ReadytoRocc commented on code in PR #38536:
URL: https://github.com/apache/airflow/pull/38536#discussion_r1555877716


##########
airflow/providers/hashicorp/_internal_client/vault_client.py:
##########
@@ -318,15 +322,23 @@ def _auth_azure(self, _client: hvac.Client) -> None:
             )
 
     def _auth_aws_iam(self, _client: hvac.Client) -> None:
-        if self.auth_mount_point:
+        if self.key_id or self.secret_id or self.role_id:
             _client.auth.aws.iam_login(
                 access_key=self.key_id,
                 secret_key=self.secret_id,
                 role=self.role_id,
                 mount_point=self.auth_mount_point,
             )
-        else:
-            _client.auth.aws.iam_login(access_key=self.key_id, 
secret_key=self.secret_id, role=self.role_id)
+        elif self.aws_conn_id:

Review Comment:
   Thanks Pankaj. My understanding is that it is the standard is to configure 
and manage all Secrets Backend configurations in `backend_kwargs`.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@airflow.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to