From 169fe810bc760a79e389ee94630466536f04e691 Mon Sep 17 00:00:00 2001 From: Bala FA Date: Wed, 18 Dec 2024 08:38:40 +0530 Subject: [PATCH] IamAwsProvider: fix url with role name (#1465) Signed-off-by: Bala.FA --- minio/credentials/providers.py | 16 ++++++---------- 1 file changed, 6 insertions(+), 10 deletions(-) diff --git a/minio/credentials/providers.py b/minio/credentials/providers.py index 718d245a..53073fd0 100644 --- a/minio/credentials/providers.py +++ b/minio/credentials/providers.py @@ -505,21 +505,17 @@ def retrieve(self) -> Credentials: headers = {"X-aws-ec2-metadata-token": token} if token else None # Get role name - res = _urlopen( - self._http_client, - "GET", - urlunsplit( - url_replace( - urlsplit(url), - path="/latest/meta-data/iam/security-credentials/", - ), + url = urlunsplit( + url_replace( + urlsplit(url), + path="/latest/meta-data/iam/security-credentials/", ), - headers=headers, ) + res = _urlopen(self._http_client, "GET", url, headers=headers) role_names = res.data.decode("utf-8").split("\n") if not role_names: raise ValueError(f"no IAM roles attached to EC2 service {url}") - url += "/" + role_names[0].strip("\r") + url += role_names[0].strip("\r") if not url: raise ValueError("url is empty; this should not happen") self._credentials = self.fetch(url, headers=headers)