-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NoCredentialProviders: no valid providers in chain when adding a certain aws profile #4989
Comments
the aws cli is working well with the
|
I enabled
After I implemented workaround, change source_profile from
Because I use sso federation in aws profile, I wonder why sdk is looking for |
We tested on In this case, it seems that the SDK is not correctly recognizing the SSO federation credentials only from but AWS CLI is working fine with the same profiles, this might be a bug in the SDK |
Hi @HenryXie1 , Thanks for all the details, this is indeed an interesting behavior. If IRSA credentials fail, the logs would typically show a failed request to the OIDC identity provider and then to the STS AssumeRoleWithWebIdentity operation. Errors could include token validation issues, service errors, etc. Are you able to see any logs of errors with that credentials provider? Another thought I have was for you to set the desired profile explicitly in the SDK and see if that helps with resolving the issue, or at least would surface some more helpful errors. You can check out this blogpost . Let us know what you find. |
Hey @RanVaknin
no, do you know how to enable some debug trace for it?
I add below code to debug, but i don't see any output from sts client and error is also nil
After I change source_profile in e02-admin from e02 to d02(workaround)
It is weird that i don't see println for sts client info3 |
Hi @HenryXie1, We think this is an issue with how the SDK's INI loader parses numbers. @lucix-aws has raised a PR regarding a similar issue we saw on v2, and tested the ini parser with d02 as an argument without an issue, and then e02 and we saw an issue. It might be related. Thanks, |
@HenryXie1 -- Pursuant to @RanVaknin's comment above, release 1.45.15 has just been tagged, which should solve your issue. |
Great, thanks @lucix-aws @RanVaknin |
Please let us know if that unblocks you so we can close this out or investigate further. |
@lucix-aws I confirm the issue is fixed by upgrading aws go sdk to 1.45.15 |
|
Describe the bug
We have blow code to describe eks cluster
it works well before.
after we add below line in the ./aws/config , it starts error out
The error is
Expected Behavior
it was working well before we add
e02-admin
profile.Current Behavior
it error out after we add this profile in the .aws/config
profile e02 exists before this issue happens
Reproduction Steps
Add
e02-admin
profile in .aws/configthen the issue is reproduced
Possible Solution
change source_profile in
e02-admin
frome02
to others (ied02
)or
remove
e02-admin
from .aws/configthe issue is gone
Additional Information/Context
Go verison
SDK version used
1.45.9
Environment details (Version of Go (
go version
)? OS name and version, etc.)go version go1.19.1 darwin/amd64
The text was updated successfully, but these errors were encountered: