File: shared_config

package info (click to toggle)
golang-github-aws-aws-sdk-go 1.44.133-1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 245,296 kB
  • sloc: makefile: 120
file content (189 lines) | stat: -rw-r--r-- 5,168 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
[default]
s3 =
  unsupported_key=123
  other_unsupported=abc

region = default_region

[profile alt_profile_name]
region = alt_profile_name_region

[short_profile_name_first]
region = short_profile_name_first_short

[profile short_profile_name_first]
region = short_profile_name_first_alt

[partial_creds]
aws_access_key_id = partial_creds_akid

[complete_creds]
aws_access_key_id = complete_creds_akid
aws_secret_access_key = complete_creds_secret

[complete_creds_with_token]
aws_access_key_id = complete_creds_with_token_akid
aws_secret_access_key = complete_creds_with_token_secret
aws_session_token = complete_creds_with_token_token

[full_profile]
aws_access_key_id = full_profile_akid
aws_secret_access_key = full_profile_secret
region = full_profile_region

[config_file_load_order]
region = shared_config_region
aws_access_key_id = shared_config_akid
aws_secret_access_key = shared_config_secret

[partial_assume_role]
role_arn = partial_assume_role_role_arn

[assume_role]
role_arn = assume_role_role_arn
source_profile = complete_creds

[assume_role_w_mfa]
role_arn = assume_role_role_arn
source_profile = complete_creds
mfa_serial = 0123456789

[assume_role_invalid_source_profile]
role_arn = assume_role_invalid_source_profile_role_arn
source_profile = profile_not_exists

[assume_role_w_creds]
role_arn = assume_role_w_creds_role_arn
source_profile = assume_role_w_creds
external_id = 1234
role_session_name = assume_role_w_creds_session_name
aws_access_key_id = assume_role_w_creds_akid
aws_secret_access_key = assume_role_w_creds_secret

[assume_role_w_creds_w_duration]
role_arn = assume_role_w_creds_role_arn
source_profile = assume_role_w_creds_w_duration
duration_seconds = 1800
external_id = 1234
role_session_name = assume_role_w_creds_session_name
aws_access_key_id = assume_role_w_creds_akid
aws_secret_access_key = assume_role_w_creds_secret

[assume_role_w_creds_w_invalid_duration]
role_arn = assume_role_w_creds_role_arn
source_profile = assume_role_w_creds_w_invalid_duration
duration_seconds = 600
external_id = 1234
role_session_name = assume_role_w_creds_session_name
aws_access_key_id = assume_role_w_creds_akid
aws_secret_access_key = assume_role_w_creds_secret

[assume_role_wo_creds]
role_arn = assume_role_wo_creds_role_arn
source_profile = assume_role_wo_creds

[assume_role_with_credential_source]
role_arn = assume_role_with_credential_source_role_arn
credential_source = Ec2InstanceMetadata

[multiple_assume_role]
role_arn = multiple_assume_role_role_arn
source_profile = assume_role

[multiple_assume_role_with_credential_source]
role_arn = multiple_assume_role_with_credential_source_role_arn
source_profile = assume_role_with_credential_source

[multiple_assume_role_with_credential_source2]
role_arn = multiple_assume_role_with_credential_source2_role_arn
source_profile = multiple_assume_role_with_credential_source

[with_sts_regional]
sts_regional_endpoints = regional

[with_s3_us_east_1_regional]
s3_us_east_1_regional_endpoint = regional

[valid_arn_region]
s3_use_arn_region=true

[profile sso_creds]
sso_account_id = 012345678901
sso_region = us-west-2
sso_role_name = TestRole
sso_start_url = https://127.0.0.1/start

[profile source_sso_creds]
role_arn = source_sso_creds_arn
source_profile = sso_creds

[profile invalid_sso_creds]
sso_account_id = 012345678901

[profile sso_and_static]
aws_access_key_id = sso_and_static_akid
aws_secret_access_key = sso_and_static_secret
aws_session_token = sso_and_static_token
sso_account_id = 012345678901
sso_region = us-west-2
sso_role_name = TestRole
sso_start_url = https://THIS_SHOULD_NOT_BE_IN_TESTDATA_CACHE/start

[profile sso_and_assume]
sso_account_id = 012345678901
sso_region = us-west-2
sso_role_name = TestRole
sso_start_url = https://127.0.0.1/start
role_arn = sso_with_assume_role_arn
source_profile = multiple_assume_role_with_credential_source

[profile source_sso_and_assume]
role_arn = source_sso_and_assume_arn
source_profile = sso_and_assume

[profile sso_mixed_credproc]
sso_account_id = 012345678901
sso_region = us-west-2
sso_role_name = TestRole
sso_start_url = https://127.0.0.1/start
credential_process = /path/to/process

[profile EC2MetadataServiceEndpoint]
ec2_metadata_service_endpoint = http://endpoint.localhost

[profile EC2MetadataServiceEndpointModeIPv6]
ec2_metadata_service_endpoint_mode = IPv6

[profile EC2MetadataServiceEndpointModeIPv4]
ec2_metadata_service_endpoint_mode = IPv4

[profile EC2MetadataServiceEndpointModeUnknown]
ec2_metadata_service_endpoint_mode = foobar

[profile EC2MetadataServiceEndpointAndModeMixed]
ec2_metadata_service_endpoint = http://endpoint.localhost
ec2_metadata_service_endpoint_mode = IPv6

[profile UseDualStackEndpointEnabled]
region = "us-west-2"
use_dualstack_endpoint=true

[profile UseDualStackEndpointDisabled]
region = "us-west-2"
use_dualstack_endpoint=false

[profile UseDualStackEndpointInvalid]
region = "us-west-2"
use_dualstack_endpoint=invalid

[profile UseFIPSEndpointEnabled]
region = "us-west-2"
use_fips_endpoint=True

[profile UseFIPSEndpointDisabled]
region = "us-west-2"
use_fips_endpoint=False

[profile UseFIPSEndpointInvalid]
region = "us-west-2"
use_fips_endpoint=invalid