You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thanks again for sharing this utility. I had another question for you --
It seems with support in aws-runas to output credentials as json with the -O json option, most of the pieces are in place to register aws_runas as an external credential sources as documented here.
However, I'm unable to get this to work. If I have a config that looks like this:
Then I try to run a simple aws cli command to test this out:
$ AWS_PROFILE=runas aws sts get-caller-identity
Partial credentials found in assume-role, missing: source_profile or credential_source
If I remove the 'role_arn` config from the profile, I get this:
$ AWS_PROFILE=runas aws sts get-caller-identity
Error when retrieving credentials from custom-process: 2020/05/14 22:13:19 FATAL Error getting credentials: InvalidParameter: 2 validation error(s) found.
- minimum field size of 20, AssumeRoleWithSAMLInput.PrincipalArn.
- minimum field size of 20, AssumeRoleWithSAMLInput.RoleArn.
Maybe this would work if there was a way to pass the role arn as a command line argument to aws_runas rather than try to read it from the configuration of the profile being referenced?
Or is there another way to do this already today without any changes?
Thanks.
The text was updated successfully, but these errors were encountered:
Hi Doug, sorry for taking a bit to get back to you. When this was originally proposed, I had found some caveats about how the configuration would need to be built. You can see #44 for the full details, but the specific bits can be found in this specific comment. Hopefully it will get you going!
Thanks for providing the link. I had thought to search through past issues before submitting this one and I'm scratching my head wondering how I missed the exact info I was looking for. The comments you referred me were the most informative description of the challenges with using credential_process with regards to different behaviors of the underlying SDK that I've come across. You've probably explained some behavior I'm seeing when I use aws-vault as a credential_process with python/boto based tools.
I will try your suggest out and close this issue. Thanks again. Cheers.
Thanks again for sharing this utility. I had another question for you --
It seems with support in
aws-runas
to output credentials as json with the-O json
option, most of the pieces are in place to register aws_runas as an external credential sources as documented here.However, I'm unable to get this to work. If I have a config that looks like this:
Then I try to run a simple aws cli command to test this out:
If I remove the 'role_arn` config from the profile, I get this:
Maybe this would work if there was a way to pass the role arn as a command line argument to aws_runas rather than try to read it from the configuration of the profile being referenced?
Or is there another way to do this already today without any changes?
Thanks.
The text was updated successfully, but these errors were encountered: