Skip to content

Commit 9d9aaaa

Browse files
authored
Bugfix/S3 Credentials (#4166)
only set s3 credentials when access key and secret key exist
1 parent c3ea5a9 commit 9d9aaaa

File tree

4 files changed

+32
-26
lines changed

4 files changed

+32
-26
lines changed

packages/components/src/storageUtils.ts

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -384,20 +384,21 @@ export const getS3Config = () => {
384384
throw new Error('S3 storage configuration is missing')
385385
}
386386

387-
let credentials: S3ClientConfig['credentials'] | undefined
387+
const s3Config: S3ClientConfig = {
388+
region: region,
389+
endpoint: customURL,
390+
forcePathStyle: forcePathStyle
391+
}
392+
388393
if (accessKeyId && secretAccessKey) {
389-
credentials = {
390-
accessKeyId,
391-
secretAccessKey
394+
s3Config.credentials = {
395+
accessKeyId: accessKeyId,
396+
secretAccessKey: secretAccessKey
392397
}
393398
}
394399

395-
const s3Client = new S3Client({
396-
credentials,
397-
region,
398-
endpoint: customURL,
399-
forcePathStyle: forcePathStyle
400-
})
400+
const s3Client = new S3Client(s3Config)
401+
401402
return { s3Client, Bucket }
402403
}
403404

packages/components/src/utils.ts

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,14 +27,18 @@ if (USE_AWS_SECRETS_MANAGER) {
2727
const accessKeyId = process.env.SECRETKEY_AWS_ACCESS_KEY
2828
const secretAccessKey = process.env.SECRETKEY_AWS_SECRET_KEY
2929

30-
let credentials: SecretsManagerClientConfig['credentials'] | undefined
30+
const secretManagerConfig: SecretsManagerClientConfig = {
31+
region: region
32+
}
33+
3134
if (accessKeyId && secretAccessKey) {
32-
credentials = {
35+
secretManagerConfig.credentials = {
3336
accessKeyId,
3437
secretAccessKey
3538
}
3639
}
37-
secretsManagerClient = new SecretsManagerClient({ credentials, region })
40+
41+
secretsManagerClient = new SecretsManagerClient(secretManagerConfig)
3842
}
3943

4044
/*

packages/server/src/utils/index.ts

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -76,14 +76,17 @@ if (USE_AWS_SECRETS_MANAGER) {
7676
const accessKeyId = process.env.SECRETKEY_AWS_ACCESS_KEY
7777
const secretAccessKey = process.env.SECRETKEY_AWS_SECRET_KEY
7878

79-
let credentials: SecretsManagerClientConfig['credentials'] | undefined
79+
const secretManagerConfig: SecretsManagerClientConfig = {
80+
region: region
81+
}
82+
8083
if (accessKeyId && secretAccessKey) {
81-
credentials = {
84+
secretManagerConfig.credentials = {
8285
accessKeyId,
8386
secretAccessKey
8487
}
8588
}
86-
secretsManagerClient = new SecretsManagerClient({ credentials, region })
89+
secretsManagerClient = new SecretsManagerClient(secretManagerConfig)
8790
}
8891

8992
export const databaseEntities: IDatabaseEntity = {

packages/server/src/utils/logger.ts

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -25,19 +25,17 @@ if (process.env.STORAGE_TYPE === 's3') {
2525
throw new Error('S3 storage configuration is missing')
2626
}
2727

28-
let credentials: S3ClientConfig['credentials'] | undefined
29-
if (accessKeyId && secretAccessKey) {
30-
credentials = {
31-
accessKeyId,
32-
secretAccessKey
33-
}
34-
}
35-
3628
const s3Config: S3ClientConfig = {
3729
region: region,
3830
endpoint: customURL,
39-
forcePathStyle: forcePathStyle,
40-
credentials: credentials
31+
forcePathStyle: forcePathStyle
32+
}
33+
34+
if (accessKeyId && secretAccessKey) {
35+
s3Config.credentials = {
36+
accessKeyId: accessKeyId,
37+
secretAccessKey: secretAccessKey
38+
}
4139
}
4240

4341
s3ServerStream = new S3StreamLogger({

0 commit comments

Comments
 (0)