-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add V2 support #106
Add V2 support #106
Conversation
2ceca0c
to
1411bd1
Compare
1ba87c0
to
d349c84
Compare
5fd7cfd
to
6481347
Compare
88c2b59
to
eb04120
Compare
End of session today. Note: using
|
410abd4
to
211b341
Compare
c5859c3
to
b75a7c4
Compare
b75a7c4
to
2eb0e47
Compare
137898a
to
76e72f0
Compare
We may have hit a bug in PS C:\src\aws-cli> git diff 5cdf69f5c562f1adc07ba95aa033c69dfe5e12f1 d3053cf6429bcffa0507e4aaf411486f61bd89d3 -- .\awscli\plugin.py
diff --git a/awscli/plugin.py b/awscli/plugin.py
index f993ec1f7..d47128a44 100644
--- a/awscli/plugin.py
+++ b/awscli/plugin.py
@@ -46,6 +46,10 @@ def _import_plugins(plugin_names):
plugins = []
for name, path in plugin_names.items():
log.debug("Importing plugin %s: %s", name, path)
- if '.' not in name:
+ if '.' not in path:
plugins.append(__import__(path))
+ else:
+ package, module = path.rsplit('.', 1)
+ module = __import__(path, fromlist=[module])
+ plugins.append(module)
return plugins Note that this change from - if '.' not in name:
+ if '.' not in path: But the closest open issue I could find is: Need to take a closer look before opening a pull request with Update: Stepping through, no bug in AWS CLI here. Then it calls (confirmed this with an equality check in Runs fine on @zdc217's machine, but goes boom in the CI/CD. Update with carefully considered technical conclusion: |
We're going to add this to our CI/CD to check if there's an import issue being buried by other layers of code:
Result: the distributed version cannot be |
Probably next step: do a manually install of AWS into our CI/CD to test more directly. |
Team discussion update - to close this out, we will need to pivot away from any reliance on
|
d2ffc8a
to
376480c
Compare
Per discussion today, we're looking to pivot toward a version that does not rely on the plugin system for V2. Let's refocus #106 on dropping the refresh-daemon. |
8add158
to
19a79ae
Compare
20df0f2
to
c328e94
Compare
c328e94
to
9d380fd
Compare
Plan is to drop the daemon, and use an external script for rotating the credentials.
Things left TODO:
credential_process
in~/.aws/credentials
duringaws configure
configure should clear ~/.aws/credentials #195.awscli
dependencylogin
,logout
, andconfigure
aws_get_credentials
aws_get_credentials
toaws-login-credentials
Add unit test forremove_credentials
Improve integration test for logout to reflect new behavior.Documentation:
aws logon help
,aws login configure help
, andaws logout help
login
,configure
, andlogout
online documentation as neededTesting left TODO:
raise_if_logged_out
Stretch Goals (DO NOT DO IN THIS PR):
--all
so thataws logout --all
clears all credentials & roles in~/.aws-logon/credentials
.--force
toaws logout
?aws login configure
. Pull from default or other existing profile.