在 AWS 中,可以使用 IAM 角色和跨账户的信任关系来实现在不同 AWS 账户之间动态建立一方信任。以下是一个示例解决方案,包含使用 AWS SDK for Python (Boto3) 创建 IAM 角色和建立跨账户信任关系的代码示例:
import boto3
# 创建 IAM 客户端
iam_client = boto3.client('iam')
# 定义角色名和信任策略
role_name = 'CrossAccountRole'
trust_policy = {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "目标账户的账户ID"
},
"Action": "sts:AssumeRole"
}
]
}
# 创建角色
response = iam_client.create_role(
RoleName=role_name,
AssumeRolePolicyDocument=json.dumps(trust_policy)
)
# 获取角色的 Amazon 资源标识符 (ARN)
role_arn = response['Role']['Arn']
# 在源账户中创建一个策略
policy_name = 'CrossAccountPolicy'
policy_document = {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::example-bucket/*"
}
]
}
response = iam_client.create_policy(
PolicyName=policy_name,
PolicyDocument=json.dumps(policy_document)
)
# 获取策略的 Amazon 资源标识符 (ARN)
policy_arn = response['Policy']['Arn']
# 将策略附加到角色
iam_client.attach_role_policy(
RoleName=role_name,
PolicyArn=policy_arn
)
# 在目标账户中创建 IAM 用户
target_iam_client = boto3.client('iam')
response = target_iam_client.create_user(
UserName='CrossAccountUser'
)
# 获取用户的 Amazon 资源标识符 (ARN)
user_arn = response['User']['Arn']
# 将源账户中的角色与目标账户中的用户进行关联
source_iam_client = boto3.client('iam')
source_iam_client.attach_user_policy(
UserName='CrossAccountUser',
PolicyArn=policy_arn
)
source_iam_client.attach_role_policy(
RoleName=role_name,
PolicyArn=policy_arn
)
sts_client = boto3.client('sts')
# 获取源账户的角色凭证
response = sts_client.assume_role(
RoleArn=role_arn,
RoleSessionName='CrossAccountSession'
)
# 获取临时凭证
credentials = response['Credentials']
# 使用临时凭证创建一个新的 Boto3 客户端,该客户端将在目标账户中具有与源账户角色相同的权限
target_s3_client = boto3.client(
's3',
aws_access_key_id=credentials['AccessKeyId'],
aws_secret_access_key=credentials['SecretAccessKey'],
aws_session_token=credentials['SessionToken']
)
# 在目标账户中执行操作
response = target_s3_client.list_buckets()
print(response['Buckets'])
这样,我们就实现了在不同 AWS 账户之间动态建立一方信任的解决方案。在实际应用中,可以根据具体需求进行适当调整和扩展。