-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support complex permissions #91
Comments
I would rather these policies be a property of the type separate from the schema. The schema says, "I perform these particular IAM actions". When registering (or especially, when sharing a registered type among accounts), you could say, "only let this type operate within this permissions boundary". |
I would love it if each provider used the credentials of the caller (like "native" cloudformation) and scoped it down to the Intersection of those credentials and what's in the policy. The current approach has a multiple of downsides (role for each region/resource combination, it's different than native cloudformation, if users can update a provider they could rewrite it to extract credentials and escalate their privileges) |
+1. The intention with the handler permissions is to specify what set of permission grants it needs to operate. These are IAM actions and the permission block removes the art of guessing what they are to being easily viewable or programmatically enforceable. The admin can scope it down appropriately, via permission boundary or scope down STS/federation schemes for a given user or system. This provides clean separation of concerns between the parties involved. |
For what it's worth, one of our design proposals was similar to this - and this is exactly how AWS-owned resource types behave internally, but at this time, IAM doesn't (as far as I'm aware) provide an equivalent model whereby we could intersect permissions. Either the type gets some sort of 'execution role' (e.g; as a Lambda Function does), or the caller passes a role to assume (what we do with Resource Providers currently). This is definitely something to push for in the IAM space. |
@rjlohan You mean where you can intersect permissions without doing an assumeRole? There is support for scoping down by adding a policy (or policy-arn) there. |
Is there any progress on this? As far as I understand, custom resource providers that access AWS services constitute a security hole, because they can make API calls that the caller (i.e. the stack creator) doesn't have permission to make. For this reason I'd hope that Amazon would take this issue a little more seriously; especially if they have solved it for their own purposes internally (per rjlohan's comment above). |
Currently, the
permissions
model only supports action-based permissions with no additional scope. I propose the addition of a complex permissions set such as:Labels: enhancement
The text was updated successfully, but these errors were encountered: