-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Assumed role #29
Comments
New version of ELBAS will grab creds from the Capistrano variable |
For what it's worth, here is how I do it with the new (v3) version :
it was definitely easier than the previous version ! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
In our setup developer are authenticated through our company but use a role on client company to deploy on their behalf and on their account.
Therefore we ask our client to create a role for us which we can assume for the intervention we do on their account.
I've added this patch which check for a
aws_assumed_role_arn
key in capistrano config and if present start a special session.I do not know how frequent our setup is but I'm sharing the code back with you since your gem basically saved me days of work :)
The text was updated successfully, but these errors were encountered: