-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keep previous credentials when refresh fails #71
Keep previous credentials when refresh fails #71
Conversation
@dw-kihara Wouldn't this result in the inability to invalidate file credentials? 🤔 |
@onno-vos-dev Well, I overlooked that point. Maybe it whould be better to have a function to explicitly invalidate credentials, or an option to invalidate credentials for |
Hmm, I think this does not need tobe an option but mandatory behavior. I will modify this PR again. |
@onno-vos-dev I have reverted behavior of I wanted to prevent the automatic refresh from removing the credentials accidentaly, so the current pull request meets my requirements. Thank you for suggestion. |
This makes sense to me 👍 Would like to wait a day or two to see if any of the other maintainers have a different opinion than mine 👍 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a good behavioral change, thanks
Thank you @dw-kihara Tagged and released as 0.2.4: https://hex.pm/packages/aws_credentials/0.2.4 |
The current version of
aws_credentials
seems to have a bug around refreshing credentials.When refreshing fails, the stored credentials value is overwritten with
true
.Reproduction:
I suggest keeping the previous credentials when automatic refresh fails.