@Override public AWSCredentialsProvider getCredentialsProvider(Map<PropertyDescriptor, String> properties) { String profileName = properties.get(CredentialPropertyDescriptors.PROFILE_NAME); return new ProfileCredentialsProvider(profileName); }
public ClusterGraphService(String s3CredentialsFilename, Boolean workOffline, String bucket) { if(!workOffline) { if (s3CredentialsFilename != null) { AWSCredentials creds = new ProfileCredentialsProvider(s3CredentialsFilename, "default").getCredentials(); s3 = new AmazonS3Client(creds); } else { // This will first check for credentials in environment variables or ~/.aws/credentials // then fall back on S3 credentials propagated to EC2 instances via IAM roles. s3 = new AmazonS3Client(); } this.graphBucket = bucket; } this.workOffline = workOffline; }
@Bean public ProfileCredentialsProvider profileCredentialsProvider() { return new ProfileCredentialsProvider(CREDENTIALS_PROFILE_NAME); }
public PointSetDatastore(Integer maxCacheSize, String s3CredentialsFilename, Boolean workOffline, String pointsetBucket){ super(); // allow the data store to work offline with cached data and skip S3 connection this.workOffline = workOffline; this.pointsetBucket = pointsetBucket; if(!this.workOffline) { if (s3CredentialsFilename != null) { AWSCredentials creds = new ProfileCredentialsProvider(s3CredentialsFilename, "default").getCredentials(); s3 = new AmazonS3Client(creds); } else { // default credentials providers, e.g. IAM role s3 = new AmazonS3Client(); } } // set up the cache this.pointSets = CacheBuilder.newBuilder() .maximumSize(maxCacheSize) .build(new S3PointSetLoader(workOffline, s3, pointsetBucket)); }
private static LinkedList<AWSCredentialsProvider> chain() { LinkedList<AWSCredentialsProvider> chain = new LinkedList<>(); chain.add(new EnvironmentVariableCredentialsProvider()); chain.add(new SystemPropertiesCredentialsProvider()); chain.add(new ProfileCredentialsProvider()); chain.add(new EC2ContainerCredentialsProviderWrapper()); return chain; }
new ProfileCredentialsProvider(); try { credentialsProvider.getCredentials(); } catch (Exception e) { throw new AmazonClientException(
public DefaultAWSCredentialsProviderChain() { super(new EnvironmentVariableCredentialsProvider(), new SystemPropertiesCredentialsProvider(), new ProfileCredentialsProvider(), new EC2ContainerCredentialsProviderWrapper()); }
@Bean public AmazonS3Client s3Client() { AWSCredentials credentials = new ProfileCredentialsProvider(awsProfileName).getCredentials(); AmazonS3Client s3Client = new AmazonS3Client(credentials); Region region = Region.getRegion(Regions.EU_WEST_1); s3Client.setRegion(region); return s3Client; } }
public CredentialsProviderChain () { super(new EnvironmentVariableCredentialsProvider(), new SystemPropertiesCredentialsProvider(), new ClasspathPropertiesFileCredentialsProvider(), new InstanceProfileCredentialsProvider(), new ProfileCredentialsProvider()); } }
private AWSCredentials getCredentials() { String awsProfile = getParamString("aws_profile"); if (!Utils.isEmpty(awsProfile)) { m_logger.info("Using AWS profile: {}", awsProfile); ProfileCredentialsProvider credsProvider = null; String awsCredentialsFile = getParamString("aws_credentials_file"); if (!Utils.isEmpty(awsCredentialsFile)) { credsProvider = new ProfileCredentialsProvider(awsCredentialsFile, awsProfile); } else { credsProvider = new ProfileCredentialsProvider(awsProfile); } return credsProvider.getCredentials(); } String awsAccessKey = getParamString("aws_access_key"); Utils.require(!Utils.isEmpty(awsAccessKey), "Either 'aws_profile' or 'aws_access_key' must be defined for tenant: " + m_tenant.getName()); String awsSecretKey = getParamString("aws_secret_key"); Utils.require(!Utils.isEmpty(awsSecretKey), "'aws_secret_key' must be defined when 'aws_access_key' is defined. " + "'aws_profile' is preferred over aws_access_key/aws_secret_key. Tenant: " + m_tenant.getName()); return new BasicAWSCredentials(awsAccessKey, awsSecretKey); }
public static AWSCredentialsProviderChain defaultAWSCredentialsProviderChain(final AWSCredentialsConfig config) { return new AWSCredentialsProviderChain( new ConfigDrivenAwsCredentialsConfigProvider(config), new LazyFileSessionCredentialsProvider(config), new EnvironmentVariableCredentialsProvider(), new SystemPropertiesCredentialsProvider(), new ProfileCredentialsProvider(), new InstanceProfileCredentialsProvider()); } }
credentials = new ProfileCredentialsProvider().getCredentials(); } catch (Exception e) { throw new AmazonClientException("Cannot load the credentials from the credential profiles file!", e);
DefaultAWSCredentialsProviderChain(Config config) { super(new EnvironmentVariableCredentialsProvider(), new SystemPropertiesCredentialsProvider(), new ConfigurationCredentialsProvider(config), new ProfileCredentialsProvider(), new InstanceProfileCredentialsProvider()); } }
if (task.getProfileFile().isPresent()) { ProfilesConfigFile file = new ProfilesConfigFile(task.getProfileFile().get().getFile()); provider = new ProfileCredentialsProvider(file, profileName); provider = new ProfileCredentialsProvider(profileName); return overwriteBasicCredentials(task, provider.getCredentials());
/** * Constructor. * @param clientConfiguration clientConfiguration * @param environment environment */ public AWSLambdaConfiguration(AWSClientConfiguration clientConfiguration, Environment environment) { this.clientConfiguration = clientConfiguration; this.builder.setCredentials(new AWSCredentialsProviderChain( new EnvironmentAWSCredentialsProvider(environment), new EnvironmentVariableCredentialsProvider(), new SystemPropertiesCredentialsProvider(), new ProfileCredentialsProvider(), new EC2ContainerCredentialsProviderWrapper() )); }
.withCredentials(new ProfileCredentialsProvider()) .withRegion(region) .build();
public DefaultAWSCredentialsProviderChain() { super(new EnvironmentVariableCredentialsProvider(), new SystemPropertiesCredentialsProvider(), new ProfileCredentialsProvider(), new EC2ContainerCredentialsProviderWrapper()); }