Refine search
/** * Gets an {@link AWSCredentialsProvider} that may be used to connect to this container. * * @return dummy AWS credentials */ public AWSCredentialsProvider getCredentials() { return new AWSStaticCredentialsProvider(new BasicAWSCredentials("dummy", "dummy")); }
/** * @return An instance of {@link KmsMasterKeyProvider}. */ KmsMasterKeyProvider createKmsMasterKeyProvider() { return new KmsMasterKeyProvider(new AWSStaticCredentialsProvider(creds), region, clientConf, keyId); }
@Override @Deprecated protected GenericApiGatewayClient createClient(final ProcessContext context, final AWSCredentials credentials, final ClientConfiguration clientConfiguration) { return createClient(context, new AWSStaticCredentialsProvider(credentials), clientConfiguration); }
/** * Provides a {@link AWSCredentialsProvider} that is preconfigured to communicate with a given simulated service. * The credentials provider should be set in the AWS Java SDK when building a client, e.g.: * <pre><code>AmazonS3 s3 = AmazonS3ClientBuilder .standard() .withEndpointConfiguration(localstack.getEndpointConfiguration(S3)) .withCredentials(localstack.getDefaultCredentialsProvider()) .build(); </code></pre> * @return an {@link AWSCredentialsProvider} */ public AWSCredentialsProvider getDefaultCredentialsProvider() { return new AWSStaticCredentialsProvider(new BasicAWSCredentials("accesskey", "secretkey")); }
private AWSCredentialsProvider createAwsCredentialsProvider(URI uri, Configuration conf) { Optional<AWSCredentials> credentials = getAwsCredentials(uri, conf); if (credentials.isPresent()) { return new AWSStaticCredentialsProvider(credentials.get()); } if (useInstanceCredentials) { return InstanceProfileCredentialsProvider.getInstance(); } String providerClass = conf.get(S3_CREDENTIALS_PROVIDER); if (!isNullOrEmpty(providerClass)) { return getCustomAWSCredentialsProvider(uri, conf, providerClass); } throw new RuntimeException("S3 credentials not configured"); }
public AWSStaticCredentialsProvider getCredentialsProvider() { return new AWSStaticCredentialsProvider(new BasicAWSCredentials(accessKey, secretKey)); }
private AWSCredentialsProvider getAwsCredentialsProvider(Configuration conf, HiveS3Config defaults) { Optional<AWSCredentials> credentials = getAwsCredentials(conf); if (credentials.isPresent()) { return new AWSStaticCredentialsProvider(credentials.get()); } boolean useInstanceCredentials = conf.getBoolean(S3_USE_INSTANCE_CREDENTIALS, defaults.isS3UseInstanceCredentials()); if (useInstanceCredentials) { return InstanceProfileCredentialsProvider.getInstance(); } String providerClass = conf.get(S3_CREDENTIALS_PROVIDER); if (!isNullOrEmpty(providerClass)) { return getCustomAWSCredentialsProvider(conf, providerClass); } throw new RuntimeException("S3 credentials not configured"); }
private static void applicationCredentials(Config conf, String serviceName, Consumer<AWSCredentialsProvider> consumer) { String accessKey = find(conf, "aws." + serviceName + "." + ACCESS_KEY, "aws." + ACCESS_KEY); if (accessKey != null) { String secretKey = find(conf, "aws." + serviceName + "." + SECRET_KEY, "aws." + SECRET_KEY); String sessionToken = find(conf, "aws." + serviceName + "." + SESSION_TOKEN, "aws." + SESSION_TOKEN); AWSCredentials credentials = sessionToken == null ? new BasicAWSCredentials(accessKey, secretKey) : new BasicSessionCredentials(accessKey, secretKey, sessionToken); consumer.accept(new AWSStaticCredentialsProvider(credentials)); } }
/** * Configures the {@link KmsMasterKeyProvider} to use specific credentials. If a builder was previously set, * this will override whatever credentials it set. * @param credentials * @return */ public Builder withCredentials(AWSCredentials credentials) { return withCredentials(new AWSStaticCredentialsProvider(credentials)); }
/** * @param conf the configuration for this UFS * * @return the created {@link AWSCredentialsProvider} instance */ public static AWSCredentialsProvider createAwsCredentialsProvider( UnderFileSystemConfiguration conf) { // Set the aws credential system properties based on Alluxio properties, if they are set; // otherwise, use the default credential provider. if (conf.isSet(PropertyKey.S3A_ACCESS_KEY) && conf.isSet(PropertyKey.S3A_SECRET_KEY)) { return new AWSStaticCredentialsProvider(new BasicAWSCredentials( conf.get(PropertyKey.S3A_ACCESS_KEY), conf.get(PropertyKey.S3A_SECRET_KEY))); } // Checks, in order, env variables, system properties, profile file, and instance profile. return new DefaultAWSCredentialsProviderChain(); }
/** * Returns an instance of this object with default settings and configured to talk to the * {@link Regions#DEFAULT_REGION}. * * @deprecated The default region set by this constructor is subject to change. Use the builder method to construct * instances of this class for better control. */ @Deprecated public KmsMasterKeyProvider(final AWSCredentials creds) { this(new AWSStaticCredentialsProvider(creds), Region.getRegion(Regions.DEFAULT_REGION), new ClientConfiguration(), Collections.<String> emptyList()); }
public DirectoryQueue(SqsConfiguration sqsConfig) { final AWSCredentials credentials = new BasicAWSCredentials(sqsConfig.getAccessKey(), sqsConfig.getAccessSecret()); final AWSStaticCredentialsProvider credentialsProvider = new AWSStaticCredentialsProvider(credentials); this.queueUrl = sqsConfig.getQueueUrl(); this.sqs = AmazonSQSClientBuilder.standard().withRegion(sqsConfig.getRegion()).withCredentials(credentialsProvider).build(); }
@Override @Deprecated protected GenericApiGatewayClient createClient(final ProcessContext context, final AWSCredentials credentials, final ClientConfiguration clientConfiguration) { return createClient(context, new AWSStaticCredentialsProvider(credentials), clientConfiguration); }
public AmazonS3 getS3Client( VariableSpace space ) throws SdkClientException { if ( !getUseAwsDefaultCredentials() ) { // Handle legacy credentials ( embedded in the step ). We'll force a region since it not specified and // then turn on GlobalBucketAccess so if the files accessed are elsewhere it won't matter. BasicAWSCredentials credentials = new BasicAWSCredentials( Encr.decryptPasswordOptionallyEncrypted( space.environmentSubstitute( awsAccessKey ) ), Encr.decryptPasswordOptionallyEncrypted( space.environmentSubstitute( awsSecretKey ) ) ); return AmazonS3ClientBuilder.standard() .withCredentials( new AWSStaticCredentialsProvider( credentials ) ) .withRegion( Regions.US_EAST_1 ) .enableForceGlobalBucketAccess() .build(); } else { // Get Credentials the new way return AmazonS3ClientBuilder.standard() .enableForceGlobalBucketAccess() .build(); } } }
public AWSCredentialsProvider getCredentialProvider( @NonNull final String configurationName ) { final AWSCredentials credentials = getCredentials( configurationName ); return new AWSStaticCredentialsProvider( credentials ); }
public ProfileController(RateLimiters rateLimiters, AccountsManager accountsManager, ProfilesConfiguration profilesConfiguration) { AWSCredentials credentials = new BasicAWSCredentials(profilesConfiguration.getAccessKey(), profilesConfiguration.getAccessSecret()); AWSCredentialsProvider credentialsProvider = new AWSStaticCredentialsProvider(credentials); this.rateLimiters = rateLimiters; this.accountsManager = accountsManager; this.bucket = profilesConfiguration.getBucket(); this.s3client = AmazonS3Client.builder() .withCredentials(credentialsProvider) .withRegion(profilesConfiguration.getRegion()) .build(); this.policyGenerator = new PostPolicyGenerator(profilesConfiguration.getRegion(), profilesConfiguration.getBucket(), profilesConfiguration.getAccessKey()); this.policySigner = new PolicySigner(profilesConfiguration.getAccessSecret(), profilesConfiguration.getRegion()); }
/** * Configure static AWS credentials, required to calculate the signature. Either * use static credentials or provide a * {@link #credentialsProvider(AWSCredentialsProvider) credentials provider}. * * @param credentials must not be {@literal null}. * @return {@code this} {@link AwsIamAuthenticationOptionsBuilder}. * @see #credentialsProvider(AWSCredentialsProvider) */ public AwsIamAuthenticationOptionsBuilder credentials(AWSCredentials credentials) { Assert.notNull(credentials, "Credentials must not be null"); return credentialsProvider(new AWSStaticCredentialsProvider(credentials)); }
public S3Aws(S3Params s3Params, String region){ s3Client = AmazonS3ClientBuilder.standard() .withCredentials(new AWSStaticCredentialsProvider(new BasicAWSCredentials(s3Params.getAccessKey(), s3Params.getSecretKey()))) .withClientConfiguration(S3URLConnection.buildClientConfig()) .withPathStyleAccessEnabled(true) .withEndpointConfiguration(new AwsClientBuilder.EndpointConfiguration(s3Params.getEndpoint(), region)) .build(); }
/** * Returns an instance of this object with default settings configured to speak to the region * specified by {@code keyId} (if specified). Data will be protected with {@code keyId} as * appropriate. * * @deprecated The default region set by this constructor is subject to change. Use the builder method to construct * instances of this class for better control. */ @Deprecated public KmsMasterKeyProvider(final AWSCredentials creds, final String keyId) { this(new AWSStaticCredentialsProvider(creds), getStartingRegion(keyId), new ClientConfiguration(), keyId); }
private AWSCredentialsProvider getCredentialsProvider() { return new AWSStaticCredentialsProvider(new BasicAWSCredentials(accessKey, secretKey)); }