Skip to content

Persist auth in memory, removing loading credentials from SDK to supp…#117

Merged
satyakigh merged 1 commit intomainfrom
auth-change
Oct 23, 2025
Merged

Persist auth in memory, removing loading credentials from SDK to supp…#117
satyakigh merged 1 commit intomainfrom
auth-change

Conversation

@satyakigh
Copy link
Copy Markdown
Collaborator

@satyakigh satyakigh commented Oct 22, 2025

Summary of PR #117: Persist Auth in Memory for SSO Support

Author: Satyaki Ghosh (@satyakigh)
Status: Open
Changes: +105 additions, -172 deletions

Key Code Changes

  1. In-Memory Credential Storage
    • Removed dependency on AWS SDK credential loading (sdkIAMCredentials)
    • Credentials are now stored directly in memory within AwsCredentials class
    • IAM credentials stored as IamCredentials object with profile, region, and AWS credential identity
    • Bearer credentials stored separately for SSO token support

  2. Synchronous Credential Access
    • Changed getIAM() from async to synchronous method
    • Returns stored credentials directly instead of loading from SDK
    • Throws error if credentials not configured (fail-fast approach)
    • Added structuredClone() for immutable credential returns

  3. Enhanced Type Safety
    • IamCredentials now extends AwsCredentialIdentity with required profile and region fields
    • Made profile and region required (not optional) in credential schema
    • Added UpdateCredentialsResult type with success boolean

  4. Simplified AWS Client
    • Removed SettingsConfigurable implementation from AwsClient
    • Eliminated async credential loading in client initialization
    • CloudFormation and CloudControl clients now instantiated synchronously
    • Region comes directly from stored credentials instead of settings subscription

  5. Updated Request Handlers
    • handleIamCredentialsUpdate() now returns boolean success status
    • IAM credential update request returns UpdateCredentialsResult instead of void
    • Improved error handling with explicit success/failure responses

@satyakigh satyakigh requested a review from a team as a code owner October 22, 2025 18:02
@satyakigh satyakigh force-pushed the auth-change branch 2 times, most recently from 70767e3 to 4daf145 Compare October 22, 2025 18:41
@satyakigh satyakigh merged commit da1685d into main Oct 23, 2025
8 checks passed
@satyakigh satyakigh deleted the auth-change branch October 23, 2025 00:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants