-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Add ssm:DescribeParameters
permission to external-secrets
IAM role for service account (IRSA)
#348
Conversation
ssm:DescribeParameters is required to sync secrets from ParameterStore
@antonbabenko or @bryantbiggs - Am I missing anything else to get this PR approved? |
ssm:DescribeParameters
permission to external-secrets
IAM role for service account (IRSA)
are you sure this will work or does it need to be a wildcard? aws-ia/terraform-aws-eks-blueprints#1504 |
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
seems safe enough to try as is since the ARNs are in the users control - thank you!
### [5.14.2](v5.14.1...v5.14.2) (2023-03-21) ### Bug Fixes * Add `ssm:DescribeParameters` permission to `external-secrets` IAM role for service account (IRSA) ([#348](#348)) ([fe8d73b](fe8d73b))
This PR is included in version 5.14.2 🎉 |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
ssm:DescribeParameters is required to sync secrets from ParameterStore
Description
Error from the external-secrets log:
aws-role is not authorized to perform: ssm:DescribeParameters on resource: * because no identity-based policy allows the ssm:DescribeParameters action\n\tstatus code: 400, request id: ff","stacktrace":"github.com/external-secrets/external-secrets/pkg/controllers/e │
Motivation and Context
When using AWS System Manager Parameters with external-secrets(ESO) the secrets can not be synced unless the AWS Role that is mapped to the EKS Service Account has the ssm:DescribeParameters action.
Breaking Changes
How Has This Been Tested?
"terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
pre-commit run -a
on my pull request