Open temirlan-remington opened 3 months ago
Having exactly the same issues.
Looks like the AWS UI now presents a completely empty form, instead of giving the user the chance to correct the error in the role name.
AWS Extend Switch Roles is not involved in this Switch Role page. It merely emulates the action of clicking on the switch role history list on each AWS Management Console page. Therefore, it is up to AWS to fill in the parameters in the form when switching role is failed.
Having exactly the same issues.
Having exactly the same issues.
@tilfin, would be the case that the plugin is not passing the right values?
@tilfin when I try to fill the role values using URL https://signin.aws.amazon.com/switchrole?roleName=Admin!&account=123456797045
It keeps the values in the switch role page if they are invalid and not reset
@temirlan-remington When jumping from the AWS Management Console page, it is a POST request with a form body, which works differently from opening the URL with query parameters in a browser. If the POST request is invalid, the redirect will take you to the Switch Role form page. The process is handled by AWS, so AWS Extend Switch Roles cannot be involved.
I have confirmed that the form fields are also not filled when the switch fails by clicking on the link in the Role history in the AWS Management Console page.
Please request AWS to revert the switch failure behaviour.
the weird thing is that it still works in one of my browsers
I found that I only hit this problem when using a web proxy. If you are affected and can try without a proxy, see if it suddenly starts working.
Describe the bug When navigating to an account with the new UI change.
The switch role screen does not pre-fill the values.![Screenshot 2024-03-27 at 11 38 07](https://github.com/tilfinltd/aws-extend-switch-roles/assets/63333190/21ac5b30-b41c-4ae8-860f-d54b6ac2f51e)
To Reproduce Steps to reproduce the behaviour:
Expected behavior When reproducing the issue the expected behaviour of step 4 should be: Switch role should be pre-filled with:
Screenshots Screenshot in description
Additional context
We use role_arn parameter and for Elevated account we add ! at the end so it will rediret to switch account page and someone has to remove the ! and switch the role (Just to avoid accidental use of elevated account)
Sample config
[profile Production] role_arn = arn:aws:iam::XXXXXXXXXXXXX:role/AdminRole! source_profile = identity-account