• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

boto / botocore / 2756 / 2
29%
develop: 97%

Build:
Build:
LAST BUILD BRANCH: add_recursive_role_assumption
DEFAULT BRANCH: develop
Ran 26 Jul 2018 06:00PM UTC
Files 35
Run time 16s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

26 Jul 2018 06:00PM UTC coverage: 29.221% (-34.3%) from 63.478%
2756.2

Pull #946

travis-ci

Warren Turkal
Add recursive role assumption.

This change will allow a profile to use a profile that uses a role as a
source profile. This will allow hierarchies of profiles where a user is
used to assume a role which is then used to assume another role. This is
useful for when another account grants cross account access and the role
that can assume the other role is assumable by users. Here's an example.

~/.aws/credentials:
[default]
aws_access_key_id = <blah_id>
aws_secreet_access_key = <blah_secret>

~/.aws/config
[profile customer_accessor_role]
role_arn=arn:aws:iam:<my_acct_number>:role/customer_accessor_role
source_profile=default

[profile customer_role]
role_arn=arn:aws:iam:<customer_acct_number>:role/customer_role
source_profile=customer_accessor_role
external_id=<whatever>

Now I can do things like the following:
aws --profile customer_role s3 ls
Pull Request #946: Add recursive role assumption.

1440 of 4928 relevant lines covered (29.22%)

0.29 hits per line

Source Files on job 2756.2
  • Tree
  • List 0
  • Changed 0
  • Source Changed 0
  • Coverage Changed 0
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 2793
  • Travis Job 2756.2
  • 2ec1a19e on github
  • Prev Job for on add_recursive_role_assumption (#2762.1)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc