-
Notifications
You must be signed in to change notification settings - Fork 141
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor AWSSigV4 auth to support different AWSCredentialProviders #1389
Refactor AWSSigV4 auth to support different AWSCredentialProviders #1389
Conversation
Codecov Report
📣 This organization is not using Codecov’s GitHub App Integration. We recommend you install it so Codecov can continue to function properly for your repositories. Learn more @@ Coverage Diff @@
## 2.x #1389 +/- ##
=========================================
Coverage 98.38% 98.38%
- Complexity 3698 3699 +1
=========================================
Files 345 345
Lines 9113 9119 +6
Branches 585 586 +1
=========================================
+ Hits 8966 8972 +6
Misses 142 142
Partials 5 5
Flags with carried forward coverage won't be shown. Click here to find out more.
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. |
LOG.info(awsCredentialsProvider.getClass()); | ||
LOG.info("Access Key: {}", awsCredentials.getAWSAccessKeyId()); | ||
LOG.info("Secret Key: {}", awsCredentials.getAWSSecretKey()); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are you sure that you want to log your passwords as plain text?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for pointing out...I was splitting a big PR and left these lines.
a34ceec
to
a8dcece
Compare
Signed-off-by: Vamsi Manohar <[email protected]>
a8dcece
to
93a82a8
Compare
Signed-off-by: Vamsi Manohar <[email protected]>
…1389) * Refactor AWSSigV4 auth to support different AWSCredentialProviders Signed-off-by: Vamsi Manohar <[email protected]> * Added unit tests for sts assume role credentials provider Signed-off-by: Vamsi Manohar <[email protected]> --------- Signed-off-by: Vamsi Manohar <[email protected]> (cherry picked from commit 8583fd1)
…1389) * Refactor AWSSigV4 auth to support different AWSCredentialProviders Signed-off-by: Vamsi Manohar <[email protected]> * Added unit tests for sts assume role credentials provider Signed-off-by: Vamsi Manohar <[email protected]> --------- Signed-off-by: Vamsi Manohar <[email protected]> (cherry picked from commit 8583fd1)
…1389) (#1396) * Refactor AWSSigV4 auth to support different AWSCredentialProviders Signed-off-by: Vamsi Manohar <[email protected]> * Added unit tests for sts assume role credentials provider Signed-off-by: Vamsi Manohar <[email protected]> --------- Signed-off-by: Vamsi Manohar <[email protected]> (cherry picked from commit 8583fd1) Co-authored-by: vamsi-amazon <[email protected]>
…pensearch-project#1389) (opensearch-project#1396) * Refactor AWSSigV4 auth to support different AWSCredentialProviders Signed-off-by: Vamsi Manohar <[email protected]> * Added unit tests for sts assume role credentials provider Signed-off-by: Vamsi Manohar <[email protected]> --------- Signed-off-by: Vamsi Manohar <[email protected]> (cherry picked from commit 8583fd1) Co-authored-by: vamsi-amazon <[email protected]> Signed-off-by: Matthew Wells <[email protected]>
Description
Refactored sigv4auth support to use credential Providers.
Check List
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.