/** * @return An instance of {@link KmsMasterKeyProvider}. */ KmsMasterKeyProvider createKmsMasterKeyProvider() { return new KmsMasterKeyProvider(new AWSStaticCredentialsProvider(creds), region, clientConf, keyId); }
/** * Gets an {@link AWSCredentialsProvider} that may be used to connect to this container. * * @return dummy AWS credentials */ public AWSCredentialsProvider getCredentials() { return new AWSStaticCredentialsProvider(new BasicAWSCredentials("dummy", "dummy")); }
/** * Provides a {@link AWSCredentialsProvider} that is preconfigured to communicate with a given simulated service. * The credentials provider should be set in the AWS Java SDK when building a client, e.g.: * <pre><code>AmazonS3 s3 = AmazonS3ClientBuilder .standard() .withEndpointConfiguration(localstack.getEndpointConfiguration(S3)) .withCredentials(localstack.getDefaultCredentialsProvider()) .build(); </code></pre> * @return an {@link AWSCredentialsProvider} */ public AWSCredentialsProvider getDefaultCredentialsProvider() { return new AWSStaticCredentialsProvider(new BasicAWSCredentials("accesskey", "secretkey")); }
public AWSStaticCredentialsProvider getCredentialsProvider() { return new AWSStaticCredentialsProvider(new BasicAWSCredentials(accessKey, secretKey)); }
@Override @Deprecated protected GenericApiGatewayClient createClient(final ProcessContext context, final AWSCredentials credentials, final ClientConfiguration clientConfiguration) { return createClient(context, new AWSStaticCredentialsProvider(credentials), clientConfiguration); }
private AWSCredentialsProvider createAwsCredentialsProvider(URI uri, Configuration conf) { Optional<AWSCredentials> credentials = getAwsCredentials(uri, conf); if (credentials.isPresent()) { return new AWSStaticCredentialsProvider(credentials.get()); } if (useInstanceCredentials) { return InstanceProfileCredentialsProvider.getInstance(); } String providerClass = conf.get(S3_CREDENTIALS_PROVIDER); if (!isNullOrEmpty(providerClass)) { return getCustomAWSCredentialsProvider(uri, conf, providerClass); } throw new RuntimeException("S3 credentials not configured"); }
private AWSCredentialsProvider getAwsCredentialsProvider(Configuration conf, HiveS3Config defaults) { Optional<AWSCredentials> credentials = getAwsCredentials(conf); if (credentials.isPresent()) { return new AWSStaticCredentialsProvider(credentials.get()); } boolean useInstanceCredentials = conf.getBoolean(S3_USE_INSTANCE_CREDENTIALS, defaults.isS3UseInstanceCredentials()); if (useInstanceCredentials) { return InstanceProfileCredentialsProvider.getInstance(); } String providerClass = conf.get(S3_CREDENTIALS_PROVIDER); if (!isNullOrEmpty(providerClass)) { return getCustomAWSCredentialsProvider(conf, providerClass); } throw new RuntimeException("S3 credentials not configured"); }
private static void applicationCredentials(Config conf, String serviceName, Consumer<AWSCredentialsProvider> consumer) { String accessKey = find(conf, "aws." + serviceName + "." + ACCESS_KEY, "aws." + ACCESS_KEY); if (accessKey != null) { String secretKey = find(conf, "aws." + serviceName + "." + SECRET_KEY, "aws." + SECRET_KEY); String sessionToken = find(conf, "aws." + serviceName + "." + SESSION_TOKEN, "aws." + SESSION_TOKEN); AWSCredentials credentials = sessionToken == null ? new BasicAWSCredentials(accessKey, secretKey) : new BasicSessionCredentials(accessKey, secretKey, sessionToken); consumer.accept(new AWSStaticCredentialsProvider(credentials)); } }
/** * @param conf the configuration for this UFS * * @return the created {@link AWSCredentialsProvider} instance */ public static AWSCredentialsProvider createAwsCredentialsProvider( UnderFileSystemConfiguration conf) { // Set the aws credential system properties based on Alluxio properties, if they are set; // otherwise, use the default credential provider. if (conf.isSet(PropertyKey.S3A_ACCESS_KEY) && conf.isSet(PropertyKey.S3A_SECRET_KEY)) { return new AWSStaticCredentialsProvider(new BasicAWSCredentials( conf.get(PropertyKey.S3A_ACCESS_KEY), conf.get(PropertyKey.S3A_SECRET_KEY))); } // Checks, in order, env variables, system properties, profile file, and instance profile. return new DefaultAWSCredentialsProviderChain(); }
public DirectoryQueue(SqsConfiguration sqsConfig) { final AWSCredentials credentials = new BasicAWSCredentials(sqsConfig.getAccessKey(), sqsConfig.getAccessSecret()); final AWSStaticCredentialsProvider credentialsProvider = new AWSStaticCredentialsProvider(credentials); this.queueUrl = sqsConfig.getQueueUrl(); this.sqs = AmazonSQSClientBuilder.standard().withRegion(sqsConfig.getRegion()).withCredentials(credentialsProvider).build(); }
public AmazonS3 getS3Client( VariableSpace space ) throws SdkClientException { if ( !getUseAwsDefaultCredentials() ) { // Handle legacy credentials ( embedded in the step ). We'll force a region since it not specified and // then turn on GlobalBucketAccess so if the files accessed are elsewhere it won't matter. BasicAWSCredentials credentials = new BasicAWSCredentials( Encr.decryptPasswordOptionallyEncrypted( space.environmentSubstitute( awsAccessKey ) ), Encr.decryptPasswordOptionallyEncrypted( space.environmentSubstitute( awsSecretKey ) ) ); return AmazonS3ClientBuilder.standard() .withCredentials( new AWSStaticCredentialsProvider( credentials ) ) .withRegion( Regions.US_EAST_1 ) .enableForceGlobalBucketAccess() .build(); } else { // Get Credentials the new way return AmazonS3ClientBuilder.standard() .enableForceGlobalBucketAccess() .build(); } } }
public ProfileController(RateLimiters rateLimiters, AccountsManager accountsManager, ProfilesConfiguration profilesConfiguration) { AWSCredentials credentials = new BasicAWSCredentials(profilesConfiguration.getAccessKey(), profilesConfiguration.getAccessSecret()); AWSCredentialsProvider credentialsProvider = new AWSStaticCredentialsProvider(credentials); this.rateLimiters = rateLimiters; this.accountsManager = accountsManager; this.bucket = profilesConfiguration.getBucket(); this.s3client = AmazonS3Client.builder() .withCredentials(credentialsProvider) .withRegion(profilesConfiguration.getRegion()) .build(); this.policyGenerator = new PostPolicyGenerator(profilesConfiguration.getRegion(), profilesConfiguration.getBucket(), profilesConfiguration.getAccessKey()); this.policySigner = new PolicySigner(profilesConfiguration.getAccessSecret(), profilesConfiguration.getRegion()); }
public S3Aws(S3Params s3Params, String region){ s3Client = AmazonS3ClientBuilder.standard() .withCredentials(new AWSStaticCredentialsProvider(new BasicAWSCredentials(s3Params.getAccessKey(), s3Params.getSecretKey()))) .withClientConfiguration(S3URLConnection.buildClientConfig()) .withPathStyleAccessEnabled(true) .withEndpointConfiguration(new AwsClientBuilder.EndpointConfiguration(s3Params.getEndpoint(), region)) .build(); }
public static AWSStaticCredentialsProvider getCredential() throws InvalidAWSCredentialsException { verifyAWSCredentials(); return new AWSStaticCredentialsProvider( new BasicAWSCredentials(System.getProperty("aws.accessKeyId"), System.getProperty("aws.secretKey"))); } }
public static AWSCredentialsProvider getAwsCredentialsProvider(String accessKeyId, String secretKey) { if (accessKeyId != null && secretKey != null) { return new AWSStaticCredentialsProvider(new BasicAWSCredentials(accessKeyId, secretKey)); } else { return DefaultAWSCredentialsProviderChain.getInstance(); } } }
@Bean @ConditionalOnMissingBean(name = "awsDynamoCredentialsProvider") public AWSCredentialsProvider awsDynamoCredentialsProvider() { return new AWSStaticCredentialsProvider(new BasicAWSCredentials( this.properties.getAccessKey(), this.properties.getSecretKey())); }
private static AWSCredentialsProvider handleStaticCredentials(EnvVars vars) { String accessKey = vars.get(AWS_ACCESS_KEY_ID); String secretAccessKey = vars.get(AWS_SECRET_ACCESS_KEY); if (accessKey != null && secretAccessKey != null) { String sessionToken = vars.get(AWS_SESSION_TOKEN); if (sessionToken != null) { return new AWSStaticCredentialsProvider(new BasicSessionCredentials(accessKey, secretAccessKey, sessionToken)); } return new AWSStaticCredentialsProvider(new BasicAWSCredentials(accessKey, secretAccessKey)); } return null; }
@Override public void refresh() { if (StringUtils.isNotEmpty(config.accessKey()) && StringUtils.isNotEmpty(config.secretKey())) { credentialsProvider = new AWSStaticCredentialsProvider(new BasicAWSCredentials(config.accessKey(), config.secretKey())); } else { credentialsProvider = DefaultAWSCredentialsProviderChain.getInstance(); } credentialsProvider.refresh(); } }
public S3Operator(String regionName, String accessKey, String secretKey) { Regions region = Regions.fromName(regionName); BasicAWSCredentials awsCreds = new BasicAWSCredentials(accessKey, secretKey); s3client = AmazonS3ClientBuilder.standard().withRegion(region).withCredentials(new AWSStaticCredentialsProvider(awsCreds)).build(); logger.info("[GeoSparkViz][Constructor] Initialized a S3 client"); }
public static AmazonS3 createS3Client(AWSCredentials credentials, ClientConfiguration cc, Regions region) { return AmazonS3ClientBuilder // .standard() // .withCredentials(new AWSStaticCredentialsProvider(credentials)) // .withRegion(region) // .build(); } }