[profile default] s3 = max_concurrent_requests = 13 max_queue_size = 1234 region = us-east-1 aws_access_key_id = ACCESS_KEY_SHARED aws_secret_access_key = SECRET_KEY_SHARED aws_session_token = TOKEN_SHARED [profile assumerole_prof] role_arn = arn:aws:iam:123456789012:role/foo source_profile = default [profile assumerole_mfa] role_arn = arn:aws:iam:123456789012:role/foo source_profile = default s3 = foo = bar mfa_serial = bar123456 [profile ar_plus_creds] source_profile = fooprofile role_arn = arn:aws:iam:123456789012:role/bar aws_access_key_id = ACCESS_KEY_ARPC aws_secret_access_key = SECRET_KEY_ARPC aws_session_token = TOKEN_ARPC [profile credentials_first] aws_access_key_id = ACCESS_FAIL_CFG aws_secret_access_key = SECRET_FAIL_CFG aws_session_token = TOKEN_FAIL_CFG region = us-west-1 [profile config_first] aws_access_key_id = ACCESS_KEY_CFG aws_secret_access_key = SECRET_KEY_CFG aws_session_token = TOKEN_CFG region = us-west-2 [profile assumerole_sc] source_profile = default role_arn = arn:aws:iam:123456789012:role/foo [profile creds_from_cfg] aws_access_key_id = ACCESS_KEY_SC0 aws_secret_access_key = SECRET_KEY_SC0 aws_session_token = TOKEN_SC0 [profile creds_from_sc] source_profile = fooprofile role_arn = arn:aws:iam:123456789012:role/foo [profile creds_from_sc_process] source_profile = creds_from_process role_arn = arn:aws:iam:123456789012:role/foo [profile ar_env_src] role_arn = arn:aws:iam:123456789012:role/foo credential_source = Environment [profile ar_ec2_src] role_arn = arn:aws:iam:123456789012:role/foo credential_source = Ec2InstanceMetadata [profile ar_ecs_src] role_arn = arn:aws:iam:123456789012:role/foo credential_source = EcsContainer [profile incomplete_cred] aws_access_key_id = ACCESS_KEY_SC1 aws_secret_access_key = SECRET_KEY_SC1 aws_session_token = TOKEN_SC1 [profile incomplete_cfg] aws_secret_access_key = SECRET_KEY_INC_CFG [profile ar_no_src] role_arn = arn:aws:iam::123456789012:role/fail [profile ar_bad_src] role_arn = arn:aws:iam::123456789012:role/fail source_profile = bad_src [profile ar_bad_csrc] role_arn = arn:aws:iam::123456789012:role/fail credential_source = ImaginaryCredentialProvider [profile ar_src_conflict] role_arn = arn:aws:iam::123456789012:role/fail source_profile = fooprofile credential_source = Ec2InstanceMetadata [profile bad_src] region = us-east-1 [profile creds_from_process] credential_process = echo '{ "Version": 1, "AccessKeyId": "AK_PROC1", "SecretAccessKey": "SECRET_AK_PROC1", "SessionToken": "TOKEN_PROC1" }' [profile ar_from_self] source_profile = ar_from_self role_arn = arn:aws:iam:123456789012:role/bar aws_access_key_id = ACCESS_KEY_ARPC aws_secret_access_key = SECRET_KEY_ARPC aws_session_token = TOKEN_ARPC [profile ar_web_identity] web_identity_token_file = my-token.jwt role_arn = arn:aws:iam::123456789012:role/foo source_profile = fooprofile aws_access_key_id = ACCESS_KEY_ARPC aws_secret_access_key = SECRET_KEY_ARPC aws_session_token = TOKEN_ARPC [profile ca_bundle] ca_bundle = /path/to/bundle.crt [profile endpoint_discovery_enabled] aws_access_key_id = AKID aws_secret_access_key = SECRET endpoint_discovery_enabled = true [profile endpoint_discovery_disabled] aws_access_key_id = AKID aws_secret_access_key = SECRET endpoint_discovery_enabled = false [profile sso_creds] sso_account_id = SSO_ACCOUNT_ID sso_role_name = SSO_ROLE_NAME sso_session = sso-test-session region = us-west-1 [profile sso_creds_mixed_legacy] sso_account_id = SSO_ACCOUNT_ID sso_role_name = SSO_ROLE_NAME sso_session = sso-test-session sso_region = us-east-1 sso_start_url = START_URL region = us-west-1 [profile sso_creds_mixed_legacy_mismatch] sso_account_id = SSO_ACCOUNT_ID sso_role_name = SSO_ROLE_NAME sso_session = sso-test-session sso_region = us-west-2 sso_start_url = DIFFERENT_START_URL region = us-west-1 [profile sso_creds_bad_session] sso_account_id = SSO_ACCOUNT_ID sso_role_name = SSO_ROLE_NAME sso_session = session-does-not-exist [sso-session sso-test-session] sso_region = us-east-1 sso_start_url = START_URL [profile sso_creds_legacy] sso_start_url = START_URL sso_region = us-east-1 sso_account_id = SSO_ACCOUNT_ID sso_role_name = SSO_ROLE_NAME region = us-west-1 [profile sso_creds_bad] sso_account_id = 123456789012 [profile ar_sso_src] source_profile = sso_creds role_arn = arn:aws:iam::123456789012:role/bar [profile sts_regional] aws_access_key_id = AKID aws_secret_access_key = SECRET sts_regional_endpoints = regional [profile sts_legacy] aws_access_key_id = AKID aws_secret_access_key = SECRET sts_regional_endpoints = legacy [profile use_fips_endpoint] use_fips_endpoint = true [profile use_dualstack_endpoint] use_dualstack_endpoint = true [profile s3_iad_regional] aws_access_key_id = AKID aws_secret_access_key = SECRET s3_us_east_1_regional_endpoint = regional [profile s3_iad_legacy] aws_access_key_id = AKID aws_secret_access_key = SECRET s3_us_east_1_regional_endpoint = legacy [profile web_only] web_identity_token_file = my-token.jwt role_arn = arn:aws:iam::123456789012:role/foo [profile ar_web_src] source_profile = web_only role_arn = arn:aws:iam::123456789012:role/bar [profile s3_use_arn_region] s3_use_arn_region = true [profile s3_do_not_use_arn_region] s3_use_arn_region = false [profile s3_disable_multiregion_access_points] s3_disable_multiregion_access_points = true [profile s3_do_not_disable_multiregion_access_points] s3_disable_multiregion_access_points = false [profile retry_mode_legacy] retry_mode = legacy [profile retry_mode_standard] retry_mode = standard [profile retry_mode_adaptive] retry_mode = adaptive [profile max_attempts] max_attempts = 1 [profile adaptive_retry_wait_to_fill] adaptive_retry_wait_to_fill = false [profile correct_clock_skew] correct_clock_skew = false [profile ec2_metadata_service_endpoint] ec2_metadata_service_endpoint = http://123.123.123.123 [profile ec2_metadata_service_endpoint_mode] ec2_metadata_service_endpoint_mode = IPv6 [profile assume_role_base] aws_access_key_id = ACCESS_KEY_BASE aws_secret_access_key = SECRET_KEY_BASE aws_session_token = TOKEN_BASE [profile assume_role_chain_a] source_profile = assume_role_base role_arn = arn:aws:iam:123456789012:role/role_a [profile assume_role_chain_b] source_profile = assume_role_chain_a role_arn = arn:aws:iam:123456789012:role/role_b [profile assume_role_source_and_credentials] source_profile = assume_role_base role_arn = arn:aws:iam:123456789012:role/role_a aws_access_key_id = ACCESS_KEY_DO_NOT_USE aws_secret_access_key = SECRET_KEY_DO_NOT_USE aws_session_token = TOKEN_DO_NOT_USE [profile assume_role_self_reference] source_profile = assume_role_self_reference role_arn = arn:aws:iam:123456789012:role/role_a aws_access_key_id = ACCESS_KEY_SELF aws_secret_access_key = SECRET_KEY_SELF aws_session_token = TOKEN_SELF [profile assume_role_chain_loop_a] source_profile = assume_role_chain_loop_b role_arn = arn:aws:iam:123456789012:role/role_a [profile assume_role_chain_loop_b] source_profile = assume_role_chain_loop_a role_arn = arn:aws:iam:123456789012:role/role_b [profile defaults_mode_standard] defaults_mode = standard [profile sdk_ua_app_id] sdk_ua_app_id = peccy-service [profile disable_request_compression] disable_request_compression = true [profile do_not_disable_request_compression] disable_request_compression = false [profile request_min_compression_size_bytes] request_min_compression_size_bytes = 100 [profile global_endpoint_url] endpoint_url = https://example.com:9000 [services dev_services] s3 = endpoint_url = https://example.com:9000 elastic_beanstalk = endpoint_url = http://localhost:8000 [profile service_specific_and_global_endpoint_url] endpoint_url = http://localhost:1234 services = dev_services