Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: role assumption in production #1194

Merged
merged 1 commit into from
Jan 22, 2025
Merged

Conversation

tjsilver
Copy link
Contributor

@tjsilver tjsilver commented Jan 22, 2025

What does this change?

Since the v2 SDK migration, we have been incorrectly authenticatinng the STS Assume Role Credentials Provider used by security-hq when integrating with other AWS accounts.

Instead of using the named Janus account profile (which will not exist in production), we omit the argument in order to use the default provider chain.

Since the v2 SDK migration, we have been incorrectly
authenticatinng the STS Assume Role Credentials Provider
used by security-hq when integrating with other AWS accounts.

Instead of using the named Janus account profile (which
will not exist in production), we omit the argument
in order to use the default provider chain.
@tjsilver tjsilver force-pushed the ts/af/fix-credentials-provider branch from cf98897 to 281cca6 Compare January 22, 2025 15:56
Copy link
Contributor

@adamnfish adamnfish left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@tjsilver tjsilver merged commit a178074 into main Jan 22, 2025
4 checks passed
@tjsilver tjsilver deleted the ts/af/fix-credentials-provider branch January 22, 2025 15:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants