state/remote/s3: Fix Bug with Assume Role for Federated IAM Account (#10067)
* Enable remote s3 state support for assume role - provide role_arn in backend config to enable assume role Fixes #8739 * Check for errors after obtaining credentials
This commit is contained in:
parent
057341acf8
commit
5718294386
|
@ -70,7 +70,12 @@ func s3Factory(conf map[string]string) (Client, error) {
|
|||
Token: conf["token"],
|
||||
Profile: conf["profile"],
|
||||
CredsFilename: conf["shared_credentials_file"],
|
||||
AssumeRoleARN: conf["role_arn"],
|
||||
})
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Call Get to check for credential provider. If nothing found, we'll get an
|
||||
// error, and we can present it nicely to the user
|
||||
_, err = creds.Get()
|
||||
|
|
|
@ -98,3 +98,4 @@ The following configuration options or environment variables are supported:
|
|||
`~/.aws/credentials` will be used.
|
||||
* `token` - (Optional) Use this to set an MFA token. It can also be
|
||||
sourced from the `AWS_SESSION_TOKEN` environment variable.
|
||||
* `role_arn` - (Optional) The role to be assumed
|
||||
|
|
Loading…
Reference in New Issue