[Cyberduck-trac] [Cyberduck] #11229: AssumeRole doesn't use the external_id value (was: AWS S3 AssumeRole doesn't use the external_id value)

Cyberduck trac at cyberduck.io
Mon Nov 9 22:03:06 UTC 2020


#11229: AssumeRole doesn't use the external_id value
-------------------------+-------------------------
 Reporter:  VelociBison  |         Owner:  dkocher
     Type:  enhancement  |        Status:  assigned
 Priority:  normal       |     Milestone:  8.0
Component:  s3           |       Version:  7.6.2
 Severity:  normal       |    Resolution:
 Keywords:               |  Architecture:  Intel
 Platform:  Windows 10   |
-------------------------+-------------------------
Changes (by dkocher):

 * status:  new => assigned
 * milestone:   => 8.0
 * owner:   => dkocher
 * type:  defect => enhancement


Old description:

> Hello,
>
> CyberDuck fails to do an AWS IAM AssumeRole when trying to use S3 because
> it doesn't pass along the external_id value from the ~/.aws/credtential
> profile.
>
> I'm using CyberDuck to access AWS S3 resources using an AssumeRole
> action.  I would like to be able to use the external_id enforcement as
> suggested by AWS https://docs.aws.amazon.com/IAM/latest/UserGuide
> /id_roles_create_for-user_externalid.html
>
> I'm not sure if you want to label this as a defect enhancement or
> feature.  Feel free to adjust priority and severity as you see fit.
>
> When I remove the external_id constraint on the role the AssumeRole
> succeeds with CyberDuck.  I also verified using the same profile via the
> CLI with external_id enforced on the role and it succeeds so it looks to
> be an issue in CyberDuck.
>
> Thank you for your time and creating CyberDuck

New description:

 Hello,

 CyberDuck fails to do an AWS IAM AssumeRole when trying to use S3 because
 it doesn't pass along the external_id value from the ~/.aws/credential
 profile.

 I'm using CyberDuck to access AWS S3 resources using an AssumeRole action.
 I would like to be able to use the external_id enforcement as suggested by
 AWS https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-
 user_externalid.html

 I'm not sure if you want to label this as a defect enhancement or feature.
 Feel free to adjust priority and severity as you see fit.

 When I remove the external_id constraint on the role the AssumeRole
 succeeds with CyberDuck.  I also verified using the same profile via the
 CLI with external_id enforced on the role and it succeeds so it looks to
 be an issue in CyberDuck.

 Thank you for your time and creating CyberDuck

--

Comment:

 Thanks for reporting this issue.

--
Ticket URL: <https://trac.cyberduck.io/ticket/11229#comment:1>
Cyberduck <https://cyberduck.io>
Libre FTP, SFTP, WebDAV, S3 & OpenStack Swift browser for Mac and Windows


More information about the Cyberduck-trac mailing list