wiped out every 30 minutes is just not useful to us.
I was able to work around it by using --show-template > template.yaml, manually editing all of the roles, and then running again with --template template.yaml....
But anytime we want to update our bootstrapped environment, we have to repeat this.
Is it just me or is this way too complicated? I can't sell my organization on using this if every time they go to use it they have to put in motion a whole series of kludges just to get it to run.....
Beta Was this translation helpful? Give feedback.
All reactions