Skip to content

Conversation

@emilia-grant
Copy link
Contributor

This PR fixes a bug where the "check if the default profile exists and add it if it does" part of CredentialsConfig.generateAwsConfigOptions would clobber the value of Profile if it was empty . This would change the behavior of subsequent runs of CredentialsConfig.GenerateCredentialChain if it's run repeatedly on a CredentialsConfig. Since Profile doesn't get used anywhere, we just don't change it to default.

This is done because boundary-plugin-aws repeatedly calls GenerateCredentialChain on the same CredentialsConfig.

PCI review checklist

  • If applicable, I've documented a plan to revert these changes if they require more than reverting the pull request.

  • If applicable, I've worked with GRC to document the impact of any changes to security controls.

    Examples of changes to controls include access controls, encryption, logging, etc.

  • If applicable, I've worked with GRC to ensure compliance due to a significant change to the in-scope PCI environment.

    Examples include changes to operating systems, ports, protocols, services, cryptography-related components, PII processing code, etc.

@emilia-grant emilia-grant requested a review from a team as a code owner November 26, 2025 16:58
Copy link
Contributor

@ddebko ddebko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great job on this PR.

Copy link
Contributor

@louisruch louisruch left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@louisruch louisruch merged commit cd72f2a into main Dec 1, 2025
25 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants