Skip to content

Conversation

@iliapolo
Copy link
Contributor

@iliapolo iliapolo commented Mar 12, 2025

We neglected to configure the main credentials when assuming the file publishing role. The main credentials are where the profile is already configured.

Fixes #212


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

@aws-cdk-automation aws-cdk-automation requested a review from a team March 12, 2025 14:21
@codecov-commenter
Copy link

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 84.86%. Comparing base (1bef263) to head (c8eda35).

Additional details and impacted files
@@            Coverage Diff             @@
##             main     #224      +/-   ##
==========================================
- Coverage   84.91%   84.86%   -0.06%     
==========================================
  Files         208      208              
  Lines       35591    35593       +2     
  Branches     4609     4624      +15     
==========================================
- Hits        30223    30206      -17     
- Misses       5214     5236      +22     
+ Partials      154      151       -3     
Flag Coverage Δ
suite.unit 84.86% <100.00%> (-0.06%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

if (options.assumeRoleArn) {
config.credentials = fromTemporaryCredentials({
// dont forget the credentials chain.
masterCredentials: this.mainCredentials,
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have something similar in CDK CLI:

masterCredentials: mainCredentials.credentials,

@aws-cdk-automation aws-cdk-automation added this pull request to the merge queue Mar 13, 2025
Merged via the queue into main with commit f0ad96e Mar 13, 2025
30 checks passed
@aws-cdk-automation aws-cdk-automation deleted the epolon/cdk-assets-profile branch March 13, 2025 09:01
github-merge-queue bot pushed a commit to aws/aws-cdk-cli-testing that referenced this pull request Mar 17, 2025
…file` (#59)

Integration test for aws/aws-cdk-cli#224. Will
expectedly fail until the fix in the cli repo is released.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

cdk-assets: Does not use credentials from profile

4 participants