Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for AWS profile credentials and STS assume role #42

Merged
merged 4 commits into from
Jan 19, 2022

Conversation

Raniz85
Copy link

@Raniz85 Raniz85 commented Oct 28, 2015

If the stack contains the key 'aws_profile' that profile will be
used when connecting to AWS

If the stack contains the key 'sts_role' that role ARN will be
assumed using STS when connecting to AWS. If a profile name is
configured that profile will be used for assuming the role.

If the stack contains the key 'aws_profile' that profile will be
used when connecting to AWS

If the stack contains the key 'sts_role' that role ARN will be
assumed using STS when connecting to AWS. If a profile name is
configured that profile will be used for assuming the role.
@Raniz85
Copy link
Author

Raniz85 commented Oct 28, 2015

This fixes #39

@Raniz85 Raniz85 force-pushed the aws-profile-and-sts branch from ee529b3 to a22ac22 Compare October 28, 2015 14:45
@Raniz85 Raniz85 force-pushed the aws-profile-and-sts branch from a22ac22 to 034c910 Compare October 28, 2015 14:47
Easier to do this than to have CFStack manage it's own connection
and handle profiles/STS assumed roles there too
@Raniz85 Raniz85 force-pushed the aws-profile-and-sts branch from 12c71fe to e93ee31 Compare October 29, 2015 10:09
@ryno75
Copy link

ryno75 commented Nov 10, 2015

I like it!

@Raniz85 Raniz85 closed this Jan 19, 2022
@peterkh peterkh reopened this Jan 19, 2022
@peterkh peterkh merged commit 46af92e into peterkh:master Jan 19, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants