fix(resources_aws): improve the aws credentials sourcing logic by offloading the selection logic to boto3#707
Merged
Thilak-KN merged 1 commit intovirt-s1:masterfrom Apr 24, 2026
Merged
Conversation
Collaborator
Author
|
@sourcery-ai review |
…loading the selection logic to boto3.
Collaborator
Author
|
@sourcery-ai review |
Reviewer's guide (collapsed on small PRs)Reviewer's GuideAdjusts AWS credential sourcing for EC2-related resources so that boto3’s default credential resolution is used whenever no profile is given or explicit AWS access key environment variables are present, preventing unintended profile usage. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Hey - I've left some high level feedback:
- The
if self.profile_name is None or os.environ.get('AWS_ACCESS_KEY_ID') is not Nonecondition is duplicated across multiple resources; consider extracting the credential/session selection into a shared helper to keep the logic consistent and easier to change in one place. - Relying only on
AWS_ACCESS_KEY_IDto decide to ignore the configured profile may be too narrow; consider checking for the full set of explicit credential env vars (AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY, and optionallyAWS_SESSION_TOKEN) to better reflect boto3’s intent and avoid ambiguous states. - It might be useful to log when the code is intentionally ignoring a provided
profile_namedue to environment credentials being set so that operators understand which auth source actually took precedence.
Prompt for AI Agents
Please address the comments from this code review:
## Overall Comments
- The `if self.profile_name is None or os.environ.get('AWS_ACCESS_KEY_ID') is not None` condition is duplicated across multiple resources; consider extracting the credential/session selection into a shared helper to keep the logic consistent and easier to change in one place.
- Relying only on `AWS_ACCESS_KEY_ID` to decide to ignore the configured profile may be too narrow; consider checking for the full set of explicit credential env vars (`AWS_ACCESS_KEY_ID`, `AWS_SECRET_ACCESS_KEY`, and optionally `AWS_SESSION_TOKEN`) to better reflect boto3’s intent and avoid ambiguous states.
- It might be useful to log when the code is intentionally ignoring a provided `profile_name` due to environment credentials being set so that operators understand which auth source actually took precedence.Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary by Sourcery
Bug Fixes: