|
4 | 4 | */ |
5 | 5 |
|
6 | 6 | #include <aws/core/auth/AWSCredentialsProviderChain.h> |
7 | | -#include <aws/core/auth/STSCredentialsProvider.h> |
8 | 7 | #include <aws/core/auth/SSOCredentialsProvider.h> |
| 8 | +#include <aws/core/auth/STSCredentialsProvider.h> |
9 | 9 | #include <aws/core/platform/Environment.h> |
10 | | -#include <aws/core/utils/memory/AWSMemory.h> |
11 | 10 | #include <aws/core/utils/StringUtils.h> |
12 | 11 | #include <aws/core/utils/logging/LogMacros.h> |
| 12 | +#include <aws/core/utils/memory/AWSMemory.h> |
13 | 13 |
|
14 | 14 | using namespace Aws::Auth; |
15 | 15 | using namespace Aws::Utils::Threading; |
16 | 16 |
|
17 | 17 | static const char AWS_EC2_METADATA_DISABLED[] = "AWS_EC2_METADATA_DISABLED"; |
18 | 18 | static const char DefaultCredentialsProviderChainTag[] = "DefaultAWSCredentialsProviderChain"; |
19 | 19 |
|
20 | | -AWSCredentials AWSCredentialsProviderChain::GetAWSCredentials() |
21 | | -{ |
22 | | - ReaderLockGuard lock(m_cachedProviderLock); |
23 | | - if (m_cachedProvider) { |
24 | | - AWSCredentials credentials = m_cachedProvider->GetAWSCredentials(); |
25 | | - if (!credentials.GetAWSAccessKeyId().empty() && !credentials.GetAWSSecretKey().empty()) |
26 | | - { |
27 | | - return credentials; |
28 | | - } |
| 20 | +AWSCredentials AWSCredentialsProviderChain::GetAWSCredentials() { |
| 21 | + ReaderLockGuard lock(m_cachedProviderLock); |
| 22 | + if (m_cachedProvider) { |
| 23 | + AWSCredentials credentials = m_cachedProvider->GetAWSCredentials(); |
| 24 | + if (!credentials.GetAWSAccessKeyId().empty() && !credentials.GetAWSSecretKey().empty()) { |
| 25 | + return credentials; |
29 | 26 | } |
30 | | - lock.UpgradeToWriterLock(); |
31 | | - for (auto&& credentialsProvider : m_providerChain) |
32 | | - { |
33 | | - AWSCredentials credentials = credentialsProvider->GetAWSCredentials(); |
34 | | - if (!credentials.GetAWSAccessKeyId().empty() && !credentials.GetAWSSecretKey().empty()) |
35 | | - { |
36 | | - m_cachedProvider = credentialsProvider; |
37 | | - return credentials; |
38 | | - } |
| 27 | + } |
| 28 | + lock.UpgradeToWriterLock(); |
| 29 | + for (auto&& credentialsProvider : m_providerChain) { |
| 30 | + AWSCredentials credentials = credentialsProvider->GetAWSCredentials(); |
| 31 | + if (!credentials.GetAWSAccessKeyId().empty() && !credentials.GetAWSSecretKey().empty()) { |
| 32 | + m_cachedProvider = credentialsProvider; |
| 33 | + return credentials; |
39 | 34 | } |
40 | | - return AWSCredentials(); |
| 35 | + } |
| 36 | + return AWSCredentials(); |
41 | 37 | } |
42 | 38 |
|
43 | | -DefaultAWSCredentialsProviderChain::DefaultAWSCredentialsProviderChain(const Aws::Client::CredentialProviderConfiguration& config) : AWSCredentialsProviderChain() |
44 | | -{ |
45 | | - AddProvider(Aws::MakeShared<EnvironmentAWSCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
46 | | - if (config.profile.empty()) { |
47 | | - AddProvider(Aws::MakeShared<ProfileConfigFileAWSCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
48 | | - AddProvider(Aws::MakeShared<ProcessCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
49 | | - } |
50 | | - else { |
51 | | - AddProvider(Aws::MakeShared<ProfileConfigFileAWSCredentialsProvider>(DefaultCredentialsProviderChainTag, config.profile.c_str())); |
52 | | - AddProvider(Aws::MakeShared<ProcessCredentialsProvider>(DefaultCredentialsProviderChainTag, config.profile)); |
53 | | - } |
54 | | - AddProvider(Aws::MakeShared<STSAssumeRoleWebIdentityCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
55 | | - if (config.profile.empty()) { |
56 | | - AddProvider(Aws::MakeShared<SSOCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
57 | | - } |
58 | | - else { |
59 | | - AddProvider(Aws::MakeShared<SSOCredentialsProvider>(DefaultCredentialsProviderChainTag, config.profile)); |
60 | | - } |
61 | | - // General HTTP Credentials (prev. known as ECS TaskRole credentials) only available when ENVIRONMENT VARIABLE is set |
62 | | - const auto relativeUri = Aws::Environment::GetEnv(GeneralHTTPCredentialsProvider::AWS_CONTAINER_CREDENTIALS_RELATIVE_URI); |
63 | | - AWS_LOGSTREAM_DEBUG(DefaultCredentialsProviderChainTag, "The environment variable value " << GeneralHTTPCredentialsProvider::AWS_CONTAINER_CREDENTIALS_RELATIVE_URI |
64 | | - << " is " << relativeUri); |
| 39 | +DefaultAWSCredentialsProviderChain::DefaultAWSCredentialsProviderChain(const Aws::Client::CredentialProviderConfiguration& config) |
| 40 | + : AWSCredentialsProviderChain() { |
| 41 | + AddProvider(Aws::MakeShared<EnvironmentAWSCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
| 42 | + if (config.profile.empty()) { |
| 43 | + AddProvider(Aws::MakeShared<ProfileConfigFileAWSCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
| 44 | + AddProvider(Aws::MakeShared<ProcessCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
| 45 | + } else { |
| 46 | + AddProvider(Aws::MakeShared<ProfileConfigFileAWSCredentialsProvider>(DefaultCredentialsProviderChainTag, config.profile.c_str())); |
| 47 | + AddProvider(Aws::MakeShared<ProcessCredentialsProvider>(DefaultCredentialsProviderChainTag, config.profile)); |
| 48 | + } |
| 49 | + AddProvider(Aws::MakeShared<STSAssumeRoleWebIdentityCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
| 50 | + if (config.profile.empty()) { |
| 51 | + AddProvider(Aws::MakeShared<SSOCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
| 52 | + } else { |
| 53 | + AddProvider(Aws::MakeShared<SSOCredentialsProvider>(DefaultCredentialsProviderChainTag, config.profile)); |
| 54 | + } |
| 55 | + // General HTTP Credentials (prev. known as ECS TaskRole credentials) only available when ENVIRONMENT VARIABLE is set |
| 56 | + const auto relativeUri = Aws::Environment::GetEnv(GeneralHTTPCredentialsProvider::AWS_CONTAINER_CREDENTIALS_RELATIVE_URI); |
| 57 | + AWS_LOGSTREAM_DEBUG(DefaultCredentialsProviderChainTag, "The environment variable value " |
| 58 | + << GeneralHTTPCredentialsProvider::AWS_CONTAINER_CREDENTIALS_RELATIVE_URI |
| 59 | + << " is " << relativeUri); |
65 | 60 |
|
66 | | - const auto absoluteUri = Aws::Environment::GetEnv(GeneralHTTPCredentialsProvider::AWS_CONTAINER_CREDENTIALS_FULL_URI); |
67 | | - AWS_LOGSTREAM_DEBUG(DefaultCredentialsProviderChainTag, "The environment variable value " << GeneralHTTPCredentialsProvider::AWS_CONTAINER_CREDENTIALS_FULL_URI |
68 | | - << " is " << absoluteUri); |
| 61 | + const auto absoluteUri = Aws::Environment::GetEnv(GeneralHTTPCredentialsProvider::AWS_CONTAINER_CREDENTIALS_FULL_URI); |
| 62 | + AWS_LOGSTREAM_DEBUG(DefaultCredentialsProviderChainTag, "The environment variable value " |
| 63 | + << GeneralHTTPCredentialsProvider::AWS_CONTAINER_CREDENTIALS_FULL_URI |
| 64 | + << " is " << absoluteUri); |
69 | 65 |
|
70 | | - const auto ec2MetadataDisabled = Aws::Environment::GetEnv(AWS_EC2_METADATA_DISABLED); |
71 | | - AWS_LOGSTREAM_DEBUG(DefaultCredentialsProviderChainTag, "The environment variable value " << AWS_EC2_METADATA_DISABLED |
72 | | - << " is " << ec2MetadataDisabled); |
| 66 | + const auto ec2MetadataDisabled = Aws::Environment::GetEnv(AWS_EC2_METADATA_DISABLED); |
| 67 | + AWS_LOGSTREAM_DEBUG(DefaultCredentialsProviderChainTag, |
| 68 | + "The environment variable value " << AWS_EC2_METADATA_DISABLED << " is " << ec2MetadataDisabled); |
73 | 69 |
|
74 | | - if (!relativeUri.empty() || !absoluteUri.empty()) |
75 | | - { |
76 | | - const Aws::String token = Aws::Environment::GetEnv(GeneralHTTPCredentialsProvider::AWS_CONTAINER_AUTHORIZATION_TOKEN); |
77 | | - const Aws::String tokenPath = Aws::Environment::GetEnv(GeneralHTTPCredentialsProvider::AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE); |
| 70 | + if (!relativeUri.empty() || !absoluteUri.empty()) { |
| 71 | + const Aws::String token = Aws::Environment::GetEnv(GeneralHTTPCredentialsProvider::AWS_CONTAINER_AUTHORIZATION_TOKEN); |
| 72 | + const Aws::String tokenPath = Aws::Environment::GetEnv(GeneralHTTPCredentialsProvider::AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE); |
78 | 73 |
|
79 | | - auto genProvider = Aws::MakeShared<GeneralHTTPCredentialsProvider>(DefaultCredentialsProviderChainTag, |
80 | | - relativeUri, absoluteUri, token, tokenPath); |
81 | | - if (genProvider && genProvider->IsValid()) { |
82 | | - AddProvider(std::move(genProvider)); |
83 | | - auto& uri = !relativeUri.empty() ? relativeUri : absoluteUri; |
84 | | - AWS_LOGSTREAM_INFO(DefaultCredentialsProviderChainTag, "Added General HTTP / ECS credentials provider with ur: [" |
85 | | - << uri << "] to the provider chain with a" << ((token.empty() && tokenPath.empty()) ? "n empty " : " non-empty ") |
86 | | - << "authorization token."); |
87 | | - } else { |
88 | | - AWS_LOGSTREAM_ERROR(DefaultCredentialsProviderChainTag, "Unable to create GeneralHTTPCredentialsProvider"); |
89 | | - } |
90 | | - } |
91 | | - else if (Aws::Utils::StringUtils::ToLower(ec2MetadataDisabled.c_str()) != "true") |
92 | | - { |
93 | | - AddProvider(Aws::MakeShared<InstanceProfileCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
94 | | - AWS_LOGSTREAM_INFO(DefaultCredentialsProviderChainTag, "Added EC2 metadata service credentials provider to the provider chain."); |
| 74 | + auto genProvider = |
| 75 | + Aws::MakeShared<GeneralHTTPCredentialsProvider>(DefaultCredentialsProviderChainTag, relativeUri, absoluteUri, token, tokenPath); |
| 76 | + if (genProvider && genProvider->IsValid()) { |
| 77 | + AddProvider(std::move(genProvider)); |
| 78 | + auto& uri = !relativeUri.empty() ? relativeUri : absoluteUri; |
| 79 | + AWS_LOGSTREAM_INFO(DefaultCredentialsProviderChainTag, "Added General HTTP / ECS credentials provider with ur: [" |
| 80 | + << uri << "] to the provider chain with a" |
| 81 | + << ((token.empty() && tokenPath.empty()) ? "n empty " : " non-empty ") |
| 82 | + << "authorization token."); |
| 83 | + } else { |
| 84 | + AWS_LOGSTREAM_ERROR(DefaultCredentialsProviderChainTag, "Unable to create GeneralHTTPCredentialsProvider"); |
95 | 85 | } |
| 86 | + } else if (Aws::Utils::StringUtils::ToLower(ec2MetadataDisabled.c_str()) != "true") { |
| 87 | + AddProvider(Aws::MakeShared<InstanceProfileCredentialsProvider>(DefaultCredentialsProviderChainTag)); |
| 88 | + AWS_LOGSTREAM_INFO(DefaultCredentialsProviderChainTag, "Added EC2 metadata service credentials provider to the provider chain."); |
| 89 | + } |
96 | 90 | } |
97 | 91 |
|
98 | 92 | DefaultAWSCredentialsProviderChain::DefaultAWSCredentialsProviderChain(const DefaultAWSCredentialsProviderChain& chain) { |
99 | | - for (const auto& provider: chain.GetProviders()) { |
100 | | - AddProvider(provider); |
101 | | - } |
| 93 | + for (const auto& provider : chain.GetProviders()) { |
| 94 | + AddProvider(provider); |
| 95 | + } |
102 | 96 | } |
0 commit comments