nordcloud / assume-role-arnLinks
π€π©assume-role-arn allows you to easily assume an AWS IAM role in your CI/CD pipelines, without worrying about external dependencies.
β53Updated last year
Alternatives and similar repositories for assume-role-arn
Users that are interested in assume-role-arn are comparing it to the libraries listed below
Sorting:
- Tool for monitoring AWS CodePipeline status and pushing events to Datadog, Slack and Cloudwatch.β20Updated 2 years ago
- Serverless app designed for any customer with two or more accounts to view resources across accounts/regions in simple single pane of glaβ¦β108Updated 2 years ago
- A tool to show what AWS account and identity you're using.β93Updated 2 years ago
- Get AWS credentials from a profile to inject into other programsβ150Updated 2 years ago
- bash functions to help run aws-cli commands across roles in multiple accounts with MFAβ69Updated 6 years ago
- Undocumented AWS Management Console APIs SDK for Pythonβ50Updated 2 years ago
- A simple decorator to run Python functions across multiple AWS accounts, OUs and/or regions, with or without an AWS Organization.β98Updated 2 years ago
- Assume AWS IAM roles from GitHub Actions workflows with no stored secretsβ170Updated 4 years ago
- AWS Baseline to roll out into your Organizationβ134Updated 4 years ago
- A CLI tool for building simple to complex IAM policiesβ69Updated 2 years ago
- A python library exposing services that are not covered by the official boto3 library but are driven by undocumented APIs.β62Updated last year
- A simple library to generate IAM policy statements with no need to remember all the actions APIsβ154Updated 2 years ago
- AWS Landing Zone Template v2.4.6(Latest)β79Updated 2 years ago
- β63Updated last year
- This project is archived, but the idea of Terrastack lives on in the Terraform CDK. - https://github.com/hashicorp/terraform-cdkβ74Updated 5 years ago
- InGraph is a declarative infrastructure graph DSL for AWS CloudFormation.β47Updated 4 years ago
- CloudFormation Custom Types for Terraform resources.β58Updated last year
- Generates an IAM policy for the CloudFormation service role that adheres to least privilege.β111Updated 2 years ago
- aws-cloudformation-template-builder contains cfn-skeleton is a command line tool and Go library that consumes the published CloudFormatioβ¦β134Updated 2 years ago
- β185Updated last month
- Repo formerly known as mu-cdk. A.K.A Mu2. Pronounced: mew-tah-toeβ22Updated 3 years ago
- Retrospectively tag AWS resources so you can work out who created themβ111Updated 2 years ago
- The CloudFormation Provider Development Toolkit Go Plugin allows you to autogenerate Go code based on an input schema.β53Updated 2 years ago
- Example container image re-scan with Amazon ECRβ49Updated 4 years ago
- A helper extension that is used to assist in the development of the Console Recorder for AWS.β100Updated 5 years ago
- Generate Multi-Account IAM users/groups/roles/policies from a simple YAML configuration file and Jinja2 templates.β245Updated 4 years ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit aβ¦β39Updated 5 years ago
- Self-service creation and deletion of sandbox-style accounts.β345Updated 2 years ago
- Compare cost of DynamoDB On Demand versus your current Provisioned Capacity setup.β66Updated 6 years ago
- Python library to enable you to run custom AWS Config Rules at scale, using Lambda Layer.β98Updated 2 months ago