Skip to content

docs: aws assume role doc improvement#5796

Merged
varonix0 merged 1 commit intomainfrom
daniel/aws-assume-role-docs
Mar 24, 2026
Merged

docs: aws assume role doc improvement#5796
varonix0 merged 1 commit intomainfrom
daniel/aws-assume-role-docs

Conversation

@varonix0
Copy link
Copy Markdown
Member

Context

Added note to mention that the AssumeRole AWS connection method supports getting access key credentials from the runtime environment where Infisical is currently running.

Screenshots

Steps to verify the change

Type

  • Fix
  • Feature
  • Improvement
  • Breaking
  • Docs
  • Chore

Checklist

  • Title follows the conventional commit format: type(scope): short description (scope is optional, e.g., fix: prevent crash on sync or fix(api): handle null response).
  • Tested locally
  • Updated docs (if needed)
  • Updated CLAUDE.md files (if needed)
  • Read the contributing guide

@varonix0 varonix0 self-assigned this Mar 24, 2026
@mintlify
Copy link
Copy Markdown

mintlify bot commented Mar 24, 2026

Preview deployment for your docs. Learn more about Mintlify Previews.

Project Status Preview Updated (UTC)
infisical 🟢 Ready View Preview Mar 24, 2026, 5:15 PM

@maidul98
Copy link
Copy Markdown
Collaborator

Snyk checks have passed. No issues have been found so far.

Status Scan Engine Critical High Medium Low Total (0)
Open Source Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@greptile-apps
Copy link
Copy Markdown
Contributor

greptile-apps bot commented Mar 24, 2026

Greptile Summary

This PR improves the AWS Connection documentation by replacing a brief, vague one-liner with a properly formatted <Note> component that clearly explains automatic credential retrieval when Infisical is running on AWS compute.

Key changes:

  • Adds a <Note> block explicitly stating that static credentials are not required when INF_APP_CONNECTION_AWS_ACCESS_KEY_ID / INF_APP_CONNECTION_AWS_SECRET_ACCESS_KEY env vars are absent
  • Enumerates supported AWS credential sources: instance profile (EC2), task role (ECS), and IRSA (EKS)
  • Clarifies that the manual IAM User setup steps that follow only apply to non-AWS deployments (adds bold emphasis to not)
  • Content is technically accurate and aligns with the AWS SDK default credential provider chain behavior

Confidence Score: 5/5

  • Documentation-only change with accurate technical content; safe to merge.
  • Single MDX file changed with a well-scoped, technically accurate documentation improvement. No code logic, security concerns, or breaking changes involved.
  • No files require special attention.

Important Files Changed

Filename Overview
docs/integrations/app-connections/aws.mdx Replaces a vague plain-text note with a properly formatted Mintlify <Note> component that clearly explains automatic credential retrieval on AWS compute (EC2/ECS/EKS) and when it applies; also bolds "not" for emphasis. Change is accurate and improves clarity.

Reviews (1): Last reviewed commit: "Update aws.mdx" | Re-trigger Greptile

Copy link
Copy Markdown
Contributor

@scott-ray-wilson scott-ray-wilson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@varonix0 varonix0 merged commit 9678403 into main Mar 24, 2026
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants