Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updates CognitoIdentityCredentials to accept AWS.config options #1317

Merged
merged 2 commits into from
Jan 20, 2017
Merged

Updates CognitoIdentityCredentials to accept AWS.config options #1317

merged 2 commits into from
Jan 20, 2017

Conversation

chrisradek
Copy link
Contributor

Fixes #1295

/cc @jeskew

… region and other config to the underlying CognitoIdentity service client
Copy link
Contributor

@jeskew jeskew left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM; just one question about STS

var cognitoConfig = AWS.util.merge({}, clientConfig);
cognitoConfig.params = this.params;
this.cognito = new CognitoIdentity(cognitoConfig);
}
this.sts = this.sts || new STS();
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should the client config be passed to STS, too?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I went back and forth on that. Since STS uses a global endpoint, it's fine if the region the user passes in isn't us-east-1.

I would probably also have to update WebIdentityCredentials to accept client config, since it calls STS as well.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There are other configuration options that customers might want to control (e.g., timeouts, retries, http agents, etc.)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Right. Sorry, I wasn't clear in my response. I was initially worried that a different region would cause an issue with STS, but discovered that's not the case. I'll update the PR to pass config to STS (and likewise to WebIdentityCredentials as well).

@coveralls
Copy link

coveralls commented Jan 20, 2017

Coverage Status

Coverage increased (+0.008%) to 91.906% when pulling 98e4694 on chrisradek:region-cognito-credentials into c40f0d6 on aws:master.

2 similar comments
@coveralls
Copy link

Coverage Status

Coverage increased (+0.008%) to 91.906% when pulling 98e4694 on chrisradek:region-cognito-credentials into c40f0d6 on aws:master.

@coveralls
Copy link

Coverage Status

Coverage increased (+0.008%) to 91.906% when pulling 98e4694 on chrisradek:region-cognito-credentials into c40f0d6 on aws:master.

@coveralls
Copy link

Coverage Status

Coverage increased (+0.01%) to 91.912% when pulling 16d9d08 on chrisradek:region-cognito-credentials into c40f0d6 on aws:master.

5 similar comments
@coveralls
Copy link

Coverage Status

Coverage increased (+0.01%) to 91.912% when pulling 16d9d08 on chrisradek:region-cognito-credentials into c40f0d6 on aws:master.

@coveralls
Copy link

Coverage Status

Coverage increased (+0.01%) to 91.912% when pulling 16d9d08 on chrisradek:region-cognito-credentials into c40f0d6 on aws:master.

@coveralls
Copy link

Coverage Status

Coverage increased (+0.01%) to 91.912% when pulling 16d9d08 on chrisradek:region-cognito-credentials into c40f0d6 on aws:master.

@coveralls
Copy link

Coverage Status

Coverage increased (+0.01%) to 91.912% when pulling 16d9d08 on chrisradek:region-cognito-credentials into c40f0d6 on aws:master.

@coveralls
Copy link

coveralls commented Jan 20, 2017

Coverage Status

Coverage increased (+0.01%) to 91.912% when pulling 16d9d08 on chrisradek:region-cognito-credentials into c40f0d6 on aws:master.

Copy link
Contributor

@jeskew jeskew left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚢 🇮🇹

@chrisradek chrisradek merged commit f9f49cb into aws:master Jan 20, 2017
@chrisradek chrisradek deleted the region-cognito-credentials branch January 20, 2017 23:46
@lock
Copy link

lock bot commented Sep 28, 2019

This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs and link to relevant comments in this thread.

@lock lock bot locked as resolved and limited conversation to collaborators Sep 28, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Initiate dynamodb error
3 participants