You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
However, when running assume my-profile the AWS CLI will not automatically refresh credentials. This is because we are exporting AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, and AWS_SESSION_TOKEN.
We should detect if a credential_process is in use and then only set AWS_PROFILE. We should not set any of the env vars listed above, as they cause the AWS CLI to not automatically refresh credentials.
The text was updated successfully, but these errors were encountered:
@chrnorm -- this would be a really valuable feature, potentially solving several problems in one shot, I think:
needless refresh, as noted in the description
multiple terminal windows open with env vars that report AWS_SESSION_EXPIRATION relative to their last refresh, rather than the most recent one
incompatibilities with tools that are configured to use profiles ... but pick up the env vars instead (and again, could be multiples if you have multiple terminal windows open
+1 to this request. We have been trying to adopt this tool org wide, and having to --export on every terminal window is painful. It would be great \if the option could only populate the credentials file and set AWS_PROFILE variable.
If users have a credential_process configured, the AWS CLI automatically handles refreshing credentials when they expire.
However, when running
assume my-profile
the AWS CLI will not automatically refresh credentials. This is because we are exportingAWS_ACCESS_KEY_ID
,AWS_SECRET_ACCESS_KEY
, andAWS_SESSION_TOKEN
.We should detect if a
credential_process
is in use and then only setAWS_PROFILE
. We should not set any of the env vars listed above, as they cause the AWS CLI to not automatically refresh credentials.The text was updated successfully, but these errors were encountered: