We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Have a question? Please checkout our Slack Community or visit our Slack Archive.
AWS IAM user created when user_enabled is set to true should have access to the AWS SSM path '/system_user/$USER/*
user_enabled
true
One should be able to retrieve any parameters using the following command:
VALUE=$(aws ssm get-parameters --names /system_user/$USER/$PARAMETER --with-decryption --query Parameters[0].Value | sed -e 's/^"//' -e 's/"$//' )
Or read credentials using the following commands:
AK=$(aws ssm get-parameters --names /system_user/$USER/access_key_id --with-decryption --query Parameters[0].Value | sed -e 's/^"//' -e 's/"$//' ) SK=$(aws ssm get-parameters --names /system_user/$USER/secret_access_key --with-decryption --query Parameters[0].Value | sed -e 's/^"//' -e 's/"$//' )
Useful for example to implement credential rotation or read any other parameters stored under the path, such as environment variable definitions.
Add an additional policy to the user created, allowing it to read the SSM path under which the credentials are created.
Creating a specific SSM policy and attach it to the user, but it's overall automation gets more complex.
None
The text was updated successfully, but these errors were encountered:
Is this already completed by PR
terraform-aws-s3-bucket/main.tf
Line 347 in 424de84
Lines 356 to 357 in 424de84
Sorry, something went wrong.
No branches or pull requests
Have a question? Please checkout our Slack Community or visit our Slack Archive.
Describe the Feature
AWS IAM user created when
user_enabled
is set totrue
should have access to the AWS SSM path '/system_user/$USER/*Expected Behavior
One should be able to retrieve any parameters using the following command:
VALUE=$(aws ssm get-parameters --names /system_user/$USER/$PARAMETER --with-decryption --query Parameters[0].Value | sed -e 's/^"//' -e 's/"$//' )
Or read credentials using the following commands:
Use Case
Useful for example to implement credential rotation or read any other parameters stored under the path, such as environment variable definitions.
Describe Ideal Solution
Add an additional policy to the user created, allowing it to read the SSM path under which the credentials are created.
Alternatives Considered
Creating a specific SSM policy and attach it to the user, but it's overall automation gets more complex.
Additional Context
None
The text was updated successfully, but these errors were encountered: