-
-
Notifications
You must be signed in to change notification settings - Fork 856
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Always lookup the security token #370
Conversation
Codecov Report
@@ Coverage Diff @@
## master #370 +/- ##
==========================================
- Coverage 76.05% 75.77% -0.28%
==========================================
Files 11 11
Lines 1566 1548 -18
==========================================
- Hits 1191 1173 -18
Misses 375 375
Continue to review full report at Codecov.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would follow the established pattern of pulling in values from the Django settings to avoid extra os.environ lookups.
storages/backends/s3boto.py
Outdated
@@ -238,10 +238,9 @@ def __init__(self, acl=None, bucket=None, **settings): | |||
self._connection = None | |||
self._loaded_meta = False | |||
|
|||
self.security_token = None | |||
self.security_token = self._get_security_token() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This will be less surprising and broken. So that setting KEY_ID and SECRET in settings.py doesn't prevent the ability to use the TOKEN.
BUT, I would set security_token
at line 180 following the same pattern as access_key
and secret_key
Agreed
… On Jul 28, 2017, at 15:46, Aaron McMillin ***@***.***> wrote:
@aarcro requested changes on this pull request.
I would follow the established pattern of pulling in values from the Django settings to avoid extra os.environ lookups.
In storages/backends/s3boto.py:
> @@ -238,10 +238,9 @@ def __init__(self, acl=None, bucket=None, **settings):
self._connection = None
self._loaded_meta = False
- self.security_token = None
+ self.security_token = self._get_security_token()
This will be less surprising and broken. So that setting KEY_ID and SECRET in settings.py doesn't prevent the ability to use the TOKEN.
BUT, I would set security_token at line 180 following the same pattern as access_key and secret_key
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub, or mute the thread.
|
7209e7b
to
cda5f52
Compare
No description provided.