SPLAT-2721: Add SetSecurityGroups IAM permission#2727
Conversation
Adds the elasticloadbalancing:SetSecurityGroups IAM permission required for the BYO Security Group feature for AWS NLBs by AWS CCM. This permission is needed so that the controller can associate or disassociate security groups on AWS NLBs without deletion and recreation of the NLB.
|
@mfbonfigli: This pull request references SPLAT-2721 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "5.0.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
Skipping CI for Draft Pull Request. |
WalkthroughA single line is added to an AWS IAM policy file for the OpenShift HCP kube-controller-manager credentials, extending the existing LoadBalancer management statement to include the Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~2 minutes 🚥 Pre-merge checks | ✅ 12✅ Passed checks (12 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: mfbonfigli The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
/jira-refresh |
What type of PR is this?
(feature)
What this PR does / why we need it?
This PR adds the
elasticloadbalancing:SetSecurityGroupsIAM permission required for the BYO Security Group feature for AWS NLBs by AWS CCM.As part of the new Bring Your Own Security Groups (BYO SG) for AWS Network Load Balancers (NLBs) feature currently under review in upstream, it is required to add a new
elasticloadbalancing:SetSecurityGroupspermission to the role used by AWS CCM to interact with AWS APIs. For more info on the workstream see OCPSTRAT-1553.The
elasticloadbalancing:SetSecurityGroupspermission is required to enable AWS CCM to change the security groups associated with Network Load Balancers without deleting and recreating the NLB, which is not viable.Without this permission, the following operations are not possible:
Which Jira/Github issue(s) this PR fixes?
Fixes #https://redhat.atlassian.net/browse/SPLAT-2721
Fixes #https://redhat.atlassian.net/browse/SPLAT-2452
Special notes for your reviewer:
elasticloadbalancing:ApplySecurityGroupsToLoadBalancerwhich is already present and required to edit BYO Security Groups associated with Classic Load Balancers (CLBs).kOpsKubernetes infrastructure provisioning tool has been already updated to add the required permission: Support NLBSecurityGroupMode for AWS Cloud Controller Manager kubernetes/kops#18211Pre-checks (if applicable):
Tested latest changes against a cluster
Included documentation changes with PR
If this is a new object that is not intended for the FedRAMP environment (if unsure, please reach out to team FedRAMP), please exclude it with:
Summary by CodeRabbit