Browse Source
dns_aws: add AWS_ROLE_ARN support for cross-account Route53 access
dns_aws: add AWS_ROLE_ARN support for cross-account Route53 access
When the EC2 running acme.sh is in a different AWS account than the Route53 zone, the instance role cannot directly manage DNS records. This adds AWS_ROLE_ARN support: when set, acme.sh uses the existing instance/container credentials to call STS AssumeRole and exchange them for temporary credentials that have access to the target zone. - Add _use_role() to call STS AssumeRole and update AWS_* credentials - Add _aws_sts_rest() to sign and send STS GET requests with AWS4-HMAC-SHA256 - Call _use_role() in dns_aws_add() and dns_aws_rm() after initial creds are loaded - Save/restore AWS_ROLE_ARN via _saveaccountconf_mutable - Static key credentials are not saved when using a role (existing behavior) - Tested on Ubuntu 22.04 ARM64 (Graviton) EC2pull/6886/head
1 changed files with 64 additions and 0 deletions
Write
Preview
Loading…
Cancel
Save
Reference in new issue