Skip to content

Commit 1ac0601

Browse files
committed
fix: make env vars name more persistent
1 parent 844e867 commit 1ac0601

File tree

3 files changed

+32
-22
lines changed

3 files changed

+32
-22
lines changed

server/constants/env.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,11 @@ const (
2222
// EnvKeyDatabaseURL key for env variable DATABASE_URL
2323
EnvKeyDatabaseURL = "DATABASE_URL"
2424
// EnvAwsRegion key for env variable AWS REGION
25-
EnvAwsRegion = "REGION"
26-
// EnvAwsAccessKey key for env variable AWS_ACCESS_KEY
27-
EnvAwsAccessKey = "AWS_ACCESS_KEY"
28-
// EnvAwsAccessKey key for env variable AWS_SECRET_KEY
29-
EnvAwsSecretKey = "AWS_SECRET_KEY"
25+
EnvAwsRegion = "AWS_REGION"
26+
// EnvAwsAccessKeyID key for env variable AWS_ACCESS_KEY_ID
27+
EnvAwsAccessKeyID = "AWS_ACCESS_KEY_ID"
28+
// EnvAwsAccessKey key for env variable AWS_SECRET_ACCESS_KEY
29+
EnvAwsSecretAccessKey = "AWS_SECRET_ACCESS_KEY"
3030
// EnvKeyDatabaseName key for env variable DATABASE_NAME
3131
EnvKeyDatabaseName = "DATABASE_NAME"
3232
// EnvKeyDatabaseUsername key for env variable DATABASE_USERNAME

server/db/providers/dynamodb/provider.go

Lines changed: 17 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,18 @@
11
package dynamodb
22

33
import (
4+
"fmt"
45
"os"
56

6-
"github.com/authorizerdev/authorizer/server/constants"
7-
"github.com/authorizerdev/authorizer/server/db/models"
8-
"github.com/authorizerdev/authorizer/server/memorystore"
97
"github.com/aws/aws-sdk-go/aws"
108
"github.com/aws/aws-sdk-go/aws/credentials"
119
"github.com/aws/aws-sdk-go/aws/session"
1210
"github.com/guregu/dynamo"
1311
log "github.com/sirupsen/logrus"
12+
13+
"github.com/authorizerdev/authorizer/server/constants"
14+
"github.com/authorizerdev/authorizer/server/db/models"
15+
"github.com/authorizerdev/authorizer/server/memorystore"
1416
)
1517

1618
type provider struct {
@@ -21,8 +23,8 @@ type provider struct {
2123
func NewProvider() (*provider, error) {
2224
dbURL := memorystore.RequiredEnvStoreObj.GetRequiredEnv().DatabaseURL
2325
awsRegion := os.Getenv(constants.EnvAwsRegion)
24-
accessKey := os.Getenv(constants.EnvAwsAccessKey)
25-
secretKey := os.Getenv(constants.EnvAwsSecretKey)
26+
accessKey := os.Getenv(constants.EnvAwsAccessKeyID)
27+
secretKey := os.Getenv(constants.EnvAwsSecretAccessKey)
2628

2729
config := aws.Config{
2830
MaxRetries: aws.Int(3),
@@ -33,15 +35,23 @@ func NewProvider() (*provider, error) {
3335
config.Region = aws.String(awsRegion)
3436
}
3537

38+
if accessKey == "" {
39+
log.Debugf("%s not found", constants.EnvAwsAccessKeyID)
40+
return nil, fmt.Errorf("invalid aws credentials. %s not found", constants.EnvAwsAccessKeyID)
41+
}
42+
43+
if secretKey == "" {
44+
log.Debugf("%s not found", constants.EnvAwsSecretAccessKey)
45+
return nil, fmt.Errorf("invalid aws credentials. %s not found", constants.EnvAwsSecretAccessKey)
46+
}
47+
3648
// custom accessKey, secretkey took first priority, if not then fetch config from aws credentials
3749
if accessKey != "" && secretKey != "" {
3850
config.Credentials = credentials.NewStaticCredentials(accessKey, secretKey, "")
3951
} else if dbURL != "" {
4052
// static config in case of testing or local-setup
4153
config.Credentials = credentials.NewStaticCredentials("key", "key", "")
4254
config.Endpoint = aws.String(dbURL)
43-
} else {
44-
log.Info("REGION, AWS_ACCESS_KEY and AWS_SECRET_KEY not found in .env, trying to load default profile from aws credentials")
4555
}
4656

4757
session := session.Must(session.NewSession(&config))

server/env/env.go

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -78,8 +78,8 @@ func InitAllEnv() error {
7878
osOrganizationName := os.Getenv(constants.EnvKeyOrganizationName)
7979
osOrganizationLogo := os.Getenv(constants.EnvKeyOrganizationLogo)
8080
osAwsRegion := os.Getenv(constants.EnvAwsRegion)
81-
osAwsAccessKey := os.Getenv(constants.EnvAwsAccessKey)
82-
osAwsSecretKey := os.Getenv(constants.EnvAwsSecretKey)
81+
osAwsAccessKey := os.Getenv(constants.EnvAwsAccessKeyID)
82+
osAwsSecretKey := os.Getenv(constants.EnvAwsSecretAccessKey)
8383

8484
// os bool vars
8585
osAppCookieSecure := os.Getenv(constants.EnvKeyAppCookieSecure)
@@ -129,18 +129,18 @@ func InitAllEnv() error {
129129
envData[constants.EnvAwsRegion] = osAwsRegion
130130
}
131131

132-
if val, ok := envData[constants.EnvAwsAccessKey]; !ok || val == "" {
133-
envData[constants.EnvAwsAccessKey] = osAwsAccessKey
132+
if val, ok := envData[constants.EnvAwsAccessKeyID]; !ok || val == "" {
133+
envData[constants.EnvAwsAccessKeyID] = osAwsAccessKey
134134
}
135-
if osAwsAccessKey != "" && envData[constants.EnvAwsAccessKey] != osAwsRegion {
136-
envData[constants.EnvAwsAccessKey] = osAwsAccessKey
135+
if osAwsAccessKey != "" && envData[constants.EnvAwsAccessKeyID] != osAwsRegion {
136+
envData[constants.EnvAwsAccessKeyID] = osAwsAccessKey
137137
}
138138

139-
if val, ok := envData[constants.EnvAwsSecretKey]; !ok || val == "" {
140-
envData[constants.EnvAwsSecretKey] = osAwsSecretKey
139+
if val, ok := envData[constants.EnvAwsSecretAccessKey]; !ok || val == "" {
140+
envData[constants.EnvAwsSecretAccessKey] = osAwsSecretKey
141141
}
142-
if osAwsSecretKey != "" && envData[constants.EnvAwsSecretKey] != osAwsRegion {
143-
envData[constants.EnvAwsSecretKey] = osAwsSecretKey
142+
if osAwsSecretKey != "" && envData[constants.EnvAwsSecretAccessKey] != osAwsRegion {
143+
envData[constants.EnvAwsSecretAccessKey] = osAwsSecretKey
144144
}
145145

146146
if val, ok := envData[constants.EnvKeyAppURL]; !ok || val == "" {

0 commit comments

Comments
 (0)