Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support assuming an IAM Role #151

Open
bilbof opened this issue Jun 1, 2021 · 1 comment · May be fixed by #168
Open

Support assuming an IAM Role #151

bilbof opened this issue Jun 1, 2021 · 1 comment · May be fixed by #168

Comments

@bilbof
Copy link

bilbof commented Jun 1, 2021

Hi, would it be acceptable for the s3-resource to support assuming an IAM role before authenticating to S3?

Our use case is that we have credentials (access_key_id and secret_access_key) for an unprivileged user that can assume a role which permits access to restricted S3 buckets.

This might involve adding an aws_role_arn field to the source configuration.

I think this is a slightly different request to concourse/concourse#3023, as we're not looking to use EC2 instance profiles. This approach is similar to the implementation in concourse/registry-image-resource

I made a first pass at this in alphagov@1b44254.

@taylorsilva
Copy link
Member

With the way that commit implements it we'd be happy to merge a PR in for this feature.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants