Skip to content

Commit 09501ca

Browse files
fix: use DefaultCredentialsProvider for AWS environments instead of ProfileCredentialsProvider
1 parent 9853f62 commit 09501ca

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

src/main/java/com/amigoscode/config/AwsS3Config.java

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
import org.springframework.context.annotation.Bean;
55
import org.springframework.context.annotation.Configuration;
66
import software.amazon.awssdk.auth.credentials.AwsBasicCredentials;
7+
import software.amazon.awssdk.auth.credentials.DefaultCredentialsProvider;
78
import software.amazon.awssdk.auth.credentials.ProfileCredentialsProvider;
89
import software.amazon.awssdk.auth.credentials.StaticCredentialsProvider;
910
import software.amazon.awssdk.regions.Region;
@@ -43,12 +44,13 @@ public S3Client s3Client() {
4344
.pathStyleAccessEnabled(pathStyleEnabled)
4445
.build());
4546

46-
// Use MinIO credentials for local development, AWS profile for other environments
47+
// Use MinIO credentials for local development, default credentials chain for AWS
4748
if ("local".equals(activeProfile)) {
4849
builder = builder.credentialsProvider(StaticCredentialsProvider.create(
4950
AwsBasicCredentials.create(accessKeyId, secretAccessKey)));
5051
} else {
51-
builder = builder.credentialsProvider(ProfileCredentialsProvider.create());
52+
// Use default credentials provider chain (IAM roles, env vars, profiles, etc.)
53+
builder = builder.credentialsProvider(DefaultCredentialsProvider.create());
5254
}
5355

5456
if (StringUtils.isNotBlank(endpointOverride)) {

0 commit comments

Comments
 (0)