New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
pulumi up
is not supporting MFA tokens
#584
Comments
This sounds like it might be hashicorp/terraform-provider-aws#5592. |
BTW - I have seen several teams use tools like https://github.com/remind101/assume-role in order to assume a role (including an MFA-requiring role) as a separate step from the invocation of |
I had to apply remind101/assume-role#38 and thus build from source to make this work, but with that, |
Completely agreed. |
I can also recommend this one, which is more CI/CD firendly https://github.com/nordcloud/assume-role-arn |
@tdi thanks for the recommendation, looks nice. |
Is this still an issue? My security teams wants to turn on MFA, but I'm worried it is going to break my stuff. |
This has not been fixed. |
This and #1366 appear to be the same issue. That one has a little more recent relevant details - so closing this one out as a duplicate. |
Looks like there's no support for MFA tokens:
This is with the following AWS cli config:
I think this is because
awsbase.GetCredentials
(https://github.com/hashicorp/aws-sdk-go-base/blob/master/awsauth.go#L154) isn't usingAssumeRoleTokenProvider
as a session option.The text was updated successfully, but these errors were encountered: