Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added Support for Explicitly Assuming AWS IAM Roles #55

Open
wants to merge 3 commits into
base: master
Choose a base branch
from

Conversation

brnquester
Copy link

Overview

This PR introduces a new feature that enables the application to explicitly assume an IAM role when interacting with AWS services.

This functionality supports two scenarios:

  1. Default Credentials: If no key and secret are provided, the application will assume the specified role using default credentials, such as an IAM role attached to an EC2 instance.
  2. Explicit Credentials: If key and secret are provided, the application will use the specified IAM user's credentials to assume the given role.

Key Changes:

  1. Added support for the assume_role option in the configuration.
  2. Implemented logic to handle role assumption using either default credentials or explicitly provided IAM user credentials.
  3. Updated documentation to reflect the new functionality.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant