generates credentials to impersonate IAM Roles
Project description
NAME
iam-sudo - assume any AWS IAM role
SYNPOSIS
iam-sudo [OPTIONS] [CMD]...
OPTIONS
--role-name TEXT of the role to get the credentials for [required]
--principal TEXT the role belongs to
--base-role TEXT to assume
--profile TEXT to save the credentials under
--remote/--local invoke lambda, default --remote
DESCRIPTION
iam-sudo will read the attached policies and inline policies of the specified role-name
.
These policies will be used to create the session policy. The base-role
is the
role that will be assumed combined with the session policy, to mimick the specified role.
role-name
is a substring of the role to assume. This is to make it easier to assume a
role that was created by AWS CloudFormation. For instance, both TaskRoles
and my-stack-TaskRole
may resolve to the role my-stack-TaskRole-9AO01PCC7I0T
.
If multiple matching roles are found, an error is returned. You may also specify
the principal
to reduce the number of matching roles: for
instance --principal Service:ecs-tasks.amazonaws.com
.
If a profile
is specified, the credentials will be stored in ~/.aws/credentials
.
If a command is specified, it will be executed with the obtained credentials. This is done
by setting the environment variables AWS_ACCESS_KEY_ID
, AWS_SECRET_ACCESS_KEY
and AWS_SESSION_TOKEN
.
The remote
flag wil invoke the iam-sudo Lambda function to generate credentials. This
remote option, is required to really give users sudo-like permissions which exceeds
their own. Without the remote
flag, the user will not be able to get more
permissions, than granted to him/her.
Sudo Policy
To limit the roles which can be assumed, a policy can be specified. The following snippet shows the default sudo policy:
allowed-role-names:
- "*"
allowed-principals:
- "*" : "*"
allowed-base-roles:
- "arn:aws:iam::*:role/*"
The following table shows a short description of the fields.
field | description |
---|---|
allowed-role-names | a list of glob patterns specifying allowed role names |
allowed-principals | a list of glob patterns specifying principal type and identity |
allowed-base-role | a list of glob patterns specifying allowed base roles |
The default client policy is to allow all role names, all principals and all base roles to be specified.
The following policy, restricts requests to any AWS ECS task role and the base role to the IAmSudoUser.
allowed-role-names:
- "*"
allowed-principals:
- "Service" : "ecs-tasks.amazonaws.com"
allowed-base-roles:
- "arn:aws:iam::123456789012:role/IAMSudoUser"
installation
The installation comes in two parts: the client and the server.
To install the client, type:
pip install iam-sudo
To install the server, type:
aws cloudformation create-stack \
--stack-name iam-sudo \
--template-url https://binxio-public-eu-central-1.s3.amazonaws.com/lambdas/iam-sudo-0.1.4.yaml \
--capabilities CAPABILITY_NAMED_IAM
aws cloudformation wait stack-create-complete --stack-name iam-sudo
Alternatively, you can create the stack via the AWS console.
To allow users to use the remote function, they should be granted permission to
invoke the created Lambda function iam-sudo
.
ENVIRONMENT VARIABLES
The iam-sudo allows following environment variables to be set:
name | description |
---|---|
IAM_SUDO_BASE_ROLE | The role to assume over which the session policies are added, default IAMSudoUser |
IAM_SUDO_POLICY | The policy which governs which roles can be assumed, default any |
The lambda function requires you to set both.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.