-
Notifications
You must be signed in to change notification settings - Fork 247
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for sso_session in .aws/config #699
Comments
You are correct—we haven't implemented support for |
Thank you |
Hi !
With this config file (output of [sso-session mysession]
sso_start_url = https://YYYYYYYY.awsapps.com/start/
sso_region = eu-west-1
sso_registration_scopes = sso:account:access
[profile dev]
sso_session = mysession
sso_account_id = XXXXXXXXX
sso_role_name = AdministratorAccess
region = eu-west-1
output = json
and this code : #[tokio::main]
pub async fn main() {
let config = aws_config::load_from_env().await;
let s3_client = aws_sdk_s3::Client::new(&config);
let bucket = s3_client.list_buckets().send().await.unwrap();
println!("bucket: {:?}", bucket);
}
[dependencies]
aws-config = { version = "0.57.1", features = [ "rustls","sso" ] }
aws-types = { version = "0.57.1" }
aws-credential-types = { version = "0.57.1" }
aws-sdk-s3 = { version = "0.35.0", features = ["rustls", "rt-tokio"]}
tokio = { version = "1.32.0", features = ["full"] } Is this intended to work @rcoh ? Should I submit a new issue or a discussion? Thanks a lot for your help! |
Sorry, I haven't gotten to implementing the profile file changes for this feature yet. I think it has a better chance of working if you manually setup the |
Thanks for your answer, very clear. |
This is the main tracking issue: #703 |
The January 25th release of the SDK includes support for |
Comments on closed issues are hard for our team to see. |
Describe the bug
I'm going to piggyback on this issue aws/aws-sdk-go#4649 since the description is the same.
It seems AWS cli configures the shared aws config with a new reusable
sso_session
section that is not parsed.Expected Behavior
aws_config able to use a configured sso-session (sso_region, sso_start_url) from the AWS cli.
Current Behavior
supplied snippets will fail with
or
respectively
If I add sso_region to a profile it will instead complain about a missing
sso_start_url
Reproduction Steps
.aws/config
Test with specific profile:
Test without profile:
Possible Solution
No response
Additional Information/Context
No response
Version
Environment details (OS name and version, etc.)
Logs
No response
The text was updated successfully, but these errors were encountered: