-
Notifications
You must be signed in to change notification settings - Fork 250
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Custom credential chain not respecting profile_name property #788
Comments
Hey @xrl, thanks for submitting this issue. We'll add it to our backlog. |
How does your IMDSv1 provider read from the profile? In general, since you're providing a black-box provider, there's no way we could override the profile within it. |
Really hacky, just using
|
Got it—I think what we actually need in this case is more flexible ways of modifying the default credentials provider. The |
Hi team, Kudos to you for the amazing work you do on the AWS SDK for Rust. We are working with a custom Kubernetes provider we have. Our resources within this k8s provider communicate and utilize various AWS services (S3, SQS, etc). We have tried executing AWS S3 operations right from our kube2iam (annotated) pods using the AWS CLI and that works as expected without the need to do any login or sigin actions. Please introduce kube2iam authentication out of the box support in the AWS SDK for Rust! |
Closing this for now, as this isn't something that we plan on supporting in the near future. |
Comments on closed issues are hard for our team to see. |
Describe the bug
I build a workflow tool for my team -- one tool which is used in CI and on our individual machines. Our permissioning system is a little unfortunate, the CI system is trusted by multiple accounts with a cross account trust policy but our individual machines needs N tokens for the N AWS accounts we interact with.
I need to activate multiple profiles inside my code when it runs on a dev's computer. And when this code is run on our servers it needs to use IMDSv1 -- we are still using kube2iam. So I wanted to write a credential provider chain which prefers IMDSv1 but can also activate multiple profiles:
And the chain is defined like:
which I understand builds a nested chain like:
the issue is that setting
profile_name
on the root chain doesn't send theprofile_name
in to the nested chain.When I run the code above:
but if I force the profile as an ENV var:
so the ENV var punches through the layers and things work. How can I get the
profile_name
property to inherit in to the default chain?Expected Behavior
I would expect the
profile_name
to go in to the fall-through, wrapped chain.Current Behavior
The chain fails because profile_name isn't propagate. Setting
AWS_PROFILE
proves it could work if propagated.Reproduction Steps
See first note.
Possible Solution
No response
Additional Information/Context
No response
Version
The text was updated successfully, but these errors were encountered: