Updates regarding the role trust policy evaluation change when a role assumes itself #748
-
I received an email from AWS that I'm not sure what to do. Here is the email:
They listed off a few IAM roles. One is an ECS role that was created with the terraform-aws-ecs modules/ecs-service library. The ECS role has a permission policy called "assume-role"
It also has a trust policy:
Is there something more that we need to do to explicitly allow the role to assume itself? Thank you for your help. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 3 replies
-
Hi @erictompkins, apologies for the delay, I was ill this week. Thanks for reporting this! I'm going to create an issue at the ECS module repo now and start investigating this. |
Beta Was this translation helpful? Give feedback.
-
Hi @erictompkins, from what I understood from the AWS blog post mentioned on the message you showed, the arn of the role should be listed in the principals that can assume it. But I can't find which is the offending role in the module. I can see two instances of when Quick question, are you using the ecs module in a standalone way, or are you using the service catalog? If you are using it standalone, are you setting anything in the variables If you are using the service catalog, did you set anything for the variable |
Beta Was this translation helpful? Give feedback.
Thank for these details! this is very helpful, I added them to the issue I created, but since you aren't having any negative effects I'm not going prioritize very highly it right now. Let me know if this starts causing any access denied issues though!