-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Error: Unable to assume role #35
Comments
Above one is fixed, it is happening because call to sts is not allowed in the service-mesh, I have done that, now facing this error
Can you help @DanielRailean |
Hey there, the error looks a lot like you are not sending the token to the sts, the info you provided is unfortunately not enough for me to debug anything. I would at least need the request/response timeline (in text ex. from insomnia) for a start. |
Basically what I have done, created the iam role in with the oidc provider and permissions as mentioned above, then just created the kong-plugin and added the same in the kong-helm-chart as well, so it will be get mounted inside the pods at the path /opt/kong/, where it will be get detected, all the setup looks good, because when I am requesting the call, it is going to the plugin code and then it is showing the error above, not sure what is breaking, I am doing this for the S3., Request I am doing:- curl https://tarun.prod.######.com which will call the s3 Routing Flow:- tarun.prod.#####.com[Maps to Route53]-----> alb ----> kong pods----> ingress for Tarun.prod.####.com---->service with external-name [s3-vpc-endpoint.prod.*********.com], what is it this s3-vpc-endpoint ???, you can find in the link attached at the below.. This setup is working fine when the bucket is not using the kms as encryption, because AWS SIGN v4 is not required if bucket is using the SSE-S3 default s3 encryption, but when you choose the SSE-KMS, it requires aws sign v4, if I have enabled the ss3-kms and going without this plugin getting the issue, check this sample image, this is the exact same error i am getting. For More-Info about the setup you can check this link:- https://aws.amazon.com/blogs/networking-and-content-delivery/hosting-internal-https-static-websites-with-alb-s3-and-privatelink/ |
@DanielRailean, do you got any chance to check this ? |
Hey there. Sorry for the late reply. Maybe I'm wrong, but I feel like your question is a bit out of scope for this plugin as it mostly touches your AWS infrastructure rather than the plugin functionality. In the end, it's just as simple as :
Step one can be manually replicated using the following curl.
Step two can be manually replicated by using https://datafetcher.com/aws-signature-version-4-calculator or any other sigv4 creator, ex. the one in the insomnia HTTP client. Let me know if you can manually perform the operations and the request is successful, then we can investigate further issues within one of the 2 steps above, otherwise, it's most likely some problems with the underlying AWS infrastructure. |
Hey @tarunm97, did you happen to solve this? I am facing a similar error but unsure how to solve it. Thanks! |
@tarunm97 I will assume your issue is solved and thus will close the issue in 1 week. |
@tarunm97 same problem here, and this is the message received if we enable the return_aws_sts_error:
|
hey @rubenbaraut , could you perform the steps from my reply above and get back with the results ? |
closing this as mentioned in #35 (comment) |
Hi,
I have followed the instructions as mentioned in the doc and created a role having the [AdministratorAccess] policy attached and I am using the eks to achieve this. already the oidc provider is added in the iam and then I have created the trusted-relationship as well.
Plugin.yaml file
and when I am using it I am getting the following error in the kong logs
Not sure is there anything else I need to configure....
The text was updated successfully, but these errors were encountered: