Constraining EKS pod IAM roles using CloudFormation

How to create EKS compatible IAM roles for a namespace and pod service account using a simple CloudFormation template

Posted by Harry Lascelles on March 17, 2020

The use case

In my previous post I looked at how to configure an OIDC provider for an existing EKS cluster using a single CloudFormation template.

The next step is to use the OIDC URL output of the template to configure IAM roles so that pods are able to assume them. Importantly, those roles should be restricted so they can only be assumed by pods in the intended namespace, and only by the named service account. There are guides available showing how to do this using eksctl, the AWS console or the aws-cli, but what if we aren't using CDK and wanted to keep our code as config, declarative, and entirely in YAML/JSON?

The problem is in the AssumeRolePolicyDocument section. We need to supply a Condition where the key needs to be templated with the name of the cluster. CloudFormation doesn't permit templating keys natively. Fortunately, there is a workaround.

This post will allow you to configure your EKS clusters and create pod IAM roles, all without leaving CloudFormation. It also demonstrates how to create roles that are bound to a set namespace and service account.

The repository for the example resources can be found here: https://github.com/bambooengineering/example-eks-oidc-iam-cloudformation.

Rock and role

The trick is to know that the AssumeRolePolicyDocument value in a template is specified as json. As such, we can perform a !Sub on any value we pass to it, as long as the result is a valid json string. This allows us to template the "key" part of the Condition.

The value part of the Condition applies the Principal of Least Privilege. It states that the pod must be in the namespace test-namespace, and must have the service account named test-service-account.

If a pod attempts to assume this role from another namespace or with any other service account, it will fail.

Here is how to apply the desired constraints to an IAM role using CloudFormation:

The same technique is possible with JSON templates, though much harder to read as the JSON needs to be escaped. Here is the Role part of a JSON template:

Role your own

We can now demonstrate the cluster will configure service accounts correctly by performing a test. Clone the example repo and change to that directory.

You now have access to the two test files:

Now use the CloudFormation file to set up a test role, and prove the json templating system described above:

We now have the test IAM role, preconfigured to be assumable by a pod in this cluster.

Using the second file we use kubectl to launch a pod in the cluster, and execute a command in it to describe the test SNS topic (as permitted by the test role we have created). Note, the pod has been assigned a service account that has the role annotated with eks.amazonaws.com/role-arn:

Your work here is done.

Little fluffy clouds

By keeping your configuration entirely in CloudFormation templates you can maintain a cleaner and simpler deploy pipeline, without sacrificing the necessary constraints on role usage by service account and namespace. Your boss will be pleased.

Good luck on your Kubernetes journey!