Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

aws/session: Adding support for credential_source #2201

Merged
merged 3 commits into from
Oct 12, 2018
Merged

Conversation

xibz
Copy link
Contributor

@xibz xibz commented Oct 11, 2018

credential_source is a value supported by other SDKs to allow users to dictate where credentials are retrieved. The valid values for credential_source are EcsContainer, Ec2InstanceMetadata, and Environment.

#2005

@xibz xibz force-pushed the 2005 branch 3 times, most recently from 73f7744 to 48b8168 Compare October 11, 2018 21:12
@@ -1,5 +1,5 @@
[default]
s3 =
s3 =
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

don't think this file actually changed?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

removes unneeded whitespace

@@ -127,6 +129,11 @@ func loadSharedConfigIniFiles(filenames []string) ([]sharedConfigFile, error) {
func (cfg *sharedConfig) setAssumeRoleSource(origProfile string, files []sharedConfigFile) error {
var assumeRoleSrc sharedConfig

if len(cfg.AssumeRole.CredentialSource) > 0 {
cfg.AssumeRoleSource = &sharedConfig{}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you document why this check is for.

@xibz xibz merged commit 16cef77 into aws:master Oct 12, 2018
@aws-sdk-go-automation aws-sdk-go-automation mentioned this pull request Oct 12, 2018
rickard-von-essen added a commit to rickard-von-essen/packer that referenced this pull request Oct 15, 2018
This adds support for credential_source, see aws/aws-sdk-go#2201
Closes hashicorp#6717
q3aiml pushed a commit to q3aiml/chamber that referenced this pull request Jan 15, 2019
Picking up support for credential_source. This allows assuming a role
while using profile creds from ec2 instance metadata:
aws/aws-sdk-go#2201.
nickatsegment pushed a commit to segmentio/chamber that referenced this pull request Jan 18, 2019
Picking up support for credential_source. This allows assuming a role
while using profile creds from ec2 instance metadata:
aws/aws-sdk-go#2201.
@jasdel
Copy link
Contributor

jasdel commented May 15, 2019

This issue also fixed #1019

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants