-
Notifications
You must be signed in to change notification settings - Fork 123
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add AWS SessionToken Support #189
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ishustava
approved these changes
Dec 1, 2021
peczenyj
pushed a commit
to peczenyj/go-discover
that referenced
this pull request
May 10, 2022
* add support for SessionToken in AWS credential resolver * add AWS AssumeRole configuration to AWS tests
acaloiaro
pushed a commit
to acaloiaro/go-discover
that referenced
this pull request
Nov 24, 2022
* add support for SessionToken in AWS credential resolver * add AWS AssumeRole configuration to AWS tests
acaloiaro
pushed a commit
to acaloiaro/go-discover
that referenced
this pull request
Nov 24, 2022
* add support for SessionToken in AWS credential resolver * add AWS AssumeRole configuration to AWS tests
peczenyj
pushed a commit
to peczenyj/go-discover
that referenced
this pull request
Dec 21, 2023
author Jeff Widman <jeff@jeffwidman.com> 1621366525 -0700 committer Tiago Peczenyj <tpeczenyj@weborama.com> 1703171978 +0100 Update tencent version Tencent pulled the previous tag of their API and switched to `v1` starting here: https://github.com/TencentCloud/tencentcloud-sdk-go#%E9%80%9A%E8%BF%87go-get%E5%AE%89%E8%A3%85%E6%8E%A8%E8%8D%90 As a result, currently `go get -d` is complaining in downstream repos, breaking Dependabot (among other things). So this fixes that. Fix hashicorp#172. Update CI badge to CircleCI The old badge was travis, and we have not used travis in some time. update dependency fix incompatibity issue hashicorp#183 Revert "fix incompatibity issue hashicorp#183" This reverts commit 986207c. Revert "update dependency" This reverts commit bc42ce5. update dependency github.com/denverdino/aliyungo fix incompatibity issue hashicorp#183 go mod tidy Add AWS SessionToken Support (hashicorp#189) * add support for SessionToken in AWS credential resolver * add AWS AssumeRole configuration to AWS tests Fix "Config options" links Apply suggestions from code review Co-authored-by: Blake Covarrubias <blake.covarrubias@gmail.com> deps: bump Azure/go-autorest to remove transitive jwt-go dependency with known vulnerability (hashicorp#174) update dependency github.com/denverdino/aliyungo Add AWS SessionToken Support (hashicorp#189) * add support for SessionToken in AWS credential resolver * add AWS AssumeRole configuration to AWS tests Fix "Config options" links Apply suggestions from code review Co-authored-by: Blake Covarrubias <blake.covarrubias@gmail.com> Add AWS endpoint definition as an option (hashicorp#194) Signed-off-by: obeyler <beyler_olivier@yahoo.fr> Feature/aws ecs support (hashicorp#197) * Add service argument to aws provider, where service can be either ec2 or ecs (defaulting to ec2) * Add optional ecs_cluster and ecs_family arguments Update tencentcloud-sdk-go modules Dependencies are available as individual go modules now. [COMPLIANCE] Update MPL 2.0 LICENSE Adding workflow .github/actions/acctest/action.yml .github/actions/tf-install/action.yml .github/workflows/acceptance.yml SHA-pin all 3rd-party actions Restrict workflow permissions Add actionslint Add dependabot Add CODEOWNERS Remove CircleCI configuration Remove unused local actions Update migration enable scleway acceptance test add success job add success job fix copy pasta Result of tsccr-helper -pin-all-workflows . Fix CVEs Need at least go 1.16 for the golang.org/x/net fixes Update github action to use go 1.16 Some dependencies needed 1.17 Set miekg/dns to 1.1.50 Result of tsccr-helper -log-level=info -pin-all-workflows . Update README.md Update README.md Update README.md Update README.md update vendor github.com/denverdino/aliyungo
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR adds AWS SessionToken credential support to the AWS provider in the case that you may use AssumeRole. Internally, we have changed from using a static set of AWS credentials to one that assumes a role of permissions instead so it cannot use just
AccessKeyID
andSecretAccessKey
anymore.I have modified the CircleCI configuration to do the AssumeRole and setting of environment variables to support this new credential too.
Successful run here: https://app.circleci.com/pipelines/github/hashicorp/go-discover/239/workflows/db90c9d3-4d8a-4862-9637-4b1c0c3e0626/jobs/1786
Not sure if we need to cut a new release of go-discover since this is niche use case.