-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathiam-role-import.py
60 lines (47 loc) · 1.83 KB
/
iam-role-import.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
import boto3
import json
def export_iam_roles(source_session):
iam_client = source_session.client('iam')
roles = []
paginator = iam_client.get_paginator('list_roles')
for page in paginator.paginate():
for role in page['Roles']:
# Exclude AWS-managed roles
if not role['Arn'].startswith('arn:aws:iam::aws:policy/'):
roles.append(role)
return roles
def import_iam_roles(target_session, roles):
iam_client = target_session.client('iam')
for role in roles:
role_name = role['RoleName']
assume_role_policy_document = json.dumps(role['AssumeRolePolicyDocument'])
try:
iam_client.create_role(
RoleName=role_name,
AssumeRolePolicyDocument=assume_role_policy_document,
Description=role.get('Description', ''),
MaxSessionDuration=role.get('MaxSessionDuration', 3600),
Tags=role.get('Tags', [])
)
print(f"Role {role_name} imported successfully.")
except iam_client.exceptions.EntityAlreadyExistsException:
print(f"Role {role_name} already exists in target account.")
def main():
# Create a session by assuming the role in the named profile
session = boto3.Session(profile_name='admin')
# Source AWS account credentials
source_session = boto3.Session(
aws_access_key_id='SOURCE_ACCESS_KEY',
aws_secret_access_key='SOURCE_SECRET_KEY',
region_name='us-east-1'
)
# Target AWS account credentials
target_session = boto3.Session(
aws_access_key_id='TARGET_ACCESS_KEY',
aws_secret_access_key='TARGET_SECRET_KEY',
region_name='us-east-1'
)
roles = export_iam_roles(source_session)
import_iam_roles(target_session, roles)
if __name__ == '__main__':
main()