Skip to content

Commit

Permalink
chore: add more configuration options for creating aws sessions (#602)
Browse files Browse the repository at this point in the history
  • Loading branch information
atzoum authored Aug 26, 2024
1 parent 9879106 commit 3393b43
Showing 1 changed file with 27 additions and 22 deletions.
49 changes: 27 additions & 22 deletions awsutil/awsutil.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,19 +16,21 @@ import (

// Some AWS destinations are using SecretAccessKey instead of accessKey
type SessionConfig struct {
Region string `mapstructure:"region"`
AccessKeyID string `mapstructure:"accessKeyID"`
AccessKey string `mapstructure:"accessKey"`
SecretAccessKey string `mapstructure:"secretAccessKey"`
RoleBasedAuth bool `mapstructure:"roleBasedAuth"`
IAMRoleARN string `mapstructure:"iamRoleARN"`
ExternalID string `mapstructure:"externalID"`
WorkspaceID string `mapstructure:"workspaceID"`
Endpoint *string `mapstructure:"endpoint"`
S3ForcePathStyle *bool `mapstructure:"s3ForcePathStyle"`
DisableSSL *bool `mapstructure:"disableSSL"`
Service string `mapstructure:"service"`
Timeout *time.Duration `mapstructure:"timeout"`
Region string `mapstructure:"region"`
AccessKeyID string `mapstructure:"accessKeyID"`
AccessKey string `mapstructure:"accessKey"`
SecretAccessKey string `mapstructure:"secretAccessKey"`
SessionToken string `mapstructure:"sessionToken"`
RoleBasedAuth bool `mapstructure:"roleBasedAuth"`
IAMRoleARN string `mapstructure:"iamRoleARN"`
ExternalID string `mapstructure:"externalID"`
WorkspaceID string `mapstructure:"workspaceID"`
Endpoint *string `mapstructure:"endpoint"`
S3ForcePathStyle *bool `mapstructure:"s3ForcePathStyle"`
DisableSSL *bool `mapstructure:"disableSSL"`
Service string `mapstructure:"service"`
Timeout *time.Duration `mapstructure:"timeout"`
SharedConfigProfile string `mapstructure:"sharedConfigProfile"`
}

// CreateSession creates a new AWS session using the provided config
Expand All @@ -40,19 +42,22 @@ func CreateSession(config *SessionConfig) (*session.Session, error) {
if config.RoleBasedAuth {
awsCredentials, err = createCredentialsForRole(config)
} else if config.AccessKey != "" && config.AccessKeyID != "" {
awsCredentials, err = credentials.NewStaticCredentials(config.AccessKeyID, config.AccessKey, ""), nil
awsCredentials, err = credentials.NewStaticCredentials(config.AccessKeyID, config.AccessKey, config.SessionToken), nil
}
if err != nil {
return nil, err
}
return session.NewSession(&aws.Config{
HTTPClient: getHttpClient(config),
Region: aws.String(config.Region),
CredentialsChainVerboseErrors: aws.Bool(true),
Credentials: awsCredentials,
Endpoint: config.Endpoint,
S3ForcePathStyle: config.S3ForcePathStyle,
DisableSSL: config.DisableSSL,
return session.NewSessionWithOptions(session.Options{
Config: aws.Config{
HTTPClient: getHttpClient(config),
Region: aws.String(config.Region),
CredentialsChainVerboseErrors: aws.Bool(true),
Credentials: awsCredentials,
Endpoint: config.Endpoint,
S3ForcePathStyle: config.S3ForcePathStyle,
DisableSSL: config.DisableSSL,
},
Profile: config.SharedConfigProfile,
})
}

Expand Down

0 comments on commit 3393b43

Please sign in to comment.