Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

switch to updated aws-sdk-go credentials #1801

Closed
wants to merge 2 commits into from

Conversation

pmoust
Copy link
Contributor

@pmoust pmoust commented May 5, 2015

Seems aws-sdk-go has changed a bit..

rant, golang dependency management (or lack thereof) sucks, should we vendor deps?

@radeksimko
Copy link
Member

rant, golang dependency management (or lack thereof) sucks, should we vendor deps?

I think there are some good sides of the current state - it forces you to deal with incompatibilities soon, instead of letting the SW die with old versions of dependencies. :P

I'm afraid the change will be more difficult than just replacing aws.DetectCreds with credentials.NewStaticCredentials, as the naming suggests, these are two different functions.

@radeksimko
Copy link
Member

#1804
cc @svanharmelen

@svanharmelen
Copy link
Contributor

Ah sorry @pmoust! I totally missed this one and just merged in PR #1804 to fix the same thing as I was working on some other PR's... So will close this one as it's already fixed now.

Still thanks for the PR and I'll make sure to double check first next time 😉

@radeksimko
Copy link
Member

@svanharmelen even though this is now working for the most basic examples, it's a step backward when looking at #1470

@svanharmelen
Copy link
Contributor

@radeksimko I actually executed a couple of acceptance tests and they run successfully (creating some instances and an S3 bucket), so could you point out any specific things that would break by this change?

Will also run a full AWS acceptance test cycle (running as we speak) to see what tests (if any) will not work with this fix.

As for #1470... I'm not sure if the current fix needs some additional work to better serve the changes made in that PR, but my intention at this moment was to fix the immediate issue (master being broken) so people can build and test with master again. Of course that doesn't mean any additional improvements and/or updates aren't welcome or maybe even needed...

@pmoust
Copy link
Contributor Author

pmoust commented May 5, 2015

@svanharmelen we were unable to build with current aws-sdk-go.

@pmoust
Copy link
Contributor Author

pmoust commented May 5, 2015

@svanharmelen ah I just checked you already merged ;) ty

@svanharmelen
Copy link
Contributor

@radeksimko just finished the AWS acceptance tests and did receive a coupe of errors, but those where not related to the credentials used but instead caused by changes in the logic and/or tests of the AWS provider... So it seems the tests aren't being run to consistently lately 😉

So for now I think the fix is good, but again there is always room for improvement... Thx!

@pmoust pmoust deleted the f-aws-credentials branch May 5, 2015 11:54
@catsby
Copy link
Contributor

catsby commented May 5, 2015

rant, golang dependency management (or lack thereof) sucks, should we vendor deps?

We've considered this. There is a mailing list thread on golang-nuts about an "official" type system here, but I suspect it's a ways off. Until then, we're just not sold on any current solutions out there.

As Radek said, there are some benefits to it

@mitchellh
Copy link
Contributor

Hm, I don't think that this will load credentials from the env anymore? I took a look at the upstream code and I don't think NewStaticCredentials will grab a lot of other types of creds anymore. I think we need to use NewChainCredentials and chain a series of providers.

@mitchellh
Copy link
Contributor

Whoops didn't see #1804

@ghost
Copy link

ghost commented May 3, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@ghost ghost locked and limited conversation to collaborators May 3, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants