bored-winter-60087
06/28/2024, 5:31 AMAWS_ACCESS_KEY_ID , AWS_SECRET_ACCESS_KEY, and AWS_REGION pulumi should use those credentials over anything in ~/.aws/credentials . I'm using aws-vault, e.g. aws-vault exec <profile> pulumi up, and I've checked with aws-vault exec <profile> aws sts get-caller-identity that both accounts are accessible as expected, but pulumi is using the credentials from the default profile in ~/.aws/credentials and ~/.aws/config.
Setting AWS_PROFILE=<profile> pulumi up works as expected, but I'd much rather use aws-vault or similar tooling.little-cartoon-10569
06/30/2024, 8:35 PMbored-winter-60087
06/30/2024, 9:45 PMlittle-cartoon-10569
06/30/2024, 9:54 PMaws: in your stack config?bored-winter-60087
06/30/2024, 9:55 PMbored-winter-60087
07/01/2024, 5:35 PMaws:region field in the stack config didn't do anythinglittle-cartoon-10569
07/01/2024, 8:09 PMbored-winter-60087
07/01/2024, 8:23 PMlittle-cartoon-10569
07/01/2024, 8:35 PMaws-vault setting AWS_ACCESS_KEY_ID and AWS_PROFILE? Can you run aws-vault exec env | grep AWS?bored-winter-60087
07/01/2024, 8:37 PMaws-vault exec testing -- env | grep AWS | cut -f 1 -d '=' | xclip
AWS_VAULT_BACKEND
AWS_VAULT
AWS_REGION
AWS_DEFAULT_REGION
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
AWS_SESSION_TOKEN
AWS_CREDENTIAL_EXPIRATIONbored-winter-60087
07/01/2024, 8:37 PMlittle-cartoon-10569
07/01/2024, 8:44 PMbored-winter-60087
07/01/2024, 8:46 PMAWS_SECRET_ACCESS_KEY and couldn't figure it outlittle-cartoon-10569
07/01/2024, 8:54 PMlittle-cartoon-10569
07/01/2024, 8:54 PM