Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for configurable session duration for IAM Roles #527

Open
brakf opened this issue Feb 8, 2024 · 3 comments
Open

Add support for configurable session duration for IAM Roles #527

brakf opened this issue Feb 8, 2024 · 3 comments
Labels
enhancement New feature or request

Comments

@brakf
Copy link

brakf commented Feb 8, 2024

Is your feature request related to a problem? Please describe.
I have a long running process that requires me to have a longer session duration than the standard 1 hour. The process (Terraform) doesn't pull the refreshed credentials after it was first started. Probably an edge case, but maybe worth looking into.

I did investigate why Leapp has the current limitation of 1 hour, which is the maximum duration possible using role chaining. Technically it seems that Leapp is first generating a session token with the assumer session and then uses those credentials to assume the role, which leads to the 1 hour limitation.

Describe the solution you'd like
Why not use the IAM user credentials to assume the role directly, cutting the first session token which seems unnecessary and hence allowing configurable session durations. (I assume you designed it that way due to the way MFA is enforced, but I am not sure).

Describe alternatives you've considered
Not using Leapp in those cases.

@brakf brakf added the enhancement New feature or request label Feb 8, 2024
@dreinhardt89
Copy link

Would love to see this, except the problem we are running into is glue / jupyter sessions (notebooks). Running some of these takes awhile and the devs keep getting timeouts

@ericvilla
Copy link
Contributor

ericvilla commented Jun 25, 2024

Hi @dreinhardt89, what language are you using? Instantiating a new AWS client may be useful whenever the current session expires. In this way, the latest instance is going to embed refreshed credentials. Look at this blog post

@dreinhardt89
Copy link

dreinhardt89 commented Jul 15, 2024

@ericvilla this would require rewriting (and testing) a bunch of notebooks which isn't really feasible.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants