Skip to content

Automate the rotation of IAM keys used by third-party services.

License

Notifications You must be signed in to change notification settings

Cimpress-MCP/felix

Repository files navigation

Build Status Code Climate Test Coverage

dependencies Status devDependencies Status

Felix

Felix Logo

Felix rotates your IAM keys!

Table of Contents

About

Managing your IAM keys is a fundamental piece of AWS security. It's also one of the easiest things to get wrong. In fact, the easiest way to manage your IAM keys is to just not ever have any.

But that only gets you so far. Some third-party services can't integrate via cross-account roles or bucket policies. Sometimes you need to run pieces of your infrastructure on-prem or in different Cloud Providers (or otherwise cannot use STS keys).

So Felix is aimed at making it easy to manage IAM keys in third-party services like SumoLogic and GitLab. It aims to be easily extensible by both built-in providers and external plugins.

Architecture

Architecture for this project is relatively simple. There are only 4 main components that can be separated into two categories:

Category One: Infrastructure in YOUR AWS account

  1. The Lambda Function itself
  2. Systems Management Parameter Store parameters
  3. IAM users

Category Two: External Systems containing keys

  1. GitLab
  2. SumoLogic
  3. Travis-CI

The felix Lambda function loads AWS Parameter Store (SSM) parameters that are appropriately named (see Configuration section below), creates new access keys for IAM users that are appropriately pathed (see IAM User Path Construction section below), and using access provided by your SSM parameters, updates your configured external system (GitLab, SumoLogic, or Travis-CI).

Felix Architecture Felix Architecture Diagram

Deployment and Configuration

Deploying from source

  • Clone this repository (or sls install).
  • npm install
  • Get some IAM or STS keys for your account
  • sls deploy --region [the region you want]
  • npm run configure to perform some first-time config in the Parameter Store.

Configuration

Quickstart with configure.js

There is a configure.js script at the root of this repository that will configure all necessary configuration settings in SSM.

You can run it with npm run configure or node ./configure.js.

NOTE: Make sure you have your proper account, profile, and region set in your AWS config before running this.

This will go through all possible settings, suggest sane defaults, and give you the option to configure some plugins (you can skip plugins you don't plan to use).

Configuration details

Configuration for Felix plugins is generally performed by metafig.

Since most plugins will need some kind of secret value, this makes it easy to configure your plugins without any danger of accidentally hardcoding or committing secret values.

See the default config in config.json.

By default, everything under plugins is run through metafig. In this case, all of the configuration for the gitlab plugin is pulled from the AWS Parameter Store, using the /felix/gitlab path. All of those values are populated into your configuration object and passed to the plugin when it is instantiated.

AWS Settings

By default, all AWS settings are loaded from the SSM Parameter Store at /felix/aws. It needs the following settings:

  • userPath: The IAM path from which to load all users. This should be /service/ in order to match the default settings. The Lambda execution role only has access to /service/ by default, so whatever you choose should be under there somewhere.
  • snsTopic: The ARN of the SNS topic to publish Felix reports to. This should be the SNS topic that was created by the Felix deployment.

GitLab Settings

By default, all GitLab settings are loaded from the SSM Parameter Store at /felix/gitlab. It needs the following settings:

  • token: A GitLab API token that has access to update build variables for your repositories.
  • url: The BaseUrl to the GitLab instance you wish to connect to (e.g. https://gitlab.mycompany.com/).
  • protectedKeys: A boolean value determining if Felix should mark the build variables containing the keys as protected.

SumoLogic Settings

By default, all SumoLogic settings are loaded from the SSM Parameter Store at /felix/sumologic. It needs the following settings:

  • keyId: A SumoLogic key pair id that has access to update your sources and collectors.
  • secretKey: A SumoLogic key pair key that has access to update your sources and collectors.
  • url: The BaseUrl to the SumoLogic API you wish to talk to (e.g. https://api.us2.sumologic.com/api/v1).

Travis Settings

By default, all SumoLogic settings are loaded from the SSM Parameter Store at /felix/travis. It needs the following settings:

  • token: A TravisCI API Key. You can see the Travis docs for information on generating this.

IAM User Configuration

Felix uses IAM usernames and paths to intuit basic information about what the user is used for and where the keys are stored.

As an example, /service/travis/Cimpress-MCP/felix@travis describes the IAM user used for this project.

Felix tries to manage all users under /service/. The next piece of the path (in this case, /travis/) tells Felix about the desired plugin it should use to manage this user. In this case, the travis plugin. When the user's information is passed to the plugin, it uses the rest of the information to figure out how to address that user's credentials in the service. In this case, it uses the Travis API to manage environment variables in the Cimpress-MCP/Felix repository.

The @travis at the end of the username is discarded by Felix and used only to avoid IAM username collisions in case you, for example, also used sumologic with your application and needed to manage an S3 hosted collector.

The cool thing about this is that Felix can manage all of your keys and users without you needing to write and maintain a complex configuration file. Your users are your source of truth.

IAM User Path Construction

  • GitLab: /service/gitlab/[group]/[project]@gitlab
    • Note: subgroups do not work at this time.
  • Sumo: /service/sumo/[collector]/[source]@sumo
  • Travis: /service/travis/[org]/[repo]@travis

👩‍💻 Contributing

Contributions to this project are welcome. If you'd like to lend a hand have a member of the Cimpress Open Source community review for work for inclusion just do a standard pull request:

  1. Clone this repo
  2. Make a branch for your work
  3. Do your stuff
  4. Push your branch!
  5. Open a Merge Request.
  6. Your work will be reviewed, commented on, and/or merged.

Please note that your branch must pass our minimum commit checks prior to consideration: commit-checks

About

Automate the rotation of IAM keys used by third-party services.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published