Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement support for Amazon STS #546

Closed
bwalding opened this issue May 11, 2015 · 4 comments
Closed

Implement support for Amazon STS #546

bwalding opened this issue May 11, 2015 · 4 comments
Milestone

Comments

@bwalding
Copy link

Use Case

  • users are configured in a single AWS account - account-master
  • they change roles into the target account using Amazon STS - e.g. account-child as s3manipulator

Mechanics

The mechanics of this is relatively simple

  • load base AWS credentials (or issue ephemeral credentials from EC2 metadata)
  • use credentials to acquire a second set of credentials using AssumeRole
  • use the new credentials to interact with S3

The configuration that is supplied is an IAM role to the AssumeRole API call - arn:aws:iam::<ACCOUNT>:role/<ROLE>.

An MFA token can be supplied at this stage if the target role requires one.

Related documentation

http://docs.aws.amazon.com/STS/latest/APIReference/Welcome.html

(I have created this ticket as I could find no information on how this is done in s3cmd, and wanted to create a lightning rod for discussion / patches etc - it is probable that I will implement this functionality if no one else has - it is generally quite easy to implement)

@cixelsyd
Copy link

Hello. Did you receive any input here from the s3cmd people? I have the exact same use case. I (briefly) read through the s3cmd code and it still does not appear to contain STS support. Support for STS would be greatly appreciated, and an excellent addition to the product!

@fviard
Copy link
Contributor

fviard commented Nov 10, 2015

@bwalding @cixelsyd Thanks for your messages.
I'm not specialist at all in this area, but iam support is not enough to support STS?
Otherwise, maintainers (including me) are pretty busy at this moment, but patches are kindly welcome and I promise to try to give a fast review if you try to implement that.

@s4mx
Copy link

s4mx commented Nov 5, 2018

Some of my account profile is mfa enabled and it seems s3cmd supports profile (#906) but not mfa enabled profile.

@fviard fviard added this to the 2.2.0 milestone Jul 5, 2021
@fviard
Copy link
Contributor

fviard commented Jul 5, 2021

Changes have been pushed to master (d761ead) to support STS with AssumeRole and AssumeRoleWebIdentity through the same aws cli env variables.

But, FYI, nothing was done to support mfa. Please open a new issue if "mfa" is something that you really need. Thanks

@fviard fviard closed this as completed Jul 5, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants