Skip to content

adding assume roll to sqs-files go code#256

Open
0BL1V10N-55 wants to merge 4 commits into
refractionPOINT:masterfrom
0BL1V10N-55:sqs-files-assume_roll
Open

adding assume roll to sqs-files go code#256
0BL1V10N-55 wants to merge 4 commits into
refractionPOINT:masterfrom
0BL1V10N-55:sqs-files-assume_roll

Conversation

@0BL1V10N-55
Copy link
Copy Markdown

Added assume roll code to sqs-files client.go code.

Description of the change

Added assume roll code to sqs-files client.go code.

  1. Local Org (Same Account) - Without Role Assumption If you don't provide role_arn, it works exactly as before: → Uses the access_key/secret_key directly to access resources in the same AWS account
  2. Cross-Org (Different Account) - With Role Assumption If you do provide role_arn, it assumes the role:
    → Uses the access_key/secret_key to assume the role, then uses the assumed role credentials Why Both Work:
    Looking at client.go:125-137, the logic
    the role assumption is opt-in. If role_arn is empty or omitted, it skips that entire block and just uses your base credentials. No breaking changes!

Type of change

  • New feature (non-breaking change that adds functionality)

Added assume roll code to sqs-files client.go code.
1. Local Org (Same Account) - Without Role Assumption
If you don't provide role_arn, it works exactly as before:
→ Uses the access_key/secret_key directly to access resources in the same AWS account
2. Cross-Org (Different Account) - With Role Assumption
If you do provide role_arn, it assumes the role:
→ Uses the access_key/secret_key to assume the role, then uses the assumed role credentials
Why Both Work:
Looking at client.go:125-137, the logic
the role assumption is opt-in. If role_arn is empty or omitted, it skips that entire block and just uses your base credentials. No breaking changes!
Cloudtrail records arrive in a 5min array containing multiple records, added code to enable splitting the array into separate json events.
The sqs-files adapter now supports automatic splitting of CloudTrail events that contain multiple records.
found a issue were the assume role was requested more than once.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant