Allow using ec2 roles when specifying region endpoint
Signed-off-by: Lloyd Ramey <lnr0626@gmail.com>master
							parent
							
								
									252cc27ab1
								
							
						
					
					
						commit
						c8ea7840d3
					
				|  | @ -389,29 +389,19 @@ func New(params DriverParameters) (*Driver, error) { | |||
| 	} | ||||
| 
 | ||||
| 	awsConfig := aws.NewConfig() | ||||
| 	var creds *credentials.Credentials | ||||
| 	if params.RegionEndpoint == "" { | ||||
| 		creds = credentials.NewChainCredentials([]credentials.Provider{ | ||||
| 			&credentials.StaticProvider{ | ||||
| 				Value: credentials.Value{ | ||||
| 					AccessKeyID:     params.AccessKey, | ||||
| 					SecretAccessKey: params.SecretKey, | ||||
| 				}, | ||||
| 	creds := credentials.NewChainCredentials([]credentials.Provider{ | ||||
| 		&credentials.StaticProvider{ | ||||
| 			Value: credentials.Value{ | ||||
| 				AccessKeyID:     params.AccessKey, | ||||
| 				SecretAccessKey: params.SecretKey, | ||||
| 			}, | ||||
| 			&credentials.EnvProvider{}, | ||||
| 			&credentials.SharedCredentialsProvider{}, | ||||
| 			&ec2rolecreds.EC2RoleProvider{Client: ec2metadata.New(session.New())}, | ||||
| 		}) | ||||
| 	} else { | ||||
| 		creds = credentials.NewChainCredentials([]credentials.Provider{ | ||||
| 			&credentials.StaticProvider{ | ||||
| 				Value: credentials.Value{ | ||||
| 					AccessKeyID:     params.AccessKey, | ||||
| 					SecretAccessKey: params.SecretKey, | ||||
| 				}, | ||||
| 			}, | ||||
| 			&credentials.EnvProvider{}, | ||||
| 		}) | ||||
| 		}, | ||||
| 		&credentials.EnvProvider{}, | ||||
| 		&credentials.SharedCredentialsProvider{}, | ||||
| 		&ec2rolecreds.EC2RoleProvider{Client: ec2metadata.New(session.New())}, | ||||
| 	}) | ||||
| 
 | ||||
| 	if params.RegionEndpoint != "" { | ||||
| 		awsConfig.WithS3ForcePathStyle(true) | ||||
| 		awsConfig.WithEndpoint(params.RegionEndpoint) | ||||
| 	} | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue