-
Notifications
You must be signed in to change notification settings - Fork 647
Description
Describe the bug
Despite creating a new SecretsManagerClient with credentials included in the initialization options, the program uses fs.readFile to grab credentials off-disk. The SecretsManagerClient should be using the provided credentials and thus not use fs.readFile at all.
Your environment
aws/codebuild/standard:4.0 Linux image with [email protected] and [email protected]
SDK version number
@aws-sdk/[email protected]
Is the issue in the browser/Node.js/ReactNative?
Node.js
Details of the browser/Node.js/ReactNative version
Paste output of npx envinfo --browsers or node -v or react-native -v
v12.18.0
Steps to reproduce
If you create a new SecretsManagerClient like so
new SecretsManagerClient({ region: 'us-west-2', credentials: { accessKeyId: 'myAccessKey', secretAccessKey: 'mySecretKey' } })
and proceed to resolve the Promise, the slurpFile function from @aws-sdk/shared-ini-file-loader is used to grab credentials off the file system.
Observed behavior
While building a new Webpack project with SecretsManagerClient included therein, Webpack warns that there is "Unsafe builtin usage fs.readFile" pointing to the slurfFile function in @aws-sdk/shared-ini-file-loader/dist/es/index.js:87:17
Expected behavior
fs.readFile should not be invoked at all since credentials are passed to the client during initialization.
Additional context
This might possibly be related to #2027