• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

boto / botocore
29%
develop: 97%

Build:
Build:
LAST BUILD BRANCH: add_recursive_role_assumption
DEFAULT BRANCH: develop
Repo Added 11 Aug 2014 08:53PM UTC
Files 35
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

LAST BUILD ON BRANCH add_recursive_role_assumption
branch: SELECT
CHANGE BRANCH
x
  • No branch selected
  • 0.100.0
  • 0.101.0
  • 0.102.0
  • 0.103.0
  • 0.104.0
  • 0.105.0
  • 0.106.0
  • 0.107.0
  • 0.108.0
  • 0.109.0
  • 0.56.0
  • 0.62.0
  • 0.63.0
  • 0.64.0
  • 0.65.0
  • 0.66.0
  • 0.68.0
  • 0.69.0
  • 0.70.0
  • 0.73.0
  • 0.75.0
  • 0.76.0
  • 0.77.0
  • 0.78.0
  • 0.80.0
  • 0.81.0
  • 0.82.0
  • 0.83.0
  • 0.84.0
  • 0.85.0
  • 0.86.0
  • 0.88.0
  • 0.89.0
  • 0.90.0
  • 0.91.0
  • 0.92.0
  • 0.93.0
  • 0.94.0
  • 0.95.0
  • 0.96.0
  • 0.97.0
  • 0.98.0
  • 0.99.0
  • 1.0.0a1
  • 1.0.0a2
  • 1.0.0a3
  • 1.0.0b1
  • 1.4.10
  • 1.4.11
  • 1.4.12
  • 1.4.13
  • 1.4.14
  • 1.4.15
  • 1.4.16
  • 1.4.17
  • 1.4.18
  • 1.4.19
  • 1.4.20
  • 1.4.21
  • 1.4.22
  • 1.4.23
  • 1.4.24
  • 1.4.25
  • 1.4.26
  • 1.4.27
  • 1.4.28
  • 1.4.3
  • 1.4.4
  • 1.4.5
  • 1.4.6
  • 1.4.7
  • 1.4.8
  • 1.4.9
  • anon-clients
  • clients-only
  • develop
  • master
  • test-branch

pending completion
2756

Pull #946

travis-ci

Warren Turkal
Add recursive role assumption.

This change will allow a profile to use a profile that uses a role as a
source profile. This will allow hierarchies of profiles where a user is
used to assume a role which is then used to assume another role. This is
useful for when another account grants cross account access and the role
that can assume the other role is assumable by users. Here's an example.

~/.aws/credentials:
[default]
aws_access_key_id = <blah_id>
aws_secreet_access_key = <blah_secret>

~/.aws/config
[profile customer_accessor_role]
role_arn=arn:aws:iam:<my_acct_number>:role/customer_accessor_role
source_profile=default

[profile customer_role]
role_arn=arn:aws:iam:<customer_acct_number>:role/customer_role
source_profile=customer_accessor_role
external_id=<whatever>

Now I can do things like the following:
aws --profile customer_role s3 ls
Pull Request #946: Add recursive role assumption.

1440 of 4928 relevant lines covered (29.22%)

0.29 hits per line

Relevant lines Covered
Build:
Build:
4928 RELEVANT LINES 1440 COVERED LINES
0.29 HITS PER LINE
Source Files on develop
  • List 0
  • Changed 0
  • Source Changed 0
  • Coverage Changed 0
Coverage ∆ File Lines Relevant Covered Missed Hits/Line

Recent builds

Builds Branch Commit Type Ran Committer Via Coverage
2756 add_recursive_role_assumption Add recursive role assumption. This change will allow a profile to use a profile that uses a role as a source profile. This will allow hierarchies of profiles where a user is used to assume a role which is then used to assume another role. This i... Pull #946 26 Jul 2018 06:00PM UTC Warren Turkal travis-ci pending completion  
2437 develop Merge branch 'carl0FF-fix_create_serializer_without_validation' into develop * carl0FF-fix_create_serializer_without_validation: Small cleanup to serialize tests Fix create_serializer when called without validation Closes #797. push 23 Feb 2018 11:57AM UTC jamesls travis-ci pending completion  
2422 develop Don't use MD5 with s3v4 Pull #804 20 Feb 2018 10:10PM UTC JordonPhillips travis-ci pending completion  
2340 develop Wrap string bodies as StringIO There was an issue where young buckets would fail to PUT when virtual host addressing was used and when the body was a string of a few MB. This was because urllib3 will send the body as a separate request on file-l... Pull #780 17 Jan 2018 07:15AM UTC JordonPhillips travis-ci pending completion  
1698 develop Merge branch 'waiter-functional' into develop * waiter-functional: Add start of basic waiter model validation push 13 Mar 2017 07:57AM UTC jamesls travis-ci pending completion  
1670 develop Use **kwargs for method signatures Pull #576 07 Mar 2017 02:32AM UTC kyleknap travis-ci pending completion  
2792 develop Use MD5 to sign S3 SigV4 bodies S3 now supports optional SHA256 body signing, so this switches from SHA256 to MD5 to boost speed while reducing CPU and Memory usage when using sigv4 with S3. SHA256 will still be used on systems which do not suppo... Pull #920 15 Jun 2016 04:44PM UTC JordonPhillips travis-ci pending completion  
2790 1.4.28 Merge branch 'release-1.4.28' * release-1.4.28: Bumping version to 1.4.28 Update to latest models Switch cache keys to snake case Fix regression in stubber push 14 Jun 2016 11:01PM UTC James Saryerwinnie travis-ci pending completion  
2789 develop Merge branch 'release-1.4.28' into develop * release-1.4.28: Bumping version to 1.4.28 Update to latest models push 14 Jun 2016 10:56PM UTC James Saryerwinnie travis-ci pending completion  
2788 master Merge branch 'release-1.4.28' * release-1.4.28: Bumping version to 1.4.28 Update to latest models Switch cache keys to snake case Fix regression in stubber push 14 Jun 2016 10:51PM UTC James Saryerwinnie travis-ci pending completion  
See All Builds (1178)
  • Repo on GitHub
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc