Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Authenticate to AWS with dedicated role without AssumeRole permissions #656

Merged
merged 3 commits into from
Mar 16, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 16 additions & 8 deletions pkg/scalers/aws_cloudwatch_scaler.go
Original file line number Diff line number Diff line change
Expand Up @@ -199,16 +199,24 @@ func (c *awsCloudwatchScaler) GetCloudwatchMetrics() (float64, error) {
sess := session.Must(session.NewSession(&aws.Config{
Region: aws.String(c.metadata.awsRegion),
}))
creds := credentials.NewStaticCredentials(c.metadata.awsAuthorization.awsAccessKeyID, c.metadata.awsAuthorization.awsSecretAccessKey, "")

if c.metadata.awsAuthorization.awsRoleArn != "" {
creds = stscreds.NewCredentials(sess, c.metadata.awsAuthorization.awsRoleArn)
}
var cloudwatchClient *cloudwatch.CloudWatch
if c.metadata.awsAuthorization.podIdentityOwner {
creds := credentials.NewStaticCredentials(c.metadata.awsAuthorization.awsAccessKeyID, c.metadata.awsAuthorization.awsSecretAccessKey, "")

if c.metadata.awsAuthorization.awsRoleArn != "" {
creds = stscreds.NewCredentials(sess, c.metadata.awsAuthorization.awsRoleArn)
}

cloudwatchClient := cloudwatch.New(sess, &aws.Config{
Region: aws.String(c.metadata.awsRegion),
Credentials: creds,
})
cloudwatchClient = cloudwatch.New(sess, &aws.Config{
Region: aws.String(c.metadata.awsRegion),
Credentials: creds,
})
} else {
cloudwatchClient = cloudwatch.New(sess, &aws.Config{
Region: aws.String(c.metadata.awsRegion),
})
}

input := cloudwatch.GetMetricDataInput{
StartTime: aws.Time(time.Now().Add(time.Second * -1 * time.Duration(c.metadata.metricCollectionTime))),
Expand Down
15 changes: 15 additions & 0 deletions pkg/scalers/aws_cloudwatch_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -144,6 +144,21 @@ var testAWSCloudwatchMetadata = []parseAWSCloudwatchMetadataTestData{
},
false,
"with AWS Role from TriggerAuthentication"},
{map[string]string{
"namespace": "AWS/SQS",
"dimensionName": "QueueName",
"dimensionValue": "keda",
"metricName": "ApproximateNumberOfMessagesVisible",
"targetMetricValue": "2",
"minMetricValue": "0",
"metricCollectionTime": "300",
"metricStat": "Average",
"metricStatPeriod": "300",
"awsRegion": "eu-west-1",
"identityOwner": "operator"},
map[string]string{},
false,
"with AWS Role assigned on KEDA operator itself"},
}

func TestCloudwatchParseMetadata(t *testing.T) {
Expand Down
57 changes: 32 additions & 25 deletions pkg/scalers/aws_iam_authorization.go
Original file line number Diff line number Diff line change
Expand Up @@ -14,37 +14,44 @@ type awsAuthorizationMetadata struct {
awsAccessKeyID string
awsSecretAccessKey string
awsSessionToken string

podIdentityOwner bool
}

func getAwsAuthorization(authParams, metadata, resolvedEnv map[string]string) (awsAuthorizationMetadata, error) {
meta := awsAuthorizationMetadata{}

if authParams["awsRoleArn"] != "" {
meta.awsRoleArn = authParams["awsRoleArn"]
} else if (authParams["awsAccessKeyID"] != "" || authParams["awsAccessKeyId"] != "") && authParams["awsSecretAccessKey"] != "" {
meta.awsAccessKeyID = authParams["awsAccessKeyID"]
if meta.awsAccessKeyID == "" {
meta.awsAccessKeyID = authParams["awsAccessKeyId"]
}
meta.awsSecretAccessKey = authParams["awsSecretAccessKey"]
} else {
var keyName string
if keyName = metadata["awsAccessKeyID"]; keyName == "" {
keyName = awsAccessKeyIDEnvVar
}
if val, ok := resolvedEnv[keyName]; ok && val != "" {
meta.awsAccessKeyID = val
} else {
return meta, fmt.Errorf("'%s' doesn't exist in the deployment environment", keyName)
}

if keyName = metadata["awsSecretAccessKey"]; keyName == "" {
keyName = awsSecretAccessKeyEnvVar
}
if val, ok := resolvedEnv[keyName]; ok && val != "" {
meta.awsSecretAccessKey = val
if metadata["identityOwner"] == "operator" {
meta.podIdentityOwner = false
} else if metadata["identityOwner"] == "" || metadata["identityOwner"] == "pod" {
meta.podIdentityOwner = true
if authParams["awsRoleArn"] != "" {
meta.awsRoleArn = authParams["awsRoleArn"]
} else if (authParams["awsAccessKeyID"] != "" || authParams["awsAccessKeyId"] != "") && authParams["awsSecretAccessKey"] != "" {
meta.awsAccessKeyID = authParams["awsAccessKeyID"]
if meta.awsAccessKeyID == "" {
meta.awsAccessKeyID = authParams["awsAccessKeyId"]
}
meta.awsSecretAccessKey = authParams["awsSecretAccessKey"]
} else {
return meta, fmt.Errorf("'%s' doesn't exist in the deployment environment", keyName)
var keyName string
if keyName = metadata["awsAccessKeyID"]; keyName == "" {
keyName = awsAccessKeyIDEnvVar
}
if val, ok := resolvedEnv[keyName]; ok && val != "" {
meta.awsAccessKeyID = val
} else {
return meta, fmt.Errorf("'%s' doesn't exist in the deployment environment", keyName)
}

if keyName = metadata["awsSecretAccessKey"]; keyName == "" {
keyName = awsSecretAccessKeyEnvVar
}
if val, ok := resolvedEnv[keyName]; ok && val != "" {
meta.awsSecretAccessKey = val
} else {
return meta, fmt.Errorf("'%s' doesn't exist in the deployment environment", keyName)
}
}
}

Expand Down
24 changes: 16 additions & 8 deletions pkg/scalers/aws_kinesis_stream_scaler.go
Original file line number Diff line number Diff line change
Expand Up @@ -135,16 +135,24 @@ func (s *awsKinesisStreamScaler) GetAwsKinesisOpenShardCount() (int64, error) {
sess := session.Must(session.NewSession(&aws.Config{
Region: aws.String(s.metadata.awsRegion),
}))
creds := credentials.NewStaticCredentials(s.metadata.awsAuthorization.awsAccessKeyID, s.metadata.awsAuthorization.awsSecretAccessKey, "")

if s.metadata.awsAuthorization.awsRoleArn != "" {
creds = stscreds.NewCredentials(sess, s.metadata.awsAuthorization.awsRoleArn)
}
var kinesisClinent *kinesis.Kinesis
if s.metadata.awsAuthorization.podIdentityOwner {
creds := credentials.NewStaticCredentials(s.metadata.awsAuthorization.awsAccessKeyID, s.metadata.awsAuthorization.awsSecretAccessKey, "")

if s.metadata.awsAuthorization.awsRoleArn != "" {
creds = stscreds.NewCredentials(sess, s.metadata.awsAuthorization.awsRoleArn)
}

kinesisClinent := kinesis.New(sess, &aws.Config{
Region: aws.String(s.metadata.awsRegion),
Credentials: creds,
})
kinesisClinent = kinesis.New(sess, &aws.Config{
Region: aws.String(s.metadata.awsRegion),
Credentials: creds,
})
} else {
kinesisClinent = kinesis.New(sess, &aws.Config{
Region: aws.String(s.metadata.awsRegion),
})
}

output, err := kinesisClinent.DescribeStreamSummary(input)
if err != nil {
Expand Down
22 changes: 21 additions & 1 deletion pkg/scalers/aws_kinesis_stream_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@ var testAWSKinesisMetadata = []parseAWSKinesisMetadataTestData{
awsAuthorization: awsAuthorizationMetadata{
awsAccessKeyID: testAWSKinesisAccessKeyID,
awsSecretAccessKey: testAWSKinesisSecretAccessKey,
podIdentityOwner: true,
},
},
isError: false,
Expand Down Expand Up @@ -86,6 +87,7 @@ var testAWSKinesisMetadata = []parseAWSKinesisMetadataTestData{
awsAuthorization: awsAuthorizationMetadata{
awsAccessKeyID: testAWSKinesisAccessKeyID,
awsSecretAccessKey: testAWSKinesisSecretAccessKey,
podIdentityOwner: true,
},
},
isError: false,
Expand All @@ -103,6 +105,7 @@ var testAWSKinesisMetadata = []parseAWSKinesisMetadataTestData{
awsAuthorization: awsAuthorizationMetadata{
awsAccessKeyID: testAWSKinesisAccessKeyID,
awsSecretAccessKey: testAWSKinesisSecretAccessKey,
podIdentityOwner: true,
},
},
isError: false,
Expand Down Expand Up @@ -143,11 +146,28 @@ var testAWSKinesisMetadata = []parseAWSKinesisMetadataTestData{
streamName: testAWSKinesisStreamName,
awsRegion: testAWSRegion,
awsAuthorization: awsAuthorizationMetadata{
awsRoleArn: testAWSKinesisRoleArn,
awsRoleArn: testAWSKinesisRoleArn,
podIdentityOwner: true,
},
},
isError: false,
comment: "with AWS Role from TriggerAuthentication"},
{metadata: map[string]string{
"streamName": testAWSKinesisStreamName,
"shardCount": "2",
"awsRegion": testAWSRegion,
"identityOwner": "operator"},
authParams: map[string]string{},
expected: &awsKinesisStreamMetadata{
targetShardCount: 2,
streamName: testAWSKinesisStreamName,
awsRegion: testAWSRegion,
awsAuthorization: awsAuthorizationMetadata{
podIdentityOwner: false,
},
},
isError: false,
comment: "with AWS Role assigned on KEDA operator itself"},
}

func TestKinesisParseMetadata(t *testing.T) {
Expand Down
24 changes: 16 additions & 8 deletions pkg/scalers/aws_sqs_queue_scaler.go
Original file line number Diff line number Diff line change
Expand Up @@ -152,16 +152,24 @@ func (s *awsSqsQueueScaler) GetAwsSqsQueueLength() (int32, error) {
sess := session.Must(session.NewSession(&aws.Config{
Region: aws.String(s.metadata.awsRegion),
}))
creds := credentials.NewStaticCredentials(s.metadata.awsAuthorization.awsAccessKeyID, s.metadata.awsAuthorization.awsSecretAccessKey, "")

if s.metadata.awsAuthorization.awsRoleArn != "" {
creds = stscreds.NewCredentials(sess, s.metadata.awsAuthorization.awsRoleArn)
}
var sqsClient *sqs.SQS
if s.metadata.awsAuthorization.podIdentityOwner {
creds := credentials.NewStaticCredentials(s.metadata.awsAuthorization.awsAccessKeyID, s.metadata.awsAuthorization.awsSecretAccessKey, "")

if s.metadata.awsAuthorization.awsRoleArn != "" {
creds = stscreds.NewCredentials(sess, s.metadata.awsAuthorization.awsRoleArn)
}

sqsClient := sqs.New(sess, &aws.Config{
Region: aws.String(s.metadata.awsRegion),
Credentials: creds,
})
sqsClient = sqs.New(sess, &aws.Config{
Region: aws.String(s.metadata.awsRegion),
Credentials: creds,
})
} else {
sqsClient = sqs.New(sess, &aws.Config{
Region: aws.String(s.metadata.awsRegion),
})
}

output, err := sqsClient.GetQueueAttributes(input)
if err != nil {
Expand Down
11 changes: 11 additions & 0 deletions pkg/scalers/aws_sqs_queue_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -117,6 +117,17 @@ var testAWSSQSMetadata = []parseAWSSQSMetadataTestData{
},
false,
"with AWS Role from TriggerAuthentication"},
{map[string]string{
"queueURL": testAWSSQSProperQueueURL,
"queueLength": "1",
"awsRegion": "eu-west-1",
"identityOwner": "operator"},
map[string]string{
"awsAccessKeyId": "",
"awsSecretAccessKey": "",
},
false,
"with AWS Role assigned on KEDA operator itself"},
}

func TestSQSParseMetadata(t *testing.T) {
Expand Down