Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upprovider/aws: Fail silently in ValidateCredentials for IAM users #2959
Conversation
catsby
referenced this pull request
Aug 7, 2015
Closed
provider/aws crash when authenticating via instance profile on 0.6.2 #2955
catsby
added some commits
Aug 7, 2015
catsby
referenced this pull request
Aug 7, 2015
Closed
Cannot read from AWS instance IAM role for AWS provider (as of 5a15c02cbbea27d3f8345b5fe0f348a08a24fdb9) #2828
catsby
added
bug
provider/aws
labels
Aug 7, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
|
LGTM |
added a commit
that referenced
this pull request
Aug 7, 2015
catsby
merged commit 6c7fe13
into
master
Aug 7, 2015
1 check passed
continuous-integration/travis-ci/pr
The Travis CI build passed
Details
sarguru
referenced this pull request
Aug 14, 2015
Merged
Fail silently when account validation fails while from instance profile #3001
phinze
deleted the
b-aws-iam-validation
branch
Jan 4, 2016
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
catsby commentedAug 7, 2015
WIP, don't merge yetThis should
helpfix #2828 and #2955 (introduced by #2730) by failing silently in the event of anAccessDeniedorValidationErrorerror message from theiam.GetUsercall. Instance Profiles may not have this role/permission, but right now we're failing here. If there exists any hierarchy of nodes (dependencies), you can trigger a crash (patched in #2963).iam.GetUserwith an IAM profile will receive anAccessDeniederror message.iam.GetUserwill return aValidationErrorregarding a missing user nameTesting this now, may change to specifically confirm theGood To GoawsErr.Message()containsiam:GetUsermessage