@@ -166,8 +166,9 @@ protected AwsCredentialsProvider getDefaultProvider() {
166
166
167
167
@ Override
168
168
public AwsCredentials resolveCredentials () {
169
+ log .error ("RESOLVING CREDENTIALS!!" );
169
170
AwsCredentials credentials = loadCredentialsWithRetry ();
170
- if (credentials != null && shouldDebugCreds && log . isDebugEnabled () ) {
171
+ if (credentials != null && shouldDebugCreds ) {
171
172
logCallerIdentity (credentials );
172
173
}
173
174
return credentials ;
@@ -218,7 +219,7 @@ private void logCallerIdentity(AwsCredentials credentials) {
218
219
try {
219
220
StsClient stsClient = getStsClientForDebuggingCreds (credentials );
220
221
GetCallerIdentityResponse response = stsClient .getCallerIdentity ();
221
- log .debug ("The identity of the credentials is {}" , response .toString ());
222
+ log .error ("The identity of the credentials is {}" , response .toString ());
222
223
} catch (Exception e ) {
223
224
//If we run into an exception logging the caller identity, we should log the exception but
224
225
//continue running.
@@ -362,6 +363,7 @@ StsAssumeRoleCredentialsProvider createSTSRoleCredentialProvider(
362
363
return StsAssumeRoleCredentialsProvider .builder ()
363
364
.stsClient (stsClient )
364
365
.refreshRequest (roleRequest )
366
+ .asyncCredentialUpdateEnabled (true )
365
367
.build ();
366
368
}
367
369
@@ -379,6 +381,7 @@ StsAssumeRoleCredentialsProvider createSTSRoleCredentialProvider(
379
381
return StsAssumeRoleCredentialsProvider .builder ()
380
382
.stsClient (stsClient )
381
383
.refreshRequest (roleRequest )
384
+ .asyncCredentialUpdateEnabled (true )
382
385
.build ();
383
386
}
384
387
@@ -395,6 +398,7 @@ StsAssumeRoleCredentialsProvider createSTSRoleCredentialProvider(
395
398
return StsAssumeRoleCredentialsProvider .builder ()
396
399
.stsClient (getStsClientBuilder (Region .of (stsRegion )).build ())
397
400
.refreshRequest (roleRequest )
401
+ .asyncCredentialUpdateEnabled (true )
398
402
.build ();
399
403
}
400
404
}
0 commit comments