Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add assume_aws_role_arn that uses EC2 instance profile #168

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

taylorsilva
Copy link
Member

@taylorsilva taylorsilva commented Jun 6, 2024

Setting this field will cause the S3 resource to assume the role specified using the Concourse workers IAM role to authenticate to the STS API

Closes #151


I want to explain why I've changed my mind about this kind of feature within resources now. The answer is, I've been working on AWS as a customer, and I now fully understand what others asking for this feature were trying to tell us. Using IAM auth is wayyyy more secure than making passing in hard-coded credentials. It is a much safer and sophisticated way of authenticating within the AWS platform. As someone that is running Concourse on AWS, I make use of this IAM authentication through the STS api all the time now. I'm now highly motivated to use this feature everywhere that I can as I've been convinced of its utility.

@taylorsilva taylorsilva force-pushed the assume-iam-role branch 4 times, most recently from 9b6040a to 2d846ba Compare June 8, 2024 14:57
Setting this field will cause the S3 resource to assume the role
specified using the Concourse workers IAM role to authenticate to the
STS API

Signed-off-by: Taylor Silva <dev@taydev.net>
and remove usage of deprecated ioutil package

Signed-off-by: Taylor Silva <dev@taydev.net>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support assuming an IAM Role
1 participant