Skip to content

Commit afa09bf

Browse files
committed
Refactor for clarity
1 parent cf78af3 commit afa09bf

File tree

5 files changed

+12
-12
lines changed

5 files changed

+12
-12
lines changed

cli/exec.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ func ExecCommand(input ExecCommandInput, f *vault.ConfigFile, keyring keyring.Ke
172172
return 0, fmt.Errorf("Error loading config: %w", err)
173173
}
174174

175-
credsProvider, err := vault.NewTempCredentialsProvider(config, &vault.CredentialKeyring{Keyring: keyring}, !input.NoSession)
175+
credsProvider, err := vault.NewTempCredentialsProvider(config, &vault.CredentialKeyring{Keyring: keyring}, input.NoSession)
176176
if err != nil {
177177
return 0, fmt.Errorf("Error getting temporary credentials: %w", err)
178178
}

cli/export.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ func ExportCommand(input ExportCommandInput, f *vault.ConfigFile, keyring keyrin
9696
}
9797

9898
ckr := &vault.CredentialKeyring{Keyring: keyring}
99-
credsProvider, err := vault.NewTempCredentialsProvider(config, ckr, !input.NoSession)
99+
credsProvider, err := vault.NewTempCredentialsProvider(config, ckr, input.NoSession)
100100
if err != nil {
101101
return fmt.Errorf("Error getting temporary credentials: %w", err)
102102
}

cli/login.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ func LoginCommand(input LoginCommandInput, f *vault.ConfigFile, keyring keyring.
106106
ckr := &vault.CredentialKeyring{Keyring: keyring}
107107
if config.HasRole() || config.HasSSOStartURL() || config.HasCredentialProcess() || config.HasWebIdentity() {
108108
// If AssumeRole or sso.GetRoleCredentials isn't used, GetFederationToken has to be used for IAM credentials
109-
credsProvider, err = vault.NewTempCredentialsProvider(config, ckr, !input.NoSession)
109+
credsProvider, err = vault.NewTempCredentialsProvider(config, ckr, input.NoSession)
110110
} else {
111111
credsProvider, err = vault.NewFederationTokenCredentialsProvider(context.TODO(), input.ProfileName, ckr, config)
112112
}

cli/rotate.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,6 @@ func ConfigureRotateCommand(app *kingpin.Application, a *AwsVault) {
5151
}
5252

5353
func RotateCommand(input RotateCommandInput, f *vault.ConfigFile, keyring keyring.Keyring) error {
54-
// Can't disable sessions completely, might need to use session for MFA-Protected API Access
5554
vault.UseSessionCache = false
5655

5756
configLoader := vault.NewConfigLoader(input.Config, f, input.ProfileName)
@@ -87,7 +86,8 @@ func RotateCommand(input RotateCommandInput, f *vault.ConfigFile, keyring keyrin
8786
if input.NoSession {
8887
credsProvider = vault.NewMasterCredentialsProvider(ckr, config.ProfileName)
8988
} else {
90-
credsProvider, err = vault.NewTempCredentialsProvider(config, ckr, !input.NoSession)
89+
// Can't always disable sessions completely, might need to use session for MFA-Protected API Access
90+
credsProvider, err = vault.NewTempCredentialsProvider(config, ckr, input.NoSession)
9191
if err != nil {
9292
return fmt.Errorf("Error getting temporary credentials: %w", err)
9393
}

vault/vault.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -230,9 +230,9 @@ func FindMasterCredentialsNameFor(profileName string, keyring *CredentialKeyring
230230
}
231231

232232
type tempCredsCreator struct {
233-
// UseSession will disable the use of GetSessionToken when set to false
234-
UseSession bool
235-
Keyring *CredentialKeyring
233+
// DisableSessions will disable the use of GetSessionToken when set to true
234+
DisableSessions bool
235+
Keyring *CredentialKeyring
236236

237237
chainedMfa string
238238
}
@@ -303,7 +303,7 @@ func (t *tempCredsCreator) GetProviderForProfile(config *ProfileConfig) (aws.Cre
303303

304304
// canUseGetSessionToken determines if GetSessionToken should be used, and if not returns a reason
305305
func (t *tempCredsCreator) canUseGetSessionToken(c *ProfileConfig) (bool, string) {
306-
if !t.UseSession {
306+
if t.DisableSessions {
307307
return false, "sessions are disabled"
308308
}
309309

@@ -339,10 +339,10 @@ func mfaDetails(mfaChained bool, config *ProfileConfig) string {
339339
}
340340

341341
// NewTempCredentialsProvider creates a credential provider for the given config
342-
func NewTempCredentialsProvider(config *ProfileConfig, keyring *CredentialKeyring, useSession bool) (aws.CredentialsProvider, error) {
342+
func NewTempCredentialsProvider(config *ProfileConfig, keyring *CredentialKeyring, disableSessions bool) (aws.CredentialsProvider, error) {
343343
t := tempCredsCreator{
344-
Keyring: keyring,
345-
UseSession: useSession,
344+
Keyring: keyring,
345+
DisableSessions: disableSessions,
346346
}
347347
return t.GetProviderForProfile(config)
348348
}

0 commit comments

Comments
 (0)