Skip to content

Commit dd85bb4

Browse files
committed
update
1 parent 771d621 commit dd85bb4

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

eth/signer_awskms.go

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ import (
55
"encoding/asn1"
66
"encoding/hex"
77
"fmt"
8+
"github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds"
9+
"github.com/aws/aws-sdk-go/aws/ec2metadata"
810
"math/big"
911
"os"
1012
"strings"
1113

1214
"github.com/aws/aws-sdk-go/aws"
1315
"github.com/aws/aws-sdk-go/aws/credentials"
14-
"github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds"
15-
"github.com/aws/aws-sdk-go/aws/ec2metadata"
1616
"github.com/aws/aws-sdk-go/aws/session"
1717
"github.com/aws/aws-sdk-go/service/kms"
1818
"github.com/ethereum/go-ethereum/accounts/abi/bind"
@@ -45,10 +45,11 @@ func NewKmsSigner(region, keyAlias, awsKey, awsSec string, chainId *big.Int) (*K
4545
}
4646
if awsKey == "profile" {
4747
cfg.Credentials = credentials.NewSharedCredentials("", awsSec)
48+
} else if awsKey == "iam" {
49+
// force use iam role, ignore cre or env
50+
cfg.Credentials = ec2rolecreds.NewCredentialsWithClient(ec2metadata.New(session.Must(session.NewSession())))
4851
} else if awsKey != "" && awsSec != "" {
4952
cfg.Credentials = credentials.NewStaticCredentials(awsKey, awsSec, "")
50-
} else {
51-
cfg.Credentials = ec2rolecreds.NewCredentialsWithClient(ec2metadata.New(session.Must(session.NewSession())))
5253
}
5354
sess, err := session.NewSession(cfg)
5455
if err != nil {

0 commit comments

Comments
 (0)