-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Assume Role Provider #13
Comments
@davidski I'm not sure I understand the request. The way I understand it this is already supported in |
Hi, Simon. Thanks for the dialog! As far as I understand (and my testing seems to verify) the cloudyr suite doesn't support chained profiles with external credential processes, in contrast to boto, Go, and other AWS interfaces. In those versions, I can have an
With this configuration and a boto/Go AWS SDK-based tool, I can set my profile (usually via an explicit call, but also via an envvar) to This is extremely helpful as I never have to set explicit accesskey, secretkey, and/or sessiontokens in my code, allowing secrets to be completely independent of my codebase. At the moment, I've not found any way out of the chicken-and-egg problem of having to pass an initial set of credentials to my R code. While there are various secrets management tools available for R, they'd all be something I'd have to setup just to manage AWS creds for R processes and would be one-offs while all of my other tooling "just works." 😉 Happy to go into more/different detail if that helps at all! |
I think what you are describing is already supported. If I understand you correctly, this is what you are doing: set_credentials(locate_credentials(profile="work"))
assume_role("arn:aws:iam::ACCOUNT_ID:role/ROLENAME", "session", use=TRUE) Is that correct? |
I wish, but it doesn't look like it. I neglected to be specific that while I have an
Wrapping that in |
Ah, ok, sorry, then you should file this with That said, getting a bit off topic, I was actually thinking of factoring that functionality out of |
Can do! Do you have access to the |
I have opened cloudyr/aws.signature#53 for this and would like to help with this ASAP. |
Ok, thanks, I'll close this and we can file things like support for |
Not sure if this belongs here or under
aws.signature
.Following up on this Twitter thread - https://twitter.com/dseverski/status/1233162504076976129, for consideration if someone is able to adopt the cloudyr aws suite. It would be wonderful to create support for the Assume Role Provider functionality present in boto3/botocore and documented at https://boto3.amazonaws.com/v1/documentation/api/latest/guide/configuration.html. Specifically, I'm looking to find support to read and honor the
source_profile
,mfa_serial
, andcredential_process
parameters. With these three,cloudyr/aws
could be used to transparently assume a role where credentials are not stored on disk in plaintext, but instead are retrieved via secure storage with a program such as aws-vault, assuming a role with temporary credentials.This is a complicated request, but is currently a missing feature in all of the R AWS packages and would be a tremendous add.
The text was updated successfully, but these errors were encountered: