Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix!: Irsa additional assumable principals #515

Conversation

sandeshgrangdan
Copy link

Description

Enhanced the iam-role-for-service-accounts-eks module to support additional trusted principals including both IAM roles and users.

Motivation and Context

To allow an IRSA role from one service to be assumed by an IRSA role in another service, supporting cross-service role assumption.

Breaking Changes

None

How Has This Been Tested?

  • I have updated at least one of the examples/* to demonstrate and validate my change(s)
  • I have tested and validated these changes using one or more of the provided examples/* projects
  • I have executed pre-commit run -a on my pull request

@sandeshgrangdan sandeshgrangdan changed the title Irsa additional assumable principals fix!: Irsa additional assumable principals Sep 8, 2024
@bryantbiggs
Copy link
Member

To allow an IRSA role from one service to be assumed by an IRSA role in another service, supporting cross-service role assumption.

Why?

@sandeshgrangdan
Copy link
Author

To allow an IRSA role from one service to be assumed by an IRSA role in another service, supporting cross-service role assumption.

Why?

I need to generate temporary credentials from an IRSA role that will be used by external applications. To manage these credentials, I have a separate key rotation application with its own role or user that will update the temporary credentials generated by the IRSA role.

@bryantbiggs
Copy link
Member

thank you for that info - unfortunately, I don't think that is a use case we are going to support here

@bryantbiggs bryantbiggs closed this Oct 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants