-
Notifications
You must be signed in to change notification settings - Fork 181
Refactor AWSSigV4 auth to support different AWSCredentialProviders #1389
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor AWSSigV4 auth to support different AWSCredentialProviders #1389
Conversation
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## 2.x #1389 +/- ##
=========================================
Coverage 98.38% 98.38%
- Complexity 3698 3699 +1
=========================================
Files 345 345
Lines 9113 9119 +6
Branches 585 586 +1
=========================================
+ Hits 8966 8972 +6
Misses 142 142
Partials 5 5
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
| LOG.info(awsCredentialsProvider.getClass()); | ||
| LOG.info("Access Key: {}", awsCredentials.getAWSAccessKeyId()); | ||
| LOG.info("Secret Key: {}", awsCredentials.getAWSSecretKey()); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are you sure that you want to log your passwords as plain text?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for pointing out...I was splitting a big PR and left these lines.
a34ceec to
a8dcece
Compare
Signed-off-by: Vamsi Manohar <reddyvam@amazon.com>
a8dcece to
93a82a8
Compare
Signed-off-by: Vamsi Manohar <reddyvam@amazon.com>
…1389) * Refactor AWSSigV4 auth to support different AWSCredentialProviders Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> * Added unit tests for sts assume role credentials provider Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> --------- Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> (cherry picked from commit 8583fd1)
…1389) * Refactor AWSSigV4 auth to support different AWSCredentialProviders Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> * Added unit tests for sts assume role credentials provider Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> --------- Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> (cherry picked from commit 8583fd1)
…1389) (#1396) * Refactor AWSSigV4 auth to support different AWSCredentialProviders Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> * Added unit tests for sts assume role credentials provider Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> --------- Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> (cherry picked from commit 8583fd1) Co-authored-by: vamsi-amazon <reddyvam@amazon.com>
…pensearch-project#1389) (opensearch-project#1396) * Refactor AWSSigV4 auth to support different AWSCredentialProviders Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> * Added unit tests for sts assume role credentials provider Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> --------- Signed-off-by: Vamsi Manohar <reddyvam@amazon.com> (cherry picked from commit 8583fd1) Co-authored-by: vamsi-amazon <reddyvam@amazon.com> Signed-off-by: Matthew Wells <matthew.wells@improving.com>
Description
Refactored sigv4auth support to use credential Providers.
Check List
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.