-
Notifications
You must be signed in to change notification settings - Fork 821
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add aws_vault_credential_process config option #1117
Conversation
AccessKeyID: aws.ToString(creds.AccessKeyId), | ||
SecretAccessKey: aws.ToString(creds.SecretAccessKey), | ||
SessionToken: aws.ToString(creds.SessionToken), | ||
CanExpire: true, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can this be determined from the AccessKeyID? Or is this value not important?
SSORoleName string `ini:"sso_role_name,omitempty"` | ||
WebIdentityTokenFile string `ini:"web_identity_token_file,omitempty"` | ||
WebIdentityTokenProcess string `ini:"web_identity_token_process,omitempty"` | ||
AWSVaultCredentialProcess string `ini:"aws_vault_credential_process,omitempty"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shall we make this the standard credential_process
?
@@ -166,6 +166,33 @@ func NewAssumeRoleWithWebIdentityProvider(k keyring.Keyring, config *Config) (aw | |||
return p, nil | |||
} | |||
|
|||
// NewAssumeRoleWithCredentialProcessProvider returns a provider that generates | |||
// credentials using AssumeRoleWithCredentialProcess | |||
func NewAssumeRoleWithCredentialProcessProvider(k keyring.Keyring, config *Config) (aws.CredentialsProvider, error) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
NewCredentialFromProcessProvider
Fixed in #1087 |
Adding
aws_vault_credential_process
as a configuration option in aws config. It allows specifying a command that will be executed to generate credentials. This is useful for supporting ad-hoc scenarios such as using as custom implementation of IAM Identity Provider logic that requires calling identity vendor specific APIs. This allows for using the security advantages of aws-vault while using a custom credentials source such as IDP CLI.