Skip to content

Instantly share code, notes, and snippets.

@rdemoraes
Created February 2, 2022 20:43
Show Gist options
  • Save rdemoraes/c47e66ecac4a6f82b8a798bc1eeeddb4 to your computer and use it in GitHub Desktop.
Save rdemoraes/c47e66ecac4a6f82b8a798bc1eeeddb4 to your computer and use it in GitHub Desktop.
aws-assume-role.yml
.aws-assume-role:
script:
- |
#!/bin/bash
set -xe
if [[ ! -z $AWS_ACCOUNT_ID && ! -z $AWS_IAM_ROLE && ! -z $AWS_REGION ]]
then
echo 'Assuming role...'
session_name="${CI_COMMIT_SHORT_SHA}-`date +%Y%m%d`"
sts=( $(
aws sts assume-role \
--role-arn "arn:aws:iam::${AWS_ACCOUNT_ID}:role/${AWS_IAM_ROLE}" \
--role-session-name "$session_name" \
--query 'Credentials.[AccessKeyId,SecretAccessKey,SessionToken]' \
--output text
) )
export "AWS_ACCESS_KEY_ID=${sts[0]}"
export "AWS_SECRET_ACCESS_KEY=${sts[1]}"
export "AWS_SESSION_TOKEN=${sts[2]}"
export "AWS_DEFAULT_REGION=${AWS_REGION}"
fi
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment