Skip to content

Don't force the use of FIPS endpoints for DynamoDB Streams and Application Auto Scaling#34876

Merged
reedloden merged 1 commit intomasterfrom
reed/dynamodbstreams-fips-endpoint
Nov 29, 2023
Merged

Don't force the use of FIPS endpoints for DynamoDB Streams and Application Auto Scaling#34876
reedloden merged 1 commit intomasterfrom
reed/dynamodbstreams-fips-endpoint

Conversation

@reedloden
Copy link
Copy Markdown
Contributor

@reedloden reedloden commented Nov 22, 2023

DynamoDB Streams and Application Auto Scaling do not currently have FIPS endpoints in non-GovCloud, leading to invalid endpoints for FIPS users running in AWS Standard.

See also: https://aws.amazon.com/compliance/fips/#FIPS_Endpoints_by_Service

Regression from #34170.

Fixes #34804.

Additionally, clean-up a few more AWS session initiations to be consistent and clear.

changelog: Don't force the use of FIPS endpoints for DynamoDB Streams and Application Auto Scaling

@github-actions
Copy link
Copy Markdown
Contributor

The PR changelog entry failed validation: Changelog entry not found in the PR body. Please add a "no-changelog" label to the PR, or changelog lines starting with changelog: followed by the changelog entries for the PR.

@reedloden reedloden force-pushed the reed/dynamodbstreams-fips-endpoint branch 2 times, most recently from 65fd404 to 8aee840 Compare November 22, 2023 08:49
Copy link
Copy Markdown
Contributor

@rosstimothy rosstimothy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you please add some tests that validate the behavior change?

@GavinFrazar
Copy link
Copy Markdown
Contributor

LGTM but I didn't test it.

I think the same issue can happen with AWS Application Auto Scaling though, since it also does not have fips endpoints in non-gov cloud.

We use that here: https://github.com/gravitational/teleport/blob/8aee84029b670268d00c7227e49b24345e052117/lib/backend/dynamo/dynamodbbk.go#L348-L360

If you've already tested this could you try setting auto_scaling: true in your teleport.storage dynamodb config?

@reedloden reedloden force-pushed the reed/dynamodbstreams-fips-endpoint branch from 8aee840 to 4a50d18 Compare November 25, 2023 07:24
@reedloden
Copy link
Copy Markdown
Contributor Author

Could you please add some tests that validate the behavior change?

I flipped the logic so that we only force FIPS endpoints for the services we know support it (mainly DynamoDB in this case). This obliviated the need for extra complexity, so I don't think a separate test is needed.

@reedloden
Copy link
Copy Markdown
Contributor Author

I think the same issue can happen with AWS Application Auto Scaling though, since it also does not have fips endpoints in non-gov cloud.

Good catch. As mentioned above, I flipped the logic so that we're only forcing FIPS endpoints for DynamoDB in this case (and not DynamoDB Streams or Application Auto Scaling). So, that should address this issue.

@reedloden reedloden force-pushed the reed/dynamodbstreams-fips-endpoint branch 5 times, most recently from 94050d1 to e453ffa Compare November 25, 2023 07:50
@reedloden reedloden force-pushed the reed/dynamodbstreams-fips-endpoint branch 2 times, most recently from 738777a to 642665f Compare November 25, 2023 08:38
@reedloden reedloden changed the title Don't force the use of FIPS endpoints for DynamoDB Streams in AWS Standard regions Don't force the use of FIPS endpoints for DynamoDB Streams and Application Auto Scaling Nov 25, 2023
Copy link
Copy Markdown
Contributor

@rosstimothy rosstimothy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tests would still be useful to verify that we are using the correct endpoints to prevent regressions.

Comment thread lib/backend/dynamo/dynamodbbk.go Outdated
@reedloden reedloden force-pushed the reed/dynamodbstreams-fips-endpoint branch from 642665f to 970bca8 Compare November 27, 2023 22:14
…ation Auto Scaling

DynamoDB Streams and Application Auto Scaling do not currently have FIPS endpoints in
non-GovCloud, leading to invalid endpoints for FIPS users running in AWS Standard.

See also: https://aws.amazon.com/compliance/fips/#FIPS_Endpoints_by_Service

Regression from #34170.

Fixes #34804.

Additionally, clean-up a few more AWS session initiations to be consistent and clear.
@reedloden reedloden force-pushed the reed/dynamodbstreams-fips-endpoint branch from 970bca8 to 4a1017b Compare November 29, 2023 21:00
@reedloden reedloden enabled auto-merge November 29, 2023 21:01
@reedloden reedloden added this pull request to the merge queue Nov 29, 2023
Merged via the queue into master with commit 6cd68f0 Nov 29, 2023
@reedloden reedloden deleted the reed/dynamodbstreams-fips-endpoint branch November 29, 2023 21:44
@public-teleport-github-review-bot
Copy link
Copy Markdown

@reedloden See the table below for backport results.

Branch Result
branch/v14 Create PR

reedloden added a commit that referenced this pull request Nov 29, 2023
…Application Auto Scaling

Backport of #34876.

DynamoDB Streams and Application Auto Scaling do not currently have FIPS endpoints in
non-GovCloud, leading to invalid endpoints for FIPS users running in AWS Standard.

See also: https://aws.amazon.com/compliance/fips/#FIPS_Endpoints_by_Service

Regression from #34170.

Fixes #34804.

Additionally, clean-up a few more AWS session initiations to be consistent and clear.
reedloden added a commit that referenced this pull request Nov 29, 2023
…Application Auto Scaling

Backport of #34876.

DynamoDB Streams and Application Auto Scaling do not currently have FIPS endpoints in
non-GovCloud, leading to invalid endpoints for FIPS users running in AWS Standard.

See also: https://aws.amazon.com/compliance/fips/#FIPS_Endpoints_by_Service

Regression from #34170.

Fixes #34804.

Additionally, clean-up a few more AWS session initiations to be consistent and clear.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

aws Used for AWS Related Issues. backport-required size/sm

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Not able to use FIPS in AWS non-GovCloud

4 participants