Bug 1411369
Summary: | [RFE] CAPABILITY_IAM error after IAM role assignment with amazon cloudFormation template | ||
---|---|---|---|
Product: | Red Hat CloudForms Management Engine | Reporter: | Satoe Imaishi <simaishi> |
Component: | Providers | Assignee: | Bill Wei <bilwei> |
Status: | CLOSED ERRATA | QA Contact: | Shveta <sshveta> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 5.6.0 | CC: | bilwei, cpelland, gekis, hhudgeon, jfrey, jhardy, obarenbo, sshveta, tachoi |
Target Milestone: | GA | Keywords: | FutureFeature, ZStream |
Target Release: | 5.7.1 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | ec2:stack | ||
Fixed In Version: | 5.7.1.0 | Doc Type: | Enhancement |
Doc Text: | Story Points: | --- | |
Clone Of: | 1385712 | Environment: | |
Last Closed: | 2017-02-27 19:18:26 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | CFME Core | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1385712 | ||
Bug Blocks: |
Comment 2
Bill Wei
2017-01-18 13:59:55 UTC
Hi Bill , Needed some info to verify this bug. Correct me If I am wrong : 1) Create a new role called "IAM" role 2) Create a new group and under "Vm and templates" select orchestration template and assign to this group and check for errors? Please let me know. Thanks, Shveta For more information about IAM role and Cloudformation template, please see http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#using-iam-capabilities To verify the fix, you first need to enhance the service dialog. This requires a manual editing of the dialog that you would normally first create through the CFME UI. Below is the paste of the naming of components that I posted earlier: stack_notifications - a text area box, each line is an ARN stack_capabilities - a drop down list for capabilities stack_resource_types - a text area box, each line is an allowed resource type filter stack_role - a text box for the role ARN stack_policy - a text area box for the JSON formatted policy, or just the policy URL stack_tags - a text area box, each line is one tag key and value pair, in the format key => value If you only want to test IAM capability, you only need to add a dropdown and name it stack_capabilities. CAPABILITY_IAM and CAPABILITY_NAMED_IAM are the two available selections. You will need to follow the description of this BZ to prepare a Cloudformation template that requires IAM role. You should do this through AWS console window. With "CAPABILITY_IAM" selected stack was created successfully. Verified in 5.7.1.0.20170124142149_8a5f4d5 =================================== Additional info for bug verification ======================Template used========== { "AWSTemplateFormatVersion": "2010-09-09", "Resources": { "RootRole": { "Type": "AWS::IAM::Role", "Properties": { "AssumeRolePolicyDocument": { "Version" : "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": [ "ec2.amazonaws.com" ] }, "Action": [ "sts:AssumeRole" ] } ] }, "Path": "/", "Policies": [ { "PolicyName": "root", "PolicyDocument": { "Version" : "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "*", "Resource": "*" } ] } } ] } }, "RootInstanceProfile": { "Type": "AWS::IAM::InstanceProfile", "Properties": { "Path": "/", "Roles": [ { "Ref": "RootRole" } ] } } } } Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2017-0320.html |