-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Doesn't ask MFA token code when using assume_role with MFA required #2420
Comments
This comment describes the same issue (while they workaround by not using MFA, which we do not want to do): |
I would also like to see this work when simply using AWS_PROFILE env with the target profile configured to use a cross account role_arn and mfa_serial. In fact this would be the preferred way to use terraform for us. $HOME/.aws/credentials:
Terraform invocation:
|
FYI use of shared Comment from that PR:
There was another implementation of #1608 -- it appears to include some (possibly limited) MFA support, but was closed in favor of 1608: Getting the go-sdk to prompt (once, and only once) for an MFA code would appear to involve a bit more work, but not much, by my reading of the comments. |
aws/aws-sdk-go#1088 adds the |
Also, caching of the temporary sts credentials in a portable cross-process manner might be an open issue: aws/aws-sdk-go#1329 |
|
Just had the same issue... Have a profile with a role to be assumed and MFA enabled but it seems MFA is not supported at this moment. We don't really need it to be prompted (probably should not even be considered)... working just like Packer works would be sufficient and that is having a mfa_code option where we can pass using -var or env vars. https://www.packer.io/docs/builders/amazon-ebs.html#mfa_code |
@tamsky I tried to add the MFA functionality into #1608 (we ideally wanted to be using MFA) but you are correct that the lack of an STS credentials cache essentially makes this unusable for the end user (repeated prompts for MFA token, and as tokens can only be used once, you have to wait until a new token is generated each time). Since the inability to assume roles defined in the profile file was hurting us more, I elected to pursue that fix for now (still hasn't quite been released, see hashicorp/terraform#16661), though I might return to the MFA issue when I next have some spare capacity (if someone else hasn't stepped in to solve it). (the original PR hashicorp/terraform#11734 that I resurrected to form #1608, had some discussion on MFA which led to me experimenting and finding the limitations) |
Hi all! In general, Terraform doesn't currently support this sort of dynamic prompting for providers, and indeed the existing prompting features in Terraform are there primarily to help new users get started and we expect users to switch pretty early to using Terraform as a non-interactive, scripted tool, ideally running in a centrally-administered environment to avoid the need to sprawl various secrets across multiple user workstations. Some users have reported success using a wrapper/helper script that calls Managing authentication use-cases in wrapper scripts allows for other more advanced use-cases too, such as SAML authentication. At this time we do not have plans to support interactive authentication to providers since it would require some significant changes to the provider model. We will probably look at this again in future in the context of some other breaking change to the provider model so that we can bundle multiple changes together, though as noted above we generally expect Terraform to be used non-interactively in some sort of automation once users pass the experimental phase, so any features we build in this area will need to also solve for a non-interactive workflow for that common case. |
For my purposes, I needed this feature for AWS org resource management across multiple accounts, so I can easily bootstrap new accounts. Another use case is for DevOps to manage resources across accounts originating from a "security" account (as described here). In all scenarios, MFA should be enabled for cross account access (internal requirement). I ended up getting this to work by requesting temporary credentials using MFA and saving them to
I created a simple python cli to generate the creds: |
Has anyone tried working around the issue by using something like https://github.com/remind101/assume-role ? |
@scalp42 assume-role works. I also used a smaller and simpler script to do about the same: https://gitlab.com/kmaris/wtf (The name is terrible, I know). |
I suggest aws-vault for this purpose as it is much more convenient. aws-vault stores your long-term access credentials encrypted and will deal with exposing temporary AWS access credentials to your shell or application so you don't have to. As a matter of fact, you can delete your credentials file and manage AWS API access entirely w/ aws-vault and named profiles defined in ~/.aws/config. I'll show an example that uses cross account IAM role delegation for executing terraform commands. The terraform AWS provider config: provider "aws" {
profile = "${var.aws_vault_profile}"
region = "${var.aws_region}"
version = "~> 1.30.0"
assume_role {
role_arn = "arn:aws:iam::${var.aws_app_account_id}:role/OrganizationAccountAccessRole"
}
} Here is the corresponding ~/.aws/config file. It defines a terraform profile which uses MFA (the [default]
aws_region=eu-central-1
[profile terraform]
mfa_serial=arn:aws:iam::123456789012:mfa/Andreas Then simply use aws-vault exec to wrap the terraform command - or set up an alias like so (note to change the backend depending on your system environment - this example uses the secret service API w/ keyring which works well for me on Ubuntu): # always use aws-vault to wrap terraform command
alias terraform='aws-vault exec terraform --backend=secret-service -- terraform' When you run terraform you will be automatically prompted for the access token:
Of course you can also use multiple profiles w/ aws-vault. There are more advanced configuration examples in the aws-vault docs. |
We can work around this using aws-vault or something similar, but I'd love to see the idea of interactive MFA authentication revisited (both for AWS and for other cloud providers where applicable). I strongly disagree with @apparentlymart's rationale from 2 years ago. While iterating on a TF configuration, I might Of course we use that pipeline for deployment to environments after dev. So it's not a matter of using TF interactively to manage our infrastructure. But we're contractually obligated to enforce MFA even in our dev account. (And we use account federation with centralized IAM management so it's not really possible to selectively enforce it anyway.) So as is, it makes our dev workflow more complex. I can't imagine our workflow or our requirements are particularly unusual, so it seems like a high value add for TF to support it. |
My 2 cents:
so if assumed role requires MFA we can work around it by using variable and if that role is not protected with MFA, it will not be used. Thanks |
There is no need to prompt for Terraform to support asking for a MFA value. If you run |
Re @stumyp
The problem with this is that an MFA token is only allowed to be used once in AWS and so this would effectively limit terraform to only one API call every 30 seconds. |
This is incorrect: once temporary session is obtained it can lasts much longer. |
Aha I see what your saying. I thought you meant an environment variable for the MFA code would be sufficient to replace the temporary credential storage workflow. My bad! |
I got here because I also need Terraform to ask the MFA key before assuming the role. |
@stumyp If you are willing to write multi-line shell scripts, then I think what you want is possible by installing |
@yn-academia If you don't need this specifc feature, it doesn't mean other people don't need it as well. This multiline script was made for single switch between main role and assumed role. one way, no way back. In terraform I want to work with multiple accounts easily. Which I do right now, but without MFA. This weakens our security policy. I want to make my work more secure and do not overcomplicate it at the same time. |
@stumyp I have exactly that problem, and what my solution does is it creates tf profiles with an assumed role in ~/.aws/credentials so I can then use named profiles in terraform code. So basically I run the script against multiple assumed roles once and then I can use terraform across multiple accounts/assumed roles (until tokens expire). It's not a solution for only one account/assumed role. |
Thank you, @dac73, I was not looking for the workaround. I'm just adding one more voice to implement fully STS AssumeRole API call in Terraform. Not in the way it is done right now. Currently TF supports only three input parameters:
while API call accepts more.:
Probably it should be a separate issue to add the rest of the parameters, but I would love to see there
Let the users deal with how they want to provide those values to TF, just add support for it. |
@apparentlymart should I create separate issue for what I'm asking for, since this particular one is about dynamic prompting for MFA value? |
I support requesting for MFA input. Profiles, etc are good for single provider, but thats not always the case. For example I have a need to build VPC peering between two accounts. Each of them requires MFA. Unless I setup some cross account trust in AWS - there is no way to achieve that using environment variables as all of them - will be for single account only. |
Also here to support implementing MFA input. When implementing AWS CLI accounts, MFA is a must here. |
@andreas-venturini the issue is that yes aws-vault will work but in our scenario we have to consume the state in different accounts. Assuming you have 2 accounts
If you wrap the terraform command:
It'll work as long as you don't have a provider that references a state from a different account if it makes sense as it'll assume whatever role in the Without MFA/aws-vault, it'll work as Terraform can handle multiple sessions per providers. |
Different accounts can be used with aws-vault as a credential_process for aws sdk, ie ~/.aws/config
and then run terraform as
|
@olfway I tried to replicate the same set up but I'm running into the following:
What does your provider configuration looks like? |
Also you could check with
it should use credentials from aws-vault and ask for mfa only once or run aws-vault directly:
|
Has there already been an update on this? Any good solutions apart from aws-vault? |
This feels like a glaring omission. While being a "non-interactive, scripted tool" is a great primary goal, expecting everything to run in an automated pipeline is unrealistic, especially when terraform has commands such as Occasionally you need an escape hatch to deal with edge cases, and how many people don't have MFA enabled for live environments? I'm forced to choose between turning off MFA (non-option), or adding third-party tooling/custom scripts (which increases maintenance, cognitive overhead, and learning curves for new developers). I'm trying to reduce the complexity of infrastructure deployments, not increase it. Thankfully I'm thinking of this in advance and making sure there's a solution in place for my client. I feel sorry for anyone that relies on their tf pipeline, and then ends up screwed because something unexpected happened in live, and they can't fix it just because terraform can't ask them for an MFA code. |
For anyone who's just looking for a simple escape hatch: There are plenty of programs that manage this problem better, as written above, but honestly, I've used this incredibly simple bash script for years, although I call it For example: Place the script somewhere on your path, e.g.
The script will call the AWS CLI and set up the temporary session (which will prompt you for MFA), then invoke I've actually found that little bash script very useful over the years. I prefer it over some I've seen because it just goes through the regular AWS CLI flow instead of re-implementing part(s) of it in bash. Additionally, it doesn't mess with your existing shell session envvars. |
I have been reading this ticket and would like to clarify if I understand it correctly. Using this:
Terraform prompts for the key and secret which come straight away from a password management tool with encrypted storage. In case the user has MFA enabled would it be possible that terraform also prompts for the TOTP code? Is there any intention to support this on terraform or is this not considered an interesting scenario? Thanks! :-) |
if I'm getting this right the reason we cant have an interactive MFA prompt is because its not compatible with automation. i disagree with the premise that automation of running terraform is always required. |
By the way despite seatmates to the contrary in other tickets the AWS CLI does cache session tokens for assume role operations see https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-role.html#cli-configure-role-mfa for details so an other option would be to allow terraform to use the cached credentials. if it used the cache then users could just do a simple aws sts get-caller-identity against the profile and they would be prompted for their MFA then terraform could used the cached credentials |
If you want to run a terraform project that requires MFA, this is possible. The pseudo code is: # Get an AWS session
# NOTE: MFA_CODE is a fresh CODE given by your MFA virtual device, like google authenticator. This code change so you can't automate this command
aws sts get-session-token --serial-number "${MFA_DEVICE_SERIAL_NUMBER}" --token-code "${MFA_CODE}"
# The credentials of the session are in the output of the previous command
AWS_ACCESS_KEY_ID=
AWS_SECRET_ACCESS_KEY=
AWS_SESSION_TOKEN=
# Run terraform
terraform apply The following script allows you to get the MFA_DEVICE_SERIAL_NUMBER: CURRENT_USER_ARN="$(aws sts get-caller-identity --query Arn --output text)
MFA_DEVICE_SERIAL_NUMBER="$(aws iam list-virtual-mfa-devices --query "VirtualMFADevices[?User.Arn=='${CURRENT_USER_ARN}'] | [0].SerialNumber" --output text)" As said, you have to get the MFA_CODE manually. |
Additional discussion on this issue, including workarounds used by some practitioners, can be found at #10491 |
Hello everyone, and thank you for your patience on this long-standing issue. As @apparentlymart mentioned in #2420 (comment), the expectation has been that Terraform will typically be used in a non-interactive mode. While that is generally still the sentiment in the Terraform CLI team, we are having some discussions internally around how to allow some interactivity. The Terraform CLI repository is the best place to request interactivity for Terraform. This will have to be a general solution that can address needs for any providers that would need this. It would also have to act "reasonably" in the case where Terraform is running non-interactively and a provider requests interaction. There have been a few workarounds and proposed solutions listed in this issue.
AWS profiles also support the use of an External Credentials Process to authenticate. The AWS Provider currently supports this with profiles in the Another suggestion was to make use of the AWS CLI credentials cache. The AWS CLI documents the location of the cache, but doesn't document the format. While the format is the format used by the Boto python library, because it isn't stated in the CLI documentation, it is not guaranteed not to change. We feel that this approach is too brittle for inclusion in the provider. We're going to add the external credentials process to the provider for parity with the credentials and configuration files. We understand that this is not a perfect solution for the MFA issue. Without the ability to interact with the practitioner, the provider cannot solve the MFA issue by itself. Some of the other workarounds or tools may work for you in conjunction with the options supported by the provider. |
This link is dead, does anyone have the source? |
Now that aws/aws-cli#3711 has been merged, this is very trivial to implement for any non-S3 backend processes. This is assuming you already have an AWS config profile that has MFA and AssumeRole configured. Add a new profile using
The CLI will prompt for the MFA code in the process of running I'm not fully sure why this doesn't work for the S3 backend just specifying Once the feature @gdavison mentioned above lands for configuring this from the Terraform provider itself, the extra profile will not be necessary. |
No need to set an environment variable, just set the profile explicitly in the backend. Having to specify this separately is intentional because you could keep terraform state in one central AWS account for example but wish to control resources in a different AWS account. True that it would perhaps make sense to make that the default though.
|
When using multiple AWS accounts it's good practice to only allow access via AssumeRole from a master account. This can be done with or without requiring MFA. Terraform supports assume_role with s3 state file and aws provider configurations, but doesn't seem to ask the MFA token code when one is required. This prevents using AssumeRole for credentials when MFA is required.
AWS documentation describing MFA with cross account AssumeRole: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_configure-api-require.html#MFAProtectedAPI-cross-account-delegation
Terraform Version
Affected Resource(s)
Both of these support assume_role, so they should also support asking for MFA token code:
Terraform Configuration Files
Actual Behavior (with DEBUG)
The text was updated successfully, but these errors were encountered: