public AWSCredentials getCredentials() { return iamCredProvider.getCredentials(); }
@Override public AWSCredentials getCredentials() throws Exception { return this.credentialsProvider.getCredentials(); }
public String getSecretAccessKey() { return iamCredProvider.getCredentials().getAWSSecretKey(); }
public String getAccessKeyId() { return iamCredProvider.getCredentials().getAWSAccessKeyId(); }
InstanceProfileCredentialsProvider mInstanceProfileCredentialsProvider = new InstanceProfileCredentialsProvider(); AWSCredentials credentials = mInstanceProfileCredentialsProvider.getCredentials();
public FormValidation doCheckUseInstanceProfileForCredentials(@QueryParameter boolean value) { if (value) { try { new InstanceProfileCredentialsProvider().getCredentials(); } catch (AmazonClientException e) { return FormValidation.error(Messages.EC2Cloud_FailedToObtainCredentialsFromEC2(), e.getMessage()); } } return FormValidation.ok(); }
public FormValidation doCheckUseInstanceProfileForCredentials(@QueryParameter boolean value) { if (value) { try { new InstanceProfileCredentialsProvider().getCredentials(); } catch (AmazonClientException e) { return FormValidation.error(Messages.EC2Cloud_FailedToObtainCredentailsFromEC2(), e.getMessage()); } } return FormValidation.ok(); }
private static String[] getAwsCredentials() { InstanceProfileCredentialsProvider ipcp = new InstanceProfileCredentialsProvider(); try { ipcp.refresh(); return new String[]{ipcp.getCredentials().getAWSAccessKeyId(), ipcp.getCredentials().getAWSSecretKey()}; } catch (Exception e) { return new String[]{"", ""}; } }
public AWSCredentials getCredentials() { AWSCredentials initialCredentials = new BasicAWSCredentials(accessKey, secretKey.getPlainText()); if (StringUtils.isBlank(iamRoleArn)) { return initialCredentials; } else { // Handle the case of delegation to instance profile if (StringUtils.isBlank(accessKey) && StringUtils.isBlank(secretKey.getPlainText()) ) { initialCredentials = (new InstanceProfileCredentialsProvider()).getCredentials(); } AssumeRoleRequest assumeRequest = createAssumeRoleRequest(iamRoleArn); AssumeRoleResult assumeResult = new AWSSecurityTokenServiceClient(initialCredentials).assumeRole(assumeRequest); return new BasicSessionCredentials( assumeResult.getCredentials().getAccessKeyId(), assumeResult.getCredentials().getSecretAccessKey(), assumeResult.getCredentials().getSessionToken()); } }
protected void parseArguments() throws Exception { parser.parseArgument(args); // for credentials, check for IAM role usage if not then... // try the .aws/config file first if there is a profile specified, otherwise defer to // .s3cfg before using the default .aws/config credentials // (this may attempt .aws/config twice for no reason, but maintains backward compatibility) if (options.isUseIamRole() == false) { if (!options.hasAwsKeys() && options.getProfile() != null) loadAwsKeysFromAwsConfig(); if (!options.hasAwsKeys()) loadAwsKeysFromS3Config(); if (!options.hasAwsKeys()) loadAwsKeysFromAwsConfig(); if (!options.hasAwsKeys()) loadAwsKeysFromAwsCredentials(); if (!options.hasAwsKeys()) { throw new IllegalStateException("Could not find credentials, IAM Role usage not specified and ENV vars not defined: " + MirrorOptions.AWS_ACCESS_KEY + " and/or " + MirrorOptions.AWS_SECRET_KEY); } } else { InstanceProfileCredentialsProvider client = new InstanceProfileCredentialsProvider(); if (client.getCredentials() == null) { throw new IllegalStateException("Could not find IAM Instance Profile credentials from the AWS metadata service."); } } options.initDerivedFields(); }