-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: config param IAM Role for cross-account #24
Comments
@JohnPreston can you use service account with IAM role which has permissions to the secrets? I think that would load creds to env vars where |
@JohnPreston I have raised a PR. This may not be exactly the issue you raised. It is a fix to the issue with using the approach @sappusaketh suggested. Please check if this aligns with your requirement. |
Hello. Therefore, simply with having the two properties shown above, you would have
@pauls-baby I don't see how this PR addresses this request, sorry :/ |
@JohnPreston Sorry I misunderstood your requirement. I thought the secret was in same account. You're right if that's the case my PR won't solve it. |
Hello,
Kindly submitting a feature request that: add a configuration parameter such as aws.sts.role.arn which would instruct to use credentials retrieved with sts.AssumeRole in order to perform the secretsmanager.GetSecretValue API Call.
With that would come two other configuration items
aws.sts.session.name - string - required - allows setting a session name as defined in API Call
aws.sts.external.id - string - optional - externalId as defined in the API Call
Thank you :)
The text was updated successfully, but these errors were encountered: