Skip to content

Commit

Permalink
Use default credential provider chain for AWS
Browse files Browse the repository at this point in the history
fixes #50

Signed-off-by: Jordan Jennings <[email protected]>
  • Loading branch information
jordanjennings committed Mar 11, 2022
1 parent 407ec03 commit a6998e1
Showing 1 changed file with 1 addition and 17 deletions.
18 changes: 1 addition & 17 deletions cmd/aws/aws.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,8 +24,6 @@ import (
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/aws/credentials"
"github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds"
"github.com/aws/aws-sdk-go/aws/ec2metadata"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/secretsmanager"
"github.com/boxboat/dockcmd/cmd/common"
Expand Down Expand Up @@ -122,21 +120,7 @@ func NewSecretsClient(opts ...SecretsClientOpt) (*SecretsClient, error) {
}

var creds = sess.Config.Credentials
if o.useChainCredentials {
creds = credentials.NewChainCredentials(
[]credentials.Provider{
&credentials.EnvProvider{},
&credentials.SharedCredentialsProvider{
Profile: o.profile,
},
&ec2rolecreds.EC2RoleProvider{
Client: ec2metadata.New(sess),
},
&SessionProvider{
Session: sess,
},
})
} else {
if !o.useChainCredentials {
if o.accessKeyID == "" || o.secretAccessKey == "" {
return nil, errors.New("no aws credentials provided")
}
Expand Down

0 comments on commit a6998e1

Please sign in to comment.