-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[version 1.44] No valid credential sources found for AWS Provider #6462
Comments
Reverting to release -1 works as expected. |
Also seeing this issue. Reverting works as expected. |
Hi folks 👋 Similar to #6320 this may be related to upstream AWS Go SDK changes as I'm not aware to any changes in the provider authentication. My recommendation is to turn on Terraform debug logging in your environment (e.g. The only change upstream in this regard I'm aware of is aws/aws-sdk-go#2265 |
Here's a gist with debug error output: https://gist.github.com/cullenmcdermott/9e2e7641fc3cc88117645e4e848901ff When I run the same plan with 1.43.2 I see this in the debug output:
It looks like for whatever reason 1.44 isn't looking at my shared credentials file? |
Interesting, when I run it locally (I personally use
My shared credentials is nothing special with a few profiles defined like below (actual content omitted of course!)
Maybe try eliminating parts of your shared credentials file to see if the change in the SDK parsing behavior is maybe incorrectly parsing/invalidating the whole file due to "bad" section(s)? |
Same issue here ...
when using the latest version
Version 1.43.2 works fine
|
Same issue. Its ignoring the credentials in this release.
Reverting to previous version is fine. |
@bflad Not sure if this matters but in your output it looks like you are using v1.45.0 |
I'm experiencing this on |
In our case we narrowed this down to the fact we were using "pretty" formatting in our ini file. We generate a credentials file using short-lived tokens via tooling. Updating the tooling to not us pretty spacing fixed the issue with the newer aws sdk. Example ini format that stopped working with the upgrade
Having the tooling stop doing pretty alignment allowed the new provider to work
Our tool was basically putting whitespace around the equals for alignment, which wasn't working with the new SDK. |
Thanks @bshelton229, confirmed that resolves it for me as well. |
My team is using saml2aws and has run into this problem as well with both 1.44.0 and 1.45.0 of the aws provider. Can confirm that, on MacOS, |
Same as @livingstaccato we use saml2aws and this causes terraform to be non-functional. |
faced similar issue and @livingstaccato solution fixed issue for me on Mac. |
Looks like the aws sdk maintainers already PR'd a fix for this(aws/aws-sdk-go#2282) so it should be available soon. |
Once the AWS Go SDK is released with the fix (likely later today), we'll pull it in here to cut a release later today or tomorrow. |
Looks like their release is done. https://github.com/aws/aws-sdk-go/releases/tag/v1.15.79 |
Submitted the dependency update PR: #6524 |
The fix for this (AWS Go SDK update) is merged and will release with version 1.46.0 of the AWS provider, in a few minutes. 🚀 |
This has been released in version 1.46.0 of the AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Terraform Version
Affected Resource(s)
Terraform Configuration Files
Output
Expected Behavior
I expected terraform to respect my
AWS_PROFILE=saml
environment variable. 1.43.2 works but when I change my provider to 1.44.0 it no longer respects the variable. aws CLI and Packer both work fine so I know my credentials are good.Actual Behavior
The error above is produced
Steps to Reproduce
terraform apply
References
The text was updated successfully, but these errors were encountered: