Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(cli): region specified in ~/.aws/credentials is ignored #32133

Merged
merged 12 commits into from
Nov 14, 2024
20 changes: 19 additions & 1 deletion packages/aws-cdk/lib/api/aws-auth/awscli-compatible.ts
Original file line number Diff line number Diff line change
Expand Up @@ -149,7 +149,25 @@ export class AwsCliCompatible {
*/
async function getRegionFromIni(profile: string): Promise<string | undefined> {
const sharedFiles = await loadSharedConfigFiles({ ignoreCache: true });
return sharedFiles?.configFile?.[profile]?.region || sharedFiles?.configFile?.default?.region;

// Priority:
//
// credentials come before config because aws-cli v1 behaves like that.
//
// 1. profile-region-in-credentials
// 2. profile-region-in-config
// 3. default-region-in-credentials
// 4. default-region-in-config

return getRegionFromIniFile(profile, sharedFiles.credentialsFile)
?? getRegionFromIniFile(profile, sharedFiles.configFile)
?? getRegionFromIniFile('default', sharedFiles.credentialsFile)
?? getRegionFromIniFile('default', sharedFiles.configFile);

}

function getRegionFromIniFile(profile: string, data?: any) {
return data?.[profile]?.region;
}

function tryGetCACert(bundlePath?: string) {
Expand Down
236 changes: 236 additions & 0 deletions packages/aws-cdk/test/api/aws-auth/awscli-compatible.test.ts
Original file line number Diff line number Diff line change
@@ -0,0 +1,236 @@
import * as os from 'os';
import * as path from 'path';
import * as fs from 'fs-extra';
import { AwsCliCompatible } from '../../../lib/api/aws-auth/awscli-compatible';

describe('AwsCliCompatible.region', () => {

beforeEach(() => {

// make sure we don't mistakenly point to an unrelated file
process.env.AWS_CONFIG_FILE = '/dev/null';
process.env.AWS_SHARED_CREDENTIALS_FILE = '/dev/null';

});

test('default region can be specified in config', async () => {

const config = `
[default]
region=region-in-config
`;

await expect(region({ configFile: config })).resolves.toBe('region-in-config');
});

test('default region can be specified in credentials', async () => {

const creds = `
[default]
region=region-in-credentials
`;

await expect(region({ credentialsFile: creds })).resolves.toBe('region-in-credentials');

});

test('profile region can be specified in config', async () => {

const config = `
[profile user1]
region=region-in-config
`;

await expect(region({ configFile: config, profile: 'user1' })).resolves.toBe('region-in-config');

});

test('profile region can be specified in credentials', async () => {

const creds = `
[user1]
region=region-in-credentials
`;

await expect(region({ credentialsFile: creds, profile: 'user1' })).resolves.toBe('region-in-credentials');

});

test('with profile | profile-region-in-credentials is priority 1', async () => {

const config = `
[default]
region=default-region-in-config

[profile user]
region=profile-region-in-config

`;

const creds = `
[default]
region=default-region-in-credentials

[user]
region=profile-region-in-credentials
`;

await expect(region({ credentialsFile: creds, configFile: config, profile: 'user' })).resolves.toBe('profile-region-in-credentials');
});

test('with profile | profile-region-in-config is priority 2', async () => {

const config = `
[default]
region=default-region-in-config

[profile user]
region=profile-region-in-config

`;

const creds = `
[default]
region=default-region-in-credentials

[user]
`;

await expect(region({ credentialsFile: creds, configFile: config, profile: 'user' })).resolves.toBe('profile-region-in-config');
});

test('with profile | default-region-in-credentials is priority 3', async () => {

const config = `
[default]
region=default-region-in-config

[profile user]

`;

const creds = `
[default]
region=default-region-in-credentials

[user]
`;

await expect(region({ credentialsFile: creds, configFile: config, profile: 'user' })).resolves.toBe('default-region-in-credentials');
});

test('with profile | default-region-in-config is priority 4', async () => {

const config = `
[default]
region=default-region-in-config

[profile user]

`;

const creds = `
[default]

[user]
`;

await expect(region({ credentialsFile: creds, configFile: config, profile: 'user' })).resolves.toBe('default-region-in-config');
});

test('with profile | us-east-1 is priority 5', async () => {

const config = `
[default]

[profile user]

`;

const creds = `
[default]

[user]
`;

await expect(region({ credentialsFile: creds, configFile: config, profile: 'user' })).resolves.toBe('us-east-1');
});

test('without profile | default-region-in-credentials is priority 1', async () => {

const config = `
[default]
region=default-region-in-config

`;

const creds = `
[default]
region=default-region-in-credentials

`;

await expect(region({ credentialsFile: creds, configFile: config })).resolves.toBe('default-region-in-credentials');
});

test('without profile | default-region-in-config is priority 2', async () => {

const config = `
[default]
region=default-region-in-config

`;

const creds = `
[default]

`;

await expect(region({ credentialsFile: creds, configFile: config })).resolves.toBe('default-region-in-config');
});

test('without profile | us-east-1 is priority 3', async () => {

const config = `
[default]

`;

const creds = `
[default]

`;

await expect(region({ credentialsFile: creds, configFile: config })).resolves.toBe('us-east-1');
});

});

async function region(opts: {
readonly configFile?: string;
readonly credentialsFile?: string;
readonly profile?: string;
}) {

const workdir = fs.mkdtempSync(path.join(os.tmpdir(), 'awscli-compatible.test'));

try {

if (opts.configFile) {
const configPath = path.join(workdir, 'config');
fs.writeFileSync(configPath, opts.configFile);
process.env.AWS_CONFIG_FILE = configPath;
}

if (opts.credentialsFile) {
const credentialsPath = path.join(workdir, 'credentials');
fs.writeFileSync(credentialsPath, opts.credentialsFile);
process.env.AWS_SHARED_CREDENTIALS_FILE = credentialsPath;
}

return await AwsCliCompatible.region(opts.profile);

} finally {
fs.removeSync(workdir);
}
}
Loading