-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWSCLIv2 SSO Profiles don't apprear to work with awsume #101
Comments
AWS SSO profile are not yet supported, but we are investigating the best way to add support |
AWS SSO profiles are indirectly supported through the recent support for the Support for the |
@mbarneyjr thank you for adding support for this, this has really helped us :) and it has been working great with the 4.5.0a4 version. |
4.5.0 has been released, sorry for the delay! We're still deciding between supporting AWS SSO natively or recommending the use of that tool described above to work with awsume for AWS SSO support, so for the time being I'll leave this issue open |
In case like this one or other similar cases where AWS SSO result in incompatibilities with your library and you don't want to play with workarounds or complicated fixes, maybe you can give a try to our open-source project: https://github.com/Noovolari/leapp. It deals with AWS SSO authentication and accounts/roles retrieval then it creates short-lived temporary credentials in .aws/credentials to maximize compatibility with third party tools / sdks. |
Hi @mbarneyjr, We developed an internal python script to do what What we basically do is to run the following with an existing SSO profile, and append it to a new_sso_role_creds = subprocess.run(
[
"aws",
"sso",
"get-role-credentials",
"--profile",
profile_name,
"--role-name",
sso_role_name,
"--account-id",
sso_account_id,
"--access-token",
sso_access_token,
"--region",
sso_region,
],
stderr=subprocess.PIPE,
stdout=subprocess.PIPE,
) How hard is to implement something in the existing I find the idea of using another tool for that not so nice, and would be willing to implement this. Thanks! |
Any updates on this? |
Any update on this? |
updates? |
it works for me after adding this line to each profile You can get aws-sso-credential-process from https://github.com/benkehoe/aws-sso-credential-process |
@francosalcedo @tchiaspko I have eventually moved on from |
Just to add my 2c, we have been using
|
note: this issue should be considered as a feature request for native support of SSO, as opposed to indirect support via |
Old v1 IAM profiles stored in
~/.aws/credentials
work fine. However, while the v2 SSO profiles show up in the list command, when I try to runawsume
on a v2 SSO profile, I get the following error:Here is my ~/.aws/config file:
Am I doing something wrong, or are CLIv2 profiles not supported? Thank you!
The text was updated successfully, but these errors were encountered: