@@ -210,12 +210,6 @@ void STSProfileCredentialsProvider::Reload()
210210 profileIt->second .SetCredentials ({});
211211 }
212212
213- // Check for credential_source usage
214- const auto credentialSource = profileIt->second .GetValue (" credential_source" );
215- if (!credentialSource.empty () && !m_credentials.IsEmpty ()) {
216- m_credentials.AddUserAgentFeature (Aws::Client::UserAgentFeature::CREDENTIALS_PROFILE_NAMED_PROVIDER);
217- }
218-
219213 AWS_LOGSTREAM_INFO (CLASS_TAG, " Profile " << profileIt->second .GetName ()
220214 << " has a role ARN. Attempting to load its source credentials from profile "
221215 << profileIt->second .GetSourceProfile ());
@@ -301,7 +295,12 @@ void STSProfileCredentialsProvider::Reload()
301295
302296 // get the role arn from the profile at the top of the stack (which hasn't been popped out yet)
303297 const auto arn = sourceProfiles.back ()->second .GetRoleArn ();
304- const auto & assumedCreds = GetCredentialsFromSTS (stsCreds, arn);
298+ auto assumedCreds = GetCredentialsFromSTS (stsCreds, arn);
299+
300+ if (!assumedCreds.IsEmpty ()) {
301+ assumedCreds.AddUserAgentFeature (Aws::Client::UserAgentFeature::CREDENTIALS_PROFILE_SOURCE_PROFILE);
302+ }
303+
305304 sourceProfiles.back ()->second .SetCredentials (assumedCreds);
306305 }
307306
@@ -312,11 +311,6 @@ void STSProfileCredentialsProvider::Reload()
312311 }
313312
314313 m_credentials = profileIt->second .GetCredentials ();
315-
316- if (!m_credentials.IsEmpty ()) {
317- m_credentials.AddUserAgentFeature (Aws::Client::UserAgentFeature::CREDENTIALS_PROFILE_SOURCE_PROFILE);
318- }
319-
320314 AWSCredentialsProvider::Reload ();
321315}
322316
0 commit comments