Invalid security token error when using SSO-sourced profiles (regression since 3.47.0) #6782
Labels
auth-credentials
authentication, authorization, credentials, AWS Builder ID, sso
bug
We can reproduce the issue and confirmed it is a bug.
Problem
UPDATE: I have narrowed this down to a problem introduced between versions 3.46.0 and 3.47.0 of the extension. Version 3.46.0 behaves as expected. 3.47.0 behaves as described in this issue.
AWS Toolkit fails to authenticate profiles sourced from an authenticated SSO profile. AWS CLI and boto3 both function as expected and authenticate correctly.
There is no
~/.aws/credentials
file in play.get_aws_credentials.txt
aws_toolkit_sso_auth_debug.log
Sample
~/.aws/config
to reproduce the issue:Steps to reproduce the issue
Use the sample
~/.aws/config
file above, replacing redacted values with valid account ids and sso start url.Open VSCode, extensions, AWS Explorer, and see that it is "Connected with profile:default".
Attempt to switch connections to the test profile and receive the following error:
I have enabled debug level logging for the extension and captured the logs while reproducing the issue locally. Profile names in the debug log have not been redacted but you can see I have a number of available profiles. All of them use
source_profile = default
and[default]
is a valid SSO profile with valid, working credentials.I have attached a sample python script (with a
.txt
extension because I can't attach.py
files to an issue) that usesboto3
to print the current assumed role information when run withAWS_PROFILE
set to help demonstrate the difference in behavior between the extension and theboto3
python module. This code works as expected with profiles sourced from my default SSO profile.I have confirmed this issue is present for other users on my team and is not isolated to my individual system.
This behavior appears to have changed recently. I am not sure when exactly but using "sourced" profiles was working correctly until recently. Possibly within the last 2-3 weeks.
What else can I do to help troubleshoot/debug this behavior?
Expected behavior
All AWS profiles that are sourced from
default
should authenticate correctly as long as the SSO session is valid. The AWS CLI and boto3 both properly authenticate using profiles that "source" from an SSO profile.System details (run
AWS: About
and/orAmazon Q: About
)MacOS Sequoia 15.3.2
3.49.0
The text was updated successfully, but these errors were encountered: