-
Notifications
You must be signed in to change notification settings - Fork 653
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support AWS_ROLE_ARN Environment Variable with Environment Credential Provider #2867
Comments
It seems like it would make sense to include |
👍 to making AssumeRole more transparent. I'd love to be able to tell my app developers "just use this credential provider class" and then give me the ability to fully determine what identity their code runs as, and how it obtains that identity, entirely by setting environment variables. |
Any update with this? This functionality would be very useful in deployed envs i.e. k8s to be able to start sessions for specific profiles in code without needing to use a filesystem (for the shared config file). |
This would definitely make my pipelines easier as with a lot of them I have to download the cli to then assume a role to then use with a deploy utility. Making this available would remove the need for us to assume a role with packages that use the SDK internally to manage credentials. |
Hi @bflad , Thanks for the feature request. I think this is a reasonable request however this will need to be a cross-SDK effort and will require multi team planning. I'm going to transfer this into the Cross SDK repo for further consideration. Thanks, |
Transferring this to the SDK for Go v2 repo. |
Go v2 definitely supports these today, closing. |
This issue is now closed. Comments on closed issues are hard for our team to see. |
Feature description
The
AWS_ROLE_ARN
environment variable was recently added with the introduction of the web identity credential provider. It would be great if theAWS_ROLE_ARN
environment variable could also be used with the environment credential provider. This allows environments where disk access is not available or read-only to assume a role without a shared configuration file.An example workflow, given the following environment:
The environment credential provider would use the
AWS_ACCESS_KEY_ID
andAWS_SECRET_ACCESS_KEY
credentials to assume the givenAWS_ROLE_ARN
.Describe alternatives you've considered
Creating our own application-specific environment variable(s) (e.g.
AWS_ROLE_ARN
orTF_AWS_ROLE_ARN
) to trigger assuming a role automatically, at the risk of:AWS_
namespace and default AWS Go SDK behaviorAdditional context
References:
The text was updated successfully, but these errors were encountered: