Bug 1631845 - [RFE] Support using EC2 Roles for authentication
Summary: [RFE] Support using EC2 Roles for authentication
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat CloudForms Management Engine
Classification: Red Hat
Component: UI - OPS
Version: 5.9.2
Hardware: Unspecified
OS: Unspecified
high
medium
Target Milestone: GA
: 5.11.0
Assignee: Martin Hradil
QA Contact: Matouš Mojžíš
Red Hat CloudForms Documentation
URL:
Whiteboard:
: 1643595 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-09-21 17:20 UTC by Brant Evans
Modified: 2023-03-24 14:15 UTC (History)
19 users (show)

Fixed In Version: 5.11.0.26
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-12-12 13:34:23 UTC
Category: ---
Cloudforms Team: AWS
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2019:4199 0 None None None 2019-12-12 13:34:46 UTC

Comment 4 Dave Johnson 2018-11-06 07:10:08 UTC
No requestee for needinfo set, can you take a look and determine where this should go?

Comment 5 Dave Johnson 2018-11-06 13:29:13 UTC
Alex, please see comment 3.  :)

Comment 7 Bronagh Sorota 2018-11-08 16:55:33 UTC
*** Bug 1643595 has been marked as a duplicate of this bug. ***

Comment 12 Alexander Zagaynov 2019-09-09 14:11:49 UTC
This BZ was already done for backend part:
https://github.com/ManageIQ/manageiq-providers-amazon/pull/538
https://github.com/ManageIQ/manageiq/pull/18810

I did PR for UI too, but it wasn't accepted by UI team:
https://github.com/ManageIQ/manageiq-ui-classic/pull/5621

Since now only UI part is left, I believe this BZ should be assigned to the UI team.

Comment 14 CFME Bot 2019-09-09 17:32:15 UTC
New commit detected on ManageIQ/manageiq-ui-classic/master:

https://github.com/ManageIQ/manageiq-ui-classic/commit/d6b681c0c2d9df7efd906dfe0e26ab02e701dd37
commit d6b681c0c2d9df7efd906dfe0e26ab02e701dd37
Author:     Martin Hradil <mhradil>
AuthorDate: Mon Sep  9 10:09:38 2019 -0400
Commit:     Martin Hradil <mhradil>
CommitDate: Mon Sep  9 10:09:38 2019 -0400

    multi_auth_credentials - add Assume role ARN to the Default tab, for amazon

    when emstype == 'ec2'

    Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1631845

 app/views/layouts/angular/_multi_auth_credentials.html.haml | 16 +
 1 file changed, 16 insertions(+)

Comment 17 CFME Bot 2019-09-23 13:56:28 UTC
New commit detected on ManageIQ/manageiq/ivanchuk:

https://github.com/ManageIQ/manageiq/commit/575a2b401210054ff3a63dcea9c437da8b16ca46
commit 575a2b401210054ff3a63dcea9c437da8b16ca46
Author:     Adam Grare <agrare>
AuthorDate: Thu Aug  1 16:10:47 2019 -0400
Commit:     Adam Grare <agrare>
CommitDate: Thu Aug  1 16:10:47 2019 -0400

    Merge pull request #19088 from AlexanderZagaynov/features/aws_sts_assume_role

    support for 'assume role' aws feature

    (cherry picked from commit 682f4dfeea85968b420933d498db7212a6b801ab)

    https://bugzilla.redhat.com/show_bug.cgi?id=1631845

 app/models/ext_management_system.rb | 1 +
 app/models/mixins/supports_feature_mixin.rb | 3 +-
 2 files changed, 3 insertions(+), 1 deletion(-)

Comment 18 CFME Bot 2019-09-23 13:56:54 UTC
New commit detected on ManageIQ/manageiq-providers-amazon/ivanchuk:

https://github.com/ManageIQ/manageiq-providers-amazon/commit/1099f43bb81a21cd0e874e31593a97eff87fcc9a
commit 1099f43bb81a21cd0e874e31593a97eff87fcc9a
Author:     Adam Grare <agrare>
AuthorDate: Mon Aug  5 13:03:48 2019 -0400
Commit:     Adam Grare <agrare>
CommitDate: Mon Aug  5 13:03:48 2019 -0400

    Merge pull request #550 from AlexanderZagaynov/features/sts_assume_role

    use 'supports?' feature for assume role field

    (cherry picked from commit a918fc4f36cdcb9534a0003e94685c1ef34a3f58)

    https://bugzilla.redhat.com/show_bug.cgi?id=1631845

 app/models/manageiq/providers/amazon/cloud_manager.rb | 1 +
 1 file changed, 1 insertion(+)

Comment 19 CFME Bot 2019-09-23 13:57:11 UTC
New commit detected on ManageIQ/manageiq-ui-classic/ivanchuk:

https://github.com/ManageIQ/manageiq-ui-classic/commit/fd31420fe357d2b82a7fc9a0eb2cf7117c92d0bd
commit fd31420fe357d2b82a7fc9a0eb2cf7117c92d0bd
Author:     Martin Povolny <mpovolny>
AuthorDate: Mon Sep  9 13:30:58 2019 -0400
Commit:     Martin Povolny <mpovolny>
CommitDate: Mon Sep  9 13:30:58 2019 -0400

    Merge pull request #6170 from himdel/amazon-assume-role

    Amazon - support Assume Role ARN

    (cherry picked from commit 314246c3cf50bcb97ea03db841139d723a3e070c)

    https://bugzilla.redhat.com/show_bug.cgi?id=1631845

 app/assets/javascripts/controllers/ems_common/ems_common_form_controller.js | 3 +
 app/controllers/mixins/ems_common/angular.rb | 21 +-
 app/views/layouts/angular/_multi_auth_credentials.html.haml | 16 +
 spec/controllers/ems_cloud_controller_spec.rb | 5 +-
 spec/controllers/mixins/ems_common/angular_spec.rb | 18 +-
 spec/javascripts/controllers/ems_common/ems_common_form_controller_spec.js | 9 +-
 6 files changed, 63 insertions(+), 9 deletions(-)

Comment 21 Matouš Mojžíš 2019-10-04 13:14:59 UTC
Verified in 5.11.0.26.
I am able to add EC2 provider with user that has only access to AssumeRole, where role has enough access to manage CFME.

Comment 23 errata-xmlrpc 2019-12-12 13:34:23 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2019:4199


Note You need to log in before you can comment on or make changes to this bug.