-
Notifications
You must be signed in to change notification settings - Fork 878
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(gomod): Bumping AWS SDK version #714
Conversation
@autrilla It looks like there's some additional mock functions that are needed in |
|
Codecov Report
@@ Coverage Diff @@
## develop #714 +/- ##
===========================================
+ Coverage 36.28% 36.44% +0.15%
===========================================
Files 22 22
Lines 3205 3205
===========================================
+ Hits 1163 1168 +5
+ Misses 1922 1918 -4
+ Partials 120 119 -1
Continue to review full report at Codecov.
|
Ah cool, thank you! I just pushed the last commit after resolving Go dependencies. It's good to go from my side, let me know what you think. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks :). Glad such a simple change fixes the issues.
Oh, woops, you need to make this merge to |
Done; I also rebased against the |
@autrilla Is there anything else that's needed after the rebase? |
Nope, LGTM. Thanks! |
@autrilla Thank you sir! |
Bumps the AWS SDK version to support more types of credential chaining.
Description
It seems that the following issues:
Could potentially be helped with a simple bump of the AWS SDK version. Specifically my issue in the following comments...
...was resolved by simply bumping the AWS SDK version, compiling, and testing it out.
Motivation and Context
Credential chaining did not work for me even though it should. My AWS credentials are obtained via gimme-aws-creds through Okta. This means that the
~/.aws/credentials
file uses temporaryaws_access_key_id
andaws_secret_access_key
keys.Using
AWS_PROFILE=development
uses another profile as asource_profile
calledbase
; thebase
profile is the one that has the credentials obtained through the gimme-aws-creds CLI tool.Here are some example files:
~/.aws/credentials
~/.aws/config
The following error occurred when trying to create a new file:
Which made no sense because the AWS SDK solved this a while ago. The version of the AWS SDK Sops was using before this PR
v1.23.13
is now almost 1 year old.Types of changes
Checklist: