-
Notifications
You must be signed in to change notification settings - Fork 434
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: add missing actions to policy.json #1315
Conversation
describe table has been needed since tailwarden#1111
list event source mappings has been needed since tailwarden#1040
list users has been needed since tailwarden#991
listbucket iam action is for the contents of a bucket
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey, thank you for opening your Pull Request ! 🙂 While a Tailwarden team member takes a look at your PR we would like to invite you to join our official Discord server, where you can interact directly with other contributors and Tailwarden team members. Link here: https://discord.tailwarden.com
@@ -14,6 +19,7 @@ | |||
"cloudwatch:ListTagsForResource", | |||
"cloudwatch:ListDashboards", | |||
"cloudwatch:ListMetricStreams", | |||
"dynamodb:DescribeTable", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
since #1111
@@ -83,11 +90,12 @@ | |||
"elasticfilesystem:DescribeFileSystems", | |||
"elasticfilesystem:ListTagsForResource", | |||
"iam:ListInstanceProfileTags", | |||
"lambda:ListEventSourceMappings", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
since #1040
@@ -55,6 +61,7 @@ | |||
"iam:ListRoles", | |||
"iam:ListSAMLProviders", | |||
"iam:ListSAMLProviderTags", | |||
"iam:ListUsers", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
since #991
@@ -6,6 +6,11 @@ | |||
"Effect": "Allow", | |||
"Action": [ | |||
"apigateway:GET", | |||
"codecommit:ListRepositories", | |||
"codecommit:ListTagsForResource", | |||
"codebuild:ListProjects", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
since #1216
@@ -6,6 +6,11 @@ | |||
"Effect": "Allow", | |||
"Action": [ | |||
"apigateway:GET", | |||
"codecommit:ListRepositories", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
since #1229
"codecommit:ListRepositories", | ||
"codecommit:ListTagsForResource", | ||
"codebuild:ListProjects", | ||
"codedeploy:ListApplications", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
since #1228
"lambda:ListFunctions", | ||
"lambda:ListTags", | ||
"es:ListDomainNames", | ||
"es:DescribeDomains", | ||
"s3:ListBucket" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This permission is for listing objects/contents of a bucket - AFAIK we don't need it
Grants permission to list some or all of the objects in an Amazon S3 bucket (up to 1000).
"lambda:ListFunctions", | ||
"lambda:ListTags", | ||
"es:ListDomainNames", | ||
"es:DescribeDomains", | ||
"s3:ListBucket" | ||
"s3:ListAllMyBuckets" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This permission is required for the S3.ListBuckets API method we're using
list all buckets owned by the authenticated sender of the request
* feat: add missing dynamodb action to policy.json describe table has been needed since #1111 * feat: add missing lambda action to policy.json list event source mappings has been needed since #1040 * feat: add missing iam action to policy.json list users has been needed since #991 * fix: correct s3 permission for list buckets api call listbucket iam action is for the contents of a bucket * feat: add missing code suite actions to policy.json needed since #1216, #1229, and #1228
Problem
Actions missing from the recommended komiser policy
Solution
Add required actions to the policy (using https://aws.permissions.cloud/ as IAM <> API reference)
Changes Made
How to Test
Run komiser with the recommended policy and an AWS environment with affected resource.
Checklist