Skip to content

Conversation

iwysiu
Copy link
Contributor

@iwysiu iwysiu commented Sep 30, 2025

The new keys are located at a new folder and there may be multiple of them, so updating the logic for that.

@iwysiu iwysiu requested a review from a team as a code owner September 30, 2025 22:14
@iwysiu iwysiu requested review from idastambuk and njvrzm and removed request for a team September 30, 2025 22:14
Copy link
Contributor

@njvrzm njvrzm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One blocking comment I'm afraid - let me know if you want to chat about approaches

}

creds := client.NewStaticCredentialsProvider(string(accessKey), string(secretKey), "")
_, err := creds.Retrieve(ctx)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unfortunately this doesn't actually validate the credentials - you don't get an error regardless of what strings you pass in. We could validate them here by using GetCallerIdentity or the like, but that takes a nontrivial amount of time so we probably don't want to do it every time.

One approach would be to set a global to aws-temp-credentials-1 and use that when choosing keys, then in WithAssumeRole if we get an error indicating the credentials are invalid (have to check what that looks like) we switch the global to aws-temp-credentials-2 and retry (once).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants