+13
-11
@@ -25,16 +25,18 @@ const AWS = require('aws-sdk'); | ||
| ctrlSTS.assumeRole(ctrlParams, (ctrErr, ctrlCreds) => { | ||
| if (ctrErr) reject(ctrErr); | ||
| if (ctrErr) { | ||
| reject(ctrErr); | ||
| } else { | ||
| AWS.config.credentials = ctrlSTS.credentialsFrom(ctrlCreds); | ||
| AWS.config.credentials = ctrlSTS.credentialsFrom(ctrlCreds); | ||
| const trgtParams = { | ||
| RoleArn: `arn:aws:iam::${targetAccount}:role/${targetRole}`, | ||
| RoleSessionName: 'AssumedRole', | ||
| }; | ||
| const trgtParams = { | ||
| RoleArn: `arn:aws:iam::${targetAccount}:role/${targetRole}`, | ||
| RoleSessionName: 'AssumedRole', | ||
| }; | ||
| new AWS.STS().assumeRole(trgtParams, (trgtErr, trgtCreds) => { | ||
| if (trgtErr) reject(trgtErr); | ||
| resolve(trgtCreds.Credentials); | ||
| }); | ||
| new AWS.STS().assumeRole(trgtParams, (trgtErr, trgtCreds) => { | ||
| if (trgtErr) reject(trgtErr); | ||
| resolve(trgtCreds.Credentials); | ||
| }); | ||
| } | ||
| }); | ||
| }); |
+1
-1
| { | ||
| "name": "assumer", | ||
| "version": "0.1.1", | ||
| "version": "0.2.0", | ||
| "description": "Assume AWS IAM roles between Control account and Target accounts", | ||
@@ -5,0 +5,0 @@ "main": "index.js", |
15606
0.28%42
7.69%