From 07419b5cdb06a18d825e8d3de83e68118a253d04 Mon Sep 17 00:00:00 2001 From: Waqar Ahmed Khan Date: Mon, 30 Sep 2024 10:15:53 -0700 Subject: [PATCH 1/5] add ecsEnvironment --- .../credentials/CredentialsProvider.swift | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) diff --git a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift index ce2da756..29f1b0e2 100644 --- a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift +++ b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift @@ -518,6 +518,32 @@ extension CredentialsProvider.Source { /// - bootstrap: Connection bootstrap to use for any network connections made while sourcing credentials /// - tlsContext: (Optional) Client TLS context to use when querying STS web identity provider. /// If set, port 443 is used. If NULL, port 80 is used. + /// - shutdownCallback: (Optional) shutdown callback + /// - Returns: `CredentialsProvider` + /// - Throws: CommonRuntimeError.crtError + public static func `ecsEnvironment`(bootstrap: ClientBootstrap, + tlsContext: TLSContext? = nil, + shutdownCallback: ShutdownCallback? = nil) -> Self { + Self { + let shutdownCallbackCore = ShutdownCallbackCore(shutdownCallback) + var ecsOptions = aws_credentials_provider_ecs_environment_options() + ecsOptions.tls_ctx = tlsContext?.rawValue + ecsOptions.bootstrap = bootstrap.rawValue + ecsOptions.shutdown_options = shutdownCallbackCore.getRetainedCredentialProviderShutdownOptions() + + guard let provider: UnsafeMutablePointer = aws_credentials_provider_new_ecs_from_environment(allocator.rawValue, &ecsOptions) else { + shutdownCallbackCore.release() + throw CommonRunTimeError.crtError(CRTError.makeFromLastError()) + } + return provider + } + } + + /// Credential Provider that sources credentials from ECS container metadata + /// - Parameters: + /// - bootstrap: Connection bootstrap to use for any network connections made while sourcing credentials + /// - tlsContext: (Optional) Client TLS context to use when querying STS web identity provider. + /// If set, port 443 is used. If NULL, port 80 is used. /// - authToken: Authorization token to include in the credentials query. /// - pathAndQuery: Http path and query string for the credentials query. /// - host: Host to query credentials from. From 1ff03ab284460bff8ff7d814dce1287c70bc734f Mon Sep 17 00:00:00 2001 From: Waqar Ahmed Khan Date: Mon, 30 Sep 2024 10:18:02 -0700 Subject: [PATCH 2/5] TLSContext is not optional --- .../auth/credentials/CredentialsProvider.swift | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift index 29f1b0e2..e636f48f 100644 --- a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift +++ b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift @@ -512,11 +512,10 @@ extension CredentialsProvider.Source { /// /// If both relative uri and absolute uri are set, relative uri has higher priority. /// Token is used in auth header but only for absolute uri. - /// While above information is used in request only, endpoint info is needed when creating ecs provider to initiate the connection - /// manager, more specifically, host and http scheme (tls or not) from endpoint are needed. + /// /// - Parameters: /// - bootstrap: Connection bootstrap to use for any network connections made while sourcing credentials - /// - tlsContext: (Optional) Client TLS context to use when querying STS web identity provider. + /// - tlsContext: Client TLS context to use when querying STS web identity provider. /// If set, port 443 is used. If NULL, port 80 is used. /// - shutdownCallback: (Optional) shutdown callback /// - Returns: `CredentialsProvider` From 24cf848c2648fe17c08ca4a9cde787d075a9e029 Mon Sep 17 00:00:00 2001 From: Waqar Ahmed Khan Date: Mon, 30 Sep 2024 10:25:27 -0700 Subject: [PATCH 3/5] lint fix --- .../auth/credentials/CredentialsProvider.swift | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift index e636f48f..e4f18d62 100644 --- a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift +++ b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift @@ -512,7 +512,7 @@ extension CredentialsProvider.Source { /// /// If both relative uri and absolute uri are set, relative uri has higher priority. /// Token is used in auth header but only for absolute uri. - /// + /// /// - Parameters: /// - bootstrap: Connection bootstrap to use for any network connections made while sourcing credentials /// - tlsContext: Client TLS context to use when querying STS web identity provider. @@ -521,8 +521,8 @@ extension CredentialsProvider.Source { /// - Returns: `CredentialsProvider` /// - Throws: CommonRuntimeError.crtError public static func `ecsEnvironment`(bootstrap: ClientBootstrap, - tlsContext: TLSContext? = nil, - shutdownCallback: ShutdownCallback? = nil) -> Self { + tlsContext: TLSContext? = nil, + shutdownCallback: ShutdownCallback? = nil) -> Self { Self { let shutdownCallbackCore = ShutdownCallbackCore(shutdownCallback) var ecsOptions = aws_credentials_provider_ecs_environment_options() From d7f17bc792037a1bb37ead30ee346efbe3299584 Mon Sep 17 00:00:00 2001 From: Waqar Ahmed Khan Date: Mon, 30 Sep 2024 10:26:08 -0700 Subject: [PATCH 4/5] non optional tls --- .../auth/credentials/CredentialsProvider.swift | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift index e4f18d62..12704e0b 100644 --- a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift +++ b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift @@ -521,12 +521,12 @@ extension CredentialsProvider.Source { /// - Returns: `CredentialsProvider` /// - Throws: CommonRuntimeError.crtError public static func `ecsEnvironment`(bootstrap: ClientBootstrap, - tlsContext: TLSContext? = nil, + tlsContext: TLSContext, shutdownCallback: ShutdownCallback? = nil) -> Self { Self { let shutdownCallbackCore = ShutdownCallbackCore(shutdownCallback) var ecsOptions = aws_credentials_provider_ecs_environment_options() - ecsOptions.tls_ctx = tlsContext?.rawValue + ecsOptions.tls_ctx = tlsContext.rawValue ecsOptions.bootstrap = bootstrap.rawValue ecsOptions.shutdown_options = shutdownCallbackCore.getRetainedCredentialProviderShutdownOptions() From 8f8adfb516153ac832f6a28f1a69c96ad23fa0b7 Mon Sep 17 00:00:00 2001 From: Waqar Ahmed Khan Date: Mon, 30 Sep 2024 10:28:24 -0700 Subject: [PATCH 5/5] lint width --- .../auth/credentials/CredentialsProvider.swift | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift index 12704e0b..881ea7c7 100644 --- a/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift +++ b/Source/AwsCommonRuntimeKit/auth/credentials/CredentialsProvider.swift @@ -530,7 +530,8 @@ extension CredentialsProvider.Source { ecsOptions.bootstrap = bootstrap.rawValue ecsOptions.shutdown_options = shutdownCallbackCore.getRetainedCredentialProviderShutdownOptions() - guard let provider: UnsafeMutablePointer = aws_credentials_provider_new_ecs_from_environment(allocator.rawValue, &ecsOptions) else { + guard let provider: UnsafeMutablePointer = + aws_credentials_provider_new_ecs_from_environment(allocator.rawValue, &ecsOptions) else { shutdownCallbackCore.release() throw CommonRunTimeError.crtError(CRTError.makeFromLastError()) }