Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide possibility to assume AWS role (AWS STS) #21

Merged
merged 1 commit into from
May 14, 2019

Conversation

spa-87
Copy link
Contributor

@spa-87 spa-87 commented Mar 27, 2019

Hello

I've added a new CLI parameter assume-role which allows to leverage AWS "assume role" feature and thus to manage stacks in a different AWS account.
In our case developers have AWS accounts in the main account, but it's pretty limited permissions in the main account and a dedicated AWS subaccount for testing. When they test their code locally with Minikube, they should be able to test their Stack resources as well. The most suitable way to provide such possibility is to configure the CloudFormation operator to use the assume role feature.

@linki
Copy link
Owner

linki commented May 14, 2019

@spa-87 Thank you and sorry for the late response. I was travelling a bit. LGTM

@linki linki merged commit bebf371 into linki:master May 14, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants