Closed aacuadras closed 2 weeks ago
This PR has been automatically marked as stale because it has been open 30 days with no activity. Remove stale label or comment or this PR will be closed in 10 days
This PR was automatically closed because of stale in 10 days
Description
Extended functionality of
iam-assumable-role-with-oidc
to also allow assuming the role by trusted AWS principalsMotivation and Context
In some cases, it's needed to extend the trust policy of a role that gets assumed with OIDC to also be assumed by trusted principals in AWS. In my case, I need to allow some principals to assume the target roles locally without using OIDC, while maintaining the ability for a federated assumed role and without duplicating the role with different trust policies.
Breaking Changes
None
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request