-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
graceful handling of expired aws sso credentials #849
Comments
Update/clarification:
That's only true if
There's no reason to use explicit credentials, though, and we don't say anything about them here, so unless there's another way to trigger a long delay, I think that the original issue is moot. Ways to improve:
|
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 30 days. |
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 30 days. |
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 30 days. |
This issue was closed because it has been stalled for 90 days with no activity. |
I'm closing the following in favor of this issue:
turbot/steampipe#1103
#811
The story so far:
Per #847, there may or may not be a way to automate this flow if the user's setup doesn't accommodate a browser launch.
aws sts get-caller-identity --profile PROFILE
reports success, if~/.aws/config
looks like this:i.e., includes access_key/secret_key/secret_token from the command line or programmatic access link on the SSO start page, then those invalid credentials evidently override and there is again a several-minute timeout before
InvalidClientTokenId
is reported.@cbruno10, @dbmurphy are there any other pieces of this puzzle to include here?
The text was updated successfully, but these errors were encountered: