-
Notifications
You must be signed in to change notification settings - Fork 139
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Default AWS profile is set even if profile is configured #196
Comments
I have a commit that addresses this, but thinking the whole notion of the Maybe the better solution would be to remove it entirely, simplifying things in the process and making it more explicitly clear about expectations.
The other option is when no |
In my case, my script needs to fetch separate credentials for two profiles, so I call My workaround is to run
The last call is basically a no-op since I already have valid credentials for For my case, something like a |
Running into this as well and I am using a workaround by running |
Describe the bug
When using a profile, both [default] and [profile] entries are configured in the
~/.aws/credentials
file.To Reproduce
Steps to reproduce the behavior:
Example configuration:
classic
in the above example)~/.aws/credentials
[default]
section is empty or non-existentokta-awscli -o classic
and go through the auth flow~/.aws/credentials
[default]
section now exists and is duplicated by the[classic]
section with the same sts credentialsExpected behavior
Only the
[classic]
profile to be configuredOutput
Output of your okta-awscli run, using the
--debug
flag.Environment (please complete the following information):
Additional context
This also happens when the sts credentials are checked. For example, you can delete the
[default]
entry and leave the[classic]
entry and re-auth and it will re-add the[default]
section.The text was updated successfully, but these errors were encountered: