Merge pull request #2002 from lnr0626/1996-instance-roles-with-regionendpoint
Allow using ec2 roles when specifying region endpointmaster
						commit
						d0cdc4802b
					
				|  | @ -389,29 +389,19 @@ func New(params DriverParameters) (*Driver, error) { | |||
| 	} | ||||
| 
 | ||||
| 	awsConfig := aws.NewConfig() | ||||
| 	var creds *credentials.Credentials | ||||
| 	if params.RegionEndpoint == "" { | ||||
| 		creds = credentials.NewChainCredentials([]credentials.Provider{ | ||||
| 			&credentials.StaticProvider{ | ||||
| 				Value: credentials.Value{ | ||||
| 					AccessKeyID:     params.AccessKey, | ||||
| 					SecretAccessKey: params.SecretKey, | ||||
| 				}, | ||||
| 	creds := credentials.NewChainCredentials([]credentials.Provider{ | ||||
| 		&credentials.StaticProvider{ | ||||
| 			Value: credentials.Value{ | ||||
| 				AccessKeyID:     params.AccessKey, | ||||
| 				SecretAccessKey: params.SecretKey, | ||||
| 			}, | ||||
| 			&credentials.EnvProvider{}, | ||||
| 			&credentials.SharedCredentialsProvider{}, | ||||
| 			&ec2rolecreds.EC2RoleProvider{Client: ec2metadata.New(session.New())}, | ||||
| 		}) | ||||
| 	} else { | ||||
| 		creds = credentials.NewChainCredentials([]credentials.Provider{ | ||||
| 			&credentials.StaticProvider{ | ||||
| 				Value: credentials.Value{ | ||||
| 					AccessKeyID:     params.AccessKey, | ||||
| 					SecretAccessKey: params.SecretKey, | ||||
| 				}, | ||||
| 			}, | ||||
| 			&credentials.EnvProvider{}, | ||||
| 		}) | ||||
| 		}, | ||||
| 		&credentials.EnvProvider{}, | ||||
| 		&credentials.SharedCredentialsProvider{}, | ||||
| 		&ec2rolecreds.EC2RoleProvider{Client: ec2metadata.New(session.New())}, | ||||
| 	}) | ||||
| 
 | ||||
| 	if params.RegionEndpoint != "" { | ||||
| 		awsConfig.WithS3ForcePathStyle(true) | ||||
| 		awsConfig.WithEndpoint(params.RegionEndpoint) | ||||
| 	} | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue