99designs / aws-vault

A vault for securely storing and accessing AWS credentials in development environments

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

`aws-vault login` not working

matthewhembree opened this issue · comments

  • I am using the latest release of AWS Vault
  • I have provided my .aws/config (redacted if necessary)
  • I have provided the debug output using aws-vault --debug (redacted if necessary)

This is occurring with a new laptop that I got yesterday. I see there are new releases that might be relevant to this breakage. It's likely that I haven't updated things in a while on my previous laptop.


Output from browser:
image

Text for search:

Only federation tokens or assume role tokens may be used for federated login. Please contact your administrator.

~/.aws/config (snippet):

[default]
region=us-west-2
output=json
credential_process=/opt/homebrew/bin/aws-vault exec default --json --no-session

debug output:

aws-vault login default --debug
2023/03/17 12:10:41 aws-vault v7.1.1
2023/03/17 12:10:41 Using prompt driver: terminal
2023/03/17 12:10:41 [keyring] Considering backends: [keychain]
2023/03/17 12:10:41 Loading config file /Users/username/.aws/config
2023/03/17 12:10:41 Parsing config file /Users/username/.aws/config
2023/03/17 12:10:41 [keyring] Querying keychain for service="aws-vault", keychain="aws-vault.keychain"
2023/03/17 12:10:41 [keyring] Found 3 results
2023/03/17 12:10:41 profile default: using stored credentials
2023/03/17 12:10:41 profile default: using GetSessionToken
2023/03/17 12:10:41 [keyring] Querying keychain for service="aws-vault", keychain="aws-vault.keychain"
2023/03/17 12:10:41 [keyring] Found 3 results
2023/03/17 12:10:41 [keyring] Querying keychain for service="aws-vault", keychain="aws-vault.keychain"
2023/03/17 12:10:41 [keyring] Found 3 results
2023/03/17 12:10:41 [keyring] Querying keychain for service="aws-vault", account="sts.GetSessionToken,ZGVmYXVsdA,,1679076560", keychain="aws-vault.keychain"
2023/03/17 12:10:41 [keyring] Found item "aws-vault session for default (expires 2023-03-17T18:09:20Z)"
2023/03/17 12:10:41 Re-using cached credentials ****************QXUN from sts.GetSessionToken, expires in 58m38.815681s
2023/03/17 12:10:41 Creating login token, expires in 58m38.815649s

Should this call sts.GetFederationToken instead?

edit: added text for searching.

I also tried using:
credential_process=/opt/homebrew/bin/aws-vault export default --format=json --no-session
Same result/error.

Works on v6.6.1 (uses GetFederationToken):

debug output:

av login default --debug
2023/03/17 12:38:07 aws-vault v6.6.1
2023/03/17 12:38:07 [keyring] Considering backends: [keychain]
2023/03/17 12:38:07 Loading config file /Users/username/.aws/config
2023/03/17 12:38:07 Parsing config file /Users/username/.aws/config
2023/03/17 12:38:07 [keyring] Querying keychain for service="aws-vault", keychain="aws-vault.keychain"
2023/03/17 12:38:07 [keyring] Found 3 results
2023/03/17 12:38:07 Looking up keyring for 'default'
2023/03/17 12:38:07 [keyring] Querying keychain for service="aws-vault", account="default", keychain="aws-vault.keychain"
2023/03/17 12:38:07 [keyring] Found item "aws-vault (default)"
2023/03/17 12:38:08 Using GetFederationToken for credentials
2023/03/17 12:38:08 Looking up keyring for 'default'
2023/03/17 12:38:08 [keyring] Querying keychain for service="aws-vault", account="default", keychain="aws-vault.keychain"
2023/03/17 12:38:08 [keyring] Found item "aws-vault (default)"
2023/03/17 12:38:08 Generated credentials ****************WSNO using GetFederationToken, expires in 59m59.599642s
2023/03/17 12:38:08 Creating login token, expires in 59m59.599539s

@matthewhembree can you please test if v7.2.0-beta1 fixes your problem?

@mtibben yes, that resolves the issue. Validated with AWS and AWS-China.

Thanks!