Skip to content
This repository has been archived by the owner on Apr 19, 2021. It is now read-only.

Discussion: Allow resource management in multiple accounts #64

Open
ankon opened this issue Dec 12, 2019 · 1 comment
Open

Discussion: Allow resource management in multiple accounts #64

ankon opened this issue Dec 12, 2019 · 1 comment

Comments

@ankon
Copy link
Contributor

ankon commented Dec 12, 2019

Right now the service will use the credentials (from wherever) and manage resources through these. If one wants to manage resources for multiple accounts, one needs to bring up multiple services, and provide them with suitable credentials.

Theoretically one can also see a world where the resource "somehow" specifies an account (possibly through a role reference), and the service would then use sts:AssumeRole (or ChainableTemporaryCredentials) for accessing this specific resource.
The upside here would be that one needs fewer service instances (which mostly do nothing) to manage a diverse set of resources. On the downside the issue is that it deviates considerably from the current "basically cloudformation as a operator" approach, and as such we would likely be hitting "interesting" problems.

@ankon
Copy link
Contributor Author

ankon commented Dec 12, 2019

Quick idea: The account/role reference should be an annotation, not a field in the resource spec. This at least gives us a bit of flexibility with the API.

Given that one needs a role ARN for the credentials/sts:AssumeRole API we definitely should use that, and not try to specify an "account", "region", and "role name" separately.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant