-
Notifications
You must be signed in to change notification settings - Fork 652
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
credential_process parsing failure #2455
Comments
Hi @guillaumekh , I can confirm the behavior and that by checking an older commit this went away. Will look into it with priority. Thanks, |
Will be resolved by #2461. I've removed the attempt at recreating the "escaping" routine we had from before ini2 which I evidently failed to match behaviorally. Readings of the test value before/after ini2 and with the new patch:
|
|
Describe the bug
I use the following
credential_process
command inside an ~/.aws/credentials file to source AWS credentials. It uses 1password-cli & jq to extract the credentials.This command worked reliably for years but is now broken. Likely root cause is the new ini2 parser.
Unless I'm misreading something, the command above is compliant with documentation.
Expected Behavior
SDK authenticates successfully using credentials sourced from
credential_process
Current Behavior
SDK fails to authenticate and outputs the following error message:
Reproduction Steps
The following ~/.aws/credentials files can be used to reproduce the failure. I have removed the 1password-cli call since it's not necessary to reproduce the bug.
This ~/.aws/credentials file is valid for the aws-cli. It works fine w/ aws-cli v2.15.10.
It fails with aws-sdk-go-v2 however.
Here is a test go file, to run w/
go run
Output is:
Possible Solution
Either documentation or the ini parser should probably be updated.
Additional Information/Context
No response
AWS Go SDK V2 Module Versions Used
github.com/aws/aws-sdk-go-v2 v1.24.1 // indirect
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.5.4 // indirect
github.com/aws/aws-sdk-go-v2/config v1.26.3 // indirect
github.com/aws/aws-sdk-go-v2/credentials v1.16.14 // indirect
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.14.11 // indirect
github.com/aws/aws-sdk-go-v2/internal/configsources v1.2.10 // indirect
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.5.10 // indirect
github.com/aws/aws-sdk-go-v2/internal/ini v1.7.2 // indirect
github.com/aws/aws-sdk-go-v2/internal/v4a v1.2.10 // indirect
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.10.4 // indirect
github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.2.10 // indirect
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.10.10 // indirect
github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.16.10 // indirect
github.com/aws/aws-sdk-go-v2/service/s3 v1.48.0 // indirect
github.com/aws/aws-sdk-go-v2/service/sso v1.18.6 // indirect
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.21.6 // indirect
github.com/aws/aws-sdk-go-v2/service/sts v1.26.7 // indirect
Compiler and Version used
go version go1.21.6 darwin/arm64
Operating System and version
macOS 14.2.1
The text was updated successfully, but these errors were encountered: