• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

boto / botocore / 2756
29%
develop: 97%

Build:
Build:
LAST BUILD BRANCH: add_recursive_role_assumption
DEFAULT BRANCH: develop
Ran 26 Jul 2018 06:00PM UTC
Jobs 1
Files 35
Run time 38s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

pending completion
2756

Pull #946

travis-ci

Warren Turkal
Add recursive role assumption.

This change will allow a profile to use a profile that uses a role as a
source profile. This will allow hierarchies of profiles where a user is
used to assume a role which is then used to assume another role. This is
useful for when another account grants cross account access and the role
that can assume the other role is assumable by users. Here's an example.

~/.aws/credentials:
[default]
aws_access_key_id = <blah_id>
aws_secreet_access_key = <blah_secret>

~/.aws/config
[profile customer_accessor_role]
role_arn=arn:aws:iam:<my_acct_number>:role/customer_accessor_role
source_profile=default

[profile customer_role]
role_arn=arn:aws:iam:<customer_acct_number>:role/customer_role
source_profile=customer_accessor_role
external_id=<whatever>

Now I can do things like the following:
aws --profile customer_role s3 ls
Pull Request #946: Add recursive role assumption.

1440 of 4928 relevant lines covered (29.22%)

0.29 hits per line

Jobs
ID Job ID Ran Files Coverage
2 2756.2 26 Jul 2018 06:00PM UTC 0
29.22
Travis Job 2756.2
Source Files on build 2756
Detailed source file information is not available for this build.
  • Back to Repo
  • Travis Build #2756
  • Pull Request #946
  • PR Base - develop (#2762)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc