Skip to content
This repository has been archived by the owner on May 18, 2021. It is now read-only.

setting AWS_PROFILE as part of exec leads to errors in some apps: #32

Merged
merged 1 commit into from
Mar 22, 2018

Conversation

dfuentes
Copy link
Contributor

  • Some apps (for example, packer) use the AWS_PROFILE setting to
    determine which profile to load out of ~/.aws/config shared config.
    The problem is that these profiles don't have associated
    credentials, so those applications fail. Instead, don't set
    profile, and the applications just use the AWS_ACCESS_KEY_ID and
    AWS_SECRET_ACCESS_KEY vars.

- Some apps (for example, packer) use the AWS_PROFILE setting to
  determine which profile to load out of ~/.aws/config shared config.
  The problem is that these profiles don't have associated
  credentials, so those applications fail.  Instead, don't set
  profile, and the applications just use the AWS_ACCESS_KEY_ID and
  AWS_SECRET_ACCESS_KEY vars.
@dfuentes dfuentes merged commit 7a1f1bc into master Mar 22, 2018
@alberts alberts deleted the dont-set-profile branch September 5, 2018 00:07
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant