Skip to content

Commit

Permalink
Don't require master credentials for federation token
Browse files Browse the repository at this point in the history
Fixes #1134
  • Loading branch information
christophgysin committed Mar 1, 2023
1 parent 8e5e8ac commit e040e00
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion cli/login.go
Original file line number Diff line number Diff line change
Expand Up @@ -106,7 +106,7 @@ func LoginCommand(input LoginCommandInput, f *vault.ConfigFile, keyring keyring.
} else {
// Use a profile from the AWS config file
ckr := &vault.CredentialKeyring{Keyring: keyring}
if config.HasRole() || config.HasSSOStartURL() {
if config.HasRole() || config.HasSSOStartURL() || config.HasCredentialProcess() {
// If AssumeRole or sso.GetRoleCredentials isn't used, GetFederationToken has to be used for IAM credentials
credsProvider, err = vault.NewTempCredentialsProvider(config, ckr)
} else {
Expand Down

0 comments on commit e040e00

Please sign in to comment.