-
Notifications
You must be signed in to change notification settings - Fork 240
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS credentials not handled correctly #191
Comments
+1 I can verify that there still are issues with how Role based authentications are handled in Fails:
Works:
(No AWS credentials set in environment nor credentials file) Tested using |
I am working on a PR for this as we speak. The lack of support AWS profiles and STS (AssumeRole) is showstopper for us. Using the default credential providers should work just fine here. |
Please fix this. |
There are various issues with the AWS credential handling when downloading from S3. #185 #157 #152 #22 gruntwork-io/terragrunt#775
I'm less familiar with the AWS SDK for Go, but in my experience with those for JavaScript and Python, the credential handling here [1] looks like it can be made simpler and more robust by using the SDK as documented [2].
The particulars about communicating with the EC2 (or ECS) metadata API, reading the shared config or credentials file, choosing a region, etc., are all handled by the SDK's default credential provider chain. The explicit provider chain constructed in
getAWSConfig
lacks support for various edge cases.Would you be open to a PR changing the way AWS sessions are created?
[1]
go-getter/get_s3.go
Lines 182 to 217 in da0323b
[2] "Configuring Credentials" section on https://docs.aws.amazon.com/sdk-for-go/api/
The text was updated successfully, but these errors were encountered: