Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Please document how to serve real credentials in the mocked data #184

Closed
joshtriplett opened this issue Jul 14, 2022 · 11 comments
Closed

Please document how to serve real credentials in the mocked data #184

joshtriplett opened this issue Jul 14, 2022 · 11 comments
Labels
enhancement New feature or request stale Issues / PRs with no activity

Comments

@joshtriplett
Copy link

For the purposes of testing an application relying on the IMDS metadata service, I'd like to be able to serve valid AWS credentials via the mocked IMDS.

I'd love to have documentation for how to translate ~/.aws/credentials into the relevant pieces of the mock configuration, or better yet, an option to serve up a particular profile from those credentials as the mocked data.

@joshtriplett joshtriplett added the enhancement New feature or request label Jul 14, 2022
@slimm609
Copy link

slimm609 commented Jul 15, 2022

@joshtriplett I actually have a blog post about to be published doing exactly this with real credentials and responds the same way as an ec2 instance (all the SDKs pick it up as native instance profile). I am putting the finishing touches on it and should have it done in the next day or so.

Edit: finished it up and published it showing how to do this

https://medium.com/@slimm609/aws-instance-profile-for-local-development-f144b0a7b8b9

@joshtriplett
Copy link
Author

@slimm609 That sounds great! Thank you.

@brycahta
Copy link
Contributor

brycahta commented Aug 9, 2022

@slimm609 That's a great use case! Would you be open to adding to our Community Use Cases section with the content? Or would you mind if someone from our team added a section if you don't have bandwidth?

In either case, we would attribute you for the content, but I'm reluctant to simply link the blog post because of the overhead for our team to maintain the integrity of said links.

@github-actions
Copy link

github-actions bot commented Sep 9, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. If you want this issue to never become stale, please ask a maintainer to apply the "stalebot-ignore" label.

@github-actions github-actions bot added the stale Issues / PRs with no activity label Sep 9, 2022
@joshtriplett
Copy link
Author

Still here, still interested.

@github-actions github-actions bot removed the stale Issues / PRs with no activity label Sep 10, 2022
@github-actions
Copy link

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. If you want this issue to never become stale, please ask a maintainer to apply the "stalebot-ignore" label.

@github-actions github-actions bot added the stale Issues / PRs with no activity label Oct 10, 2022
@github-actions
Copy link

This issue was closed because it has become stale with no activity.

@jweyrich
Copy link

jweyrich commented Nov 10, 2022

Speaking on behalf of the company I work for, we're very interested in this too. We use ecs-local-container-endpoints and the aws-sdk-v2 (node) works fine when using the IMDS service from the following projects:

However, aws-sdk-v3 (node) does not seem to work. The default chain never finds a valid credential from the 2 services above.
We need to inject a real temporary credential for the applications running in our containers to work locally and be debuggable. If we cannot get a real/valid credential, we'd need to mock all services using localstack - not an option currently, since it would require seeding those services with tons of data (s3 with files, dynamodb with tables, and so on).

Our security policies do not allow us to pass AWS_ACCESS_KEY_ID+AWS_SECRET_ACCESS_KEY to our containers.

This is our docker-compose.override.yml:

# Original source from: https://aws.amazon.com/blogs/compute/a-guide-to-locally-testing-containers-with-amazon-ecs-local-endpoints-and-docker-compose/
version: "2.1"
networks:
    default:
        driver: bridge
        ipam:
            driver: default
    credentials_network:
        driver: bridge
        ipam:
            config:
                - subnet: "169.254.170.0/24"
                  gateway: 169.254.170.1
services:
    ecs-local-endpoints:
        image: amazon/amazon-ecs-local-container-endpoints
        volumes:
          - /var/run:/var/run
        env_file:
          - .env
        environment:
          AWS_EC2_METADATA_SERVICE_ENDPOINT: http://host.docker.internal:8081/
          AWS_PROFILE: ${AWS_PROFILE}
        networks:
            credentials_network:
                # This special IP address is recognized by the AWS SDKs and AWS CLI
                ipv4_address: "169.254.170.2"

    app:
        depends_on:
            - ecs-local-endpoints
        networks:
            credentials_network:
                ipv4_address: "169.254.170.3"
        extra_hosts:
          - "host.docker.internal:host-gateway"
        environment:
          # AWS_REGION: ${AWS_REGION} -- We already load using `env_file` in docker-compose.yml
          AWS_CONTAINER_CREDENTIALS_RELATIVE_URI: "/creds"
          AWS_EC2_METADATA_SERVICE_ENDPOINT: http://host.docker.internal:8081
          ECS_CONTAINER_METADATA_URI: "http://169.254.170.2/v3"

We run either imds-credential-server or aws-export-credentials directly on the host, specifying port 8081 and the AWS profile configured in the host AWS cli - the informed profile uses credential_process along with aws-vault, and that's why we cannot just mount$HOME/.aws as a volume on the container itself and need a service running on the host to retrieve the credential using the credential process, and expose it via IMDS to the containers. We could install aws-vault on the containers just for the debugging session, but we try to keep the debug image as similar as possible to the production image (it's a multi-stage Dockerfile).

As I said, it works fine with sdk v2, but not with v3. Since I haven't figured out the reason yet (already invested 6-8 hours), I went after alternatives and arrived here.

@slimm609
Copy link

slimm609 commented Nov 10, 2022

@jweyrich DId you look at the blog post above? There are several things that are outside the scope of what this tool would do (creating loopback virtual interfaces, templated configs, etc). I created a repo that wraps around ec2-metadata-mock to wrap it all together and works natively on the system with the AWS SDKs. Its in the blog post above as well but here is the repo https://github.com/slimm609/mock-instance-profile

@jweyrich
Copy link

jweyrich commented Nov 11, 2022

@slimm609 I don't think a loopback virtual interface is necessary. See A Guide to Locally Testing Containers with Amazon ECS Local Endpoints and Docker Compose. We define a Docker bridge network in the same CIDR as the IMDS and change the default metadata service endpoint via env var AWS_EC2_METADATA_SERVICE_ENDPOINT in the application container itself. And it appears that the SDK officially uses its value during the credential chain lookup. The new endpoint has to comply with part of IMDS spec - we tested the 2 services I listed above, and they work with the aws-sdk v2, but not with aws-sdk-v3. I'm trying to figure out the reason, or find an IMDS service that would work with both versions of the aws-sdk. Maybe I'm missing a config to make it work on v3 - already tried these providers: fromNodeProviderChain, fromContainerMetadata, fromInstanceMetadata - from @aws-sdk/credential-providers, following what is mentioned in the upgrading docs.

@jweyrich
Copy link

@brycahta would it make sense for the project to support providing valid tokens? I ask because the project name contains "mock" - so it may be far from the initial idea/proposal.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request stale Issues / PRs with no activity
Projects
None yet
Development

No branches or pull requests

4 participants