-
-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Missing credentials in config #154
Comments
Thanks for reporting, I was able to reproduce the issue. Setting the environment variable shouldn't help, the credentials are injected from the getSessionToken API and not read from the configuration file. Still don't know why this problem is manifesting only on this distro. |
The problem seems to be related to calling the STS client from the modal window (instead from the main application). Like this it loses the ability to access the keyring and defaults to the default credential chain provider, trying to load credentials from the file. I think it should be solved easily by returning the MFA token to main process, we'll fix this in the next release. |
Did you install libsecret-1-dev and gnome-keyring? Can you check into the password manager if the keys are being written inside the keyring?
After that could you try to remove and add again your MFA session? |
@hampsterx @pethron I tried to setup Leapp in a clean KDE Neon environment. By default, libsecret-1-dev seems to be already installing (verified it using apt list). If you don't install gnome-keyring, Leapp stores the secrets in the login keychain; on the other hand, after installing gnome-keyring and seahorse (to view keyrings and list secrets), Leapp stores secrets in a new "Default keyring" for which you have to specify the password used to unlock it. I found some inconsistencies in KDE Neon keyring, in the sense that I was not always able to reproduce @hampsterx issue, even if I followed the same steps from a pre-defined VMWare snapshot. My temporarily conclusion and suggestion, given the issue encountered by @hampsterx, is to:
@hampsterx please let us know if it does not work even after re-installing all the needed stuff. Cheers! |
I've finally managed to solve the bug! Basically, AWS IAM User access key id and secret access key saveSecret operations were issued in parallel; when a saveSecret operation is issued by Leapp for the first time, KDE Neon opens a modal in which the user must specify the password to unlock the "Default keyring" in which Leapp stores its secrets. When trying to store AWS IAM User access key id and secret access key, 2 modals will be opened by KDE Neon, one per secret (probably a concurrency problem). Unfurtunately you're allowed to insert the password and its confirmation only in one of the 2 modals; this prevents you to permit the second secret to be writtend down into the "Default keyring". @hampsterx may I ask you to build the solution locally and test it in your environment? The steps would be:
|
hi @ericvilla actually I did try installing Following your instructions now and it's working! Hooray!~ Stellar effort sir~ |
Glad to hear that @hampsterx!!! We will introduce this change in the next release |
Describe the bug
Create new session (AWS/IAM User), input MFA token and receive toast msg:
Leapp Version
0.6.1
Have tried setting this env var in bashrc and restarted but no effect.
Also searched repo but cannot find any reference to this.
AWS_SDK_LOAD_CONFIG site:https://github.com/Noovolari/leapp
Update: Just tried using "awsume" and works fine, can see
env | grep AWS
its injected that env var. hmmThe text was updated successfully, but these errors were encountered: