-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws/session: Adding support for credential_source #2201
Conversation
19c9027
to
8bfe2ca
Compare
73f7744
to
48b8168
Compare
…Metadata, and Environment
@@ -1,5 +1,5 @@ | |||
[default] | |||
s3 = | |||
s3 = |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
don't think this file actually changed?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
removes unneeded whitespace
aws/session/shared_config.go
Outdated
@@ -127,6 +129,11 @@ func loadSharedConfigIniFiles(filenames []string) ([]sharedConfigFile, error) { | |||
func (cfg *sharedConfig) setAssumeRoleSource(origProfile string, files []sharedConfigFile) error { | |||
var assumeRoleSrc sharedConfig | |||
|
|||
if len(cfg.AssumeRole.CredentialSource) > 0 { | |||
cfg.AssumeRoleSource = &sharedConfig{} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you document why this check is for.
This adds support for credential_source, see aws/aws-sdk-go#2201 Closes hashicorp#6717
Picking up support for credential_source. This allows assuming a role while using profile creds from ec2 instance metadata: aws/aws-sdk-go#2201.
Picking up support for credential_source. This allows assuming a role while using profile creds from ec2 instance metadata: aws/aws-sdk-go#2201.
This issue also fixed #1019 |
credential_source is a value supported by other SDKs to allow users to dictate where credentials are retrieved. The valid values for credential_source are
EcsContainer
,Ec2InstanceMetadata
, andEnvironment
.#2005