File: config_source_shared

package info (click to toggle)
golang-github-aws-aws-sdk-go-v2 1.30.3-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 662,428 kB
  • sloc: java: 16,875; makefile: 432; sh: 175
file content (103 lines) | stat: -rw-r--r-- 2,875 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
[profile env_var_credential_source]
role_arn = assume_role_w_creds_role_arn_env
credential_source = Environment

[profile invalid_source_and_credential_source]
role_arn = assume_role_w_creds_role_arn_bad
credential_source = Environment
source_profile = env_var_credential_source

[profile ec2metadata]
role_arn = assume_role_w_creds_role_arn_ec2
credential_source = Ec2InstanceMetadata

[profile ecscontainer]
role_arn = assume_role_w_creds_role_arn_ecs
credential_source = EcsContainer

[profile chained_assume_role]
role_arn = assume_role_w_creds_role_arn_chain
source_profile = ec2metadata

[profile cred_proc_no_arn_set]
credential_process = cat ./testdata/test_json.json

[profile cred_proc_arn_set]
role_arn = assume_role_w_creds_proc_role_arn
credential_process = cat ./testdata/test_json.json

[profile chained_cred_proc]
role_arn = assume_role_w_creds_proc_source_prof
source_profile = cred_proc_no_arn_set

[profile credentials_overide]
role_arn = assume_role_w_creds_role_arn_ec2
credential_source = Ec2InstanceMetadata

[profile sso_creds]
sso_account_id = 012345678901
sso_region = us-west-2
sso_role_name = TestRole
sso_start_url = https://127.0.0.1/start

[profile source_sso_creds]
role_arn = source_sso_creds_arn
source_profile = sso_creds

[profile assume_sso_and_static]
role_arn = assume_sso_and_static_arn
source_profile = sso_and_static

[profile sso_and_static]
aws_access_key_id = sso_and_static_akid
aws_secret_access_key = sso_and_static_secret
aws_session_token = sso_and_static_token
sso_account_id = 012345678901
sso_region = us-west-2
sso_role_name = TestRole
sso_start_url = https://THIS_SHOULD_NOT_BE_IN_TESTDATA_CACHE/start

[profile sso_invalid]
sso_account_id = 012345678901
sso_role_name = TestRole

[profile sso_mixed_credproc]
sso_account_id = 012345678901
sso_region = us-west-2
sso_role_name = TestRole
sso_start_url = https://127.0.0.1/start
credential_process = cat ./testdata/test_json.json

[profile sso_mixed_webident]
web_identity_token_file = ./testdata/wit.txt
role_arn = sso_mixed_webident_arn
sso_account_id = 012345678901
sso_region = us-west-2
sso_role_name = TestRole
sso_start_url = https://127.0.0.1/start

[profile sso-session-missing-region]
region = us-east-1
sso_session = sso-session-missing-region-dev
sso_account_id = 123456789012
sso_role_name = testRole

[sso-session sso-session-missing-region-dev]
sso_start_url = https://d-123456789a.awsapps.com/start

[profile sso-session-mismatched-region]
sso_session = sso-session-mismatched-region-dev
sso_region = us-east-1
sso_account_id = 123456789012
sso_role_name = testRole

[sso-session sso-session-mismatched-region-dev]
sso_start_url = https://d-123456789a.awsapps.com/start
sso_region = us-west-2

[profile webident]
web_identity_token_file = ./testdata/wit.txt
role_arn = webident_arn

[profile webident-partial]
web_identity_token_file = ./testdata/wit.txt