Skip to content

Commit

Permalink
pr feedback
Browse files Browse the repository at this point in the history
  • Loading branch information
codyoss committed Dec 12, 2024
1 parent 1333764 commit aa974d8
Show file tree
Hide file tree
Showing 11 changed files with 25 additions and 23 deletions.
2 changes: 1 addition & 1 deletion auth/auth.go
Original file line number Diff line number Diff line change
Expand Up @@ -568,7 +568,7 @@ func (tp tokenProvider2LO) Token(ctx context.Context) (*Token, error) {
return nil, err
}
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
tp.logger.DebugContext(ctx, "2LO token fetch", "request", internallog.HTTPRequest(req, []byte(v.Encode())))
tp.logger.DebugContext(ctx, "2LO token request", "request", internallog.HTTPRequest(req, []byte(v.Encode())))
resp, body, err := internal.DoRequest(tp.Client, req)
if err != nil {
return nil, fmt.Errorf("auth: cannot fetch token: %w", err)
Expand Down
2 changes: 1 addition & 1 deletion auth/credentials/downscope/downscope.go
Original file line number Diff line number Diff line change
Expand Up @@ -196,7 +196,7 @@ func (dts *downscopedTokenProvider) Token(ctx context.Context) (*auth.Token, err
return nil, err
}
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
dts.logger.DebugContext(ctx, "downscoped token fetch", "request", internallog.HTTPRequest(req, []byte(form.Encode())))
dts.logger.DebugContext(ctx, "downscoped token request", "request", internallog.HTTPRequest(req, []byte(form.Encode())))
resp, body, err := internal.DoRequest(dts.Client, req)
if err != nil {
return nil, err
Expand Down
2 changes: 1 addition & 1 deletion auth/credentials/idtoken/cache.go
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@ func (c *cachingClient) getCert(ctx context.Context, url string) (*certResponse,
if err != nil {
return nil, err
}
c.logger.DebugContext(ctx, "cert fetch", "request", internallog.HTTPRequest(req, nil))
c.logger.DebugContext(ctx, "cert request", "request", internallog.HTTPRequest(req, nil))
resp, body, err := internal.DoRequest(c.client, req)
if err != nil {
return nil, err
Expand Down
22 changes: 12 additions & 10 deletions auth/credentials/impersonate/idtoken.go
Original file line number Diff line number Diff line change
Expand Up @@ -96,18 +96,20 @@ func NewIDTokenCredentials(opts *IDTokenOptions) (*auth.Credentials, error) {
logger := internallog.New(opts.Logger)
if client == nil {
var err error
// TODO: test not signed jwt more
creds, err = credentials.DetectDefault(&credentials.DetectOptions{
Scopes: []string{defaultScope},
UseSelfSignedJWT: true,
Logger: logger,
})
if err != nil {
return nil, err
if creds == nil {
// TODO: test not signed jwt more
creds, err = credentials.DetectDefault(&credentials.DetectOptions{
Scopes: []string{defaultScope},
UseSelfSignedJWT: true,
Logger: logger,
})
if err != nil {
return nil, err
}
}
client, err = httptransport.NewClient(&httptransport.Options{
Credentials: creds,
Logger: opts.Logger,
Logger: logger,
})
if err != nil {
return nil, err
Expand Down Expand Up @@ -172,7 +174,7 @@ func (i impersonatedIDTokenProvider) Token(ctx context.Context) (*auth.Token, er
return nil, fmt.Errorf("impersonate: unable to create request: %w", err)
}
req.Header.Set("Content-Type", "application/json")
i.logger.DebugContext(ctx, "impersonated idtoken fetch", "request", internallog.HTTPRequest(req, bodyBytes))
i.logger.DebugContext(ctx, "impersonated idtoken request", "request", internallog.HTTPRequest(req, bodyBytes))
resp, body, err := internal.DoRequest(i.client, req)
if err != nil {
return nil, fmt.Errorf("impersonate: unable to generate ID token: %w", err)
Expand Down
2 changes: 1 addition & 1 deletion auth/credentials/impersonate/impersonate.go
Original file line number Diff line number Diff line change
Expand Up @@ -263,7 +263,7 @@ func (i impersonatedTokenProvider) Token(ctx context.Context) (*auth.Token, erro
return nil, fmt.Errorf("impersonate: unable to create request: %w", err)
}
req.Header.Set("Content-Type", "application/json")
i.logger.DebugContext(ctx, "impersonated token fetch", "request", internallog.HTTPRequest(req, b))
i.logger.DebugContext(ctx, "impersonated token request", "request", internallog.HTTPRequest(req, b))
resp, body, err := internal.DoRequest(i.client, req)
if err != nil {
return nil, fmt.Errorf("impersonate: unable to generate access token: %w", err)
Expand Down
8 changes: 4 additions & 4 deletions auth/credentials/internal/externalaccount/aws_provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -195,7 +195,7 @@ func (sp *awsSubjectProvider) getAWSSessionToken(ctx context.Context) (string, e
}
req.Header.Set(awsIMDSv2SessionTTLHeader, awsIMDSv2SessionTTL)

sp.logger.DebugContext(ctx, "aws session token fetch", "request", internallog.HTTPRequest(req, nil))
sp.logger.DebugContext(ctx, "aws session token request", "request", internallog.HTTPRequest(req, nil))
resp, body, err := internal.DoRequest(sp.Client, req)
if err != nil {
return "", err
Expand Down Expand Up @@ -230,7 +230,7 @@ func (sp *awsSubjectProvider) getRegion(ctx context.Context, headers map[string]
for name, value := range headers {
req.Header.Add(name, value)
}
sp.logger.DebugContext(ctx, "aws region fetch", "request", internallog.HTTPRequest(req, nil))
sp.logger.DebugContext(ctx, "aws region request", "request", internallog.HTTPRequest(req, nil))
resp, body, err := internal.DoRequest(sp.Client, req)
if err != nil {
return "", err
Expand Down Expand Up @@ -290,7 +290,7 @@ func (sp *awsSubjectProvider) getMetadataSecurityCredentials(ctx context.Context
for name, value := range headers {
req.Header.Add(name, value)
}
sp.logger.DebugContext(ctx, "aws security credential fetch", "request", internallog.HTTPRequest(req, nil))
sp.logger.DebugContext(ctx, "aws security credential request", "request", internallog.HTTPRequest(req, nil))
resp, body, err := internal.DoRequest(sp.Client, req)
if err != nil {
return result, err
Expand All @@ -317,7 +317,7 @@ func (sp *awsSubjectProvider) getMetadataRoleName(ctx context.Context, headers m
req.Header.Add(name, value)
}

sp.logger.DebugContext(ctx, "aws metadata role fetch", "request", internallog.HTTPRequest(req, nil))
sp.logger.DebugContext(ctx, "aws metadata role request", "request", internallog.HTTPRequest(req, nil))
resp, body, err := internal.DoRequest(sp.Client, req)
if err != nil {
return "", err
Expand Down
2 changes: 1 addition & 1 deletion auth/credentials/internal/externalaccount/url_provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ func (sp *urlSubjectProvider) subjectToken(ctx context.Context) (string, error)
for key, val := range sp.Headers {
req.Header.Add(key, val)
}
sp.Logger.DebugContext(ctx, "url subject token fetch", "request", internallog.HTTPRequest(req, nil))
sp.Logger.DebugContext(ctx, "url subject token request", "request", internallog.HTTPRequest(req, nil))
resp, body, err := internal.DoRequest(sp.Client, req)
if err != nil {
return "", fmt.Errorf("credentials: invalid response when retrieving subject token: %w", err)
Expand Down
2 changes: 1 addition & 1 deletion auth/credentials/internal/gdch/gdch.go
Original file line number Diff line number Diff line change
Expand Up @@ -141,7 +141,7 @@ func (g gdchProvider) Token(ctx context.Context) (*auth.Token, error) {
return nil, err
}
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
g.logger.DebugContext(ctx, "gdch token fetch", "request", internallog.HTTPRequest(req, []byte(v.Encode())))
g.logger.DebugContext(ctx, "gdch token request", "request", internallog.HTTPRequest(req, []byte(v.Encode())))
resp, body, err := internal.DoRequest(g.client, req)
if err != nil {
return nil, fmt.Errorf("credentials: cannot fetch token: %w", err)
Expand Down
2 changes: 1 addition & 1 deletion auth/credentials/internal/impersonate/impersonate.go
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ func (o *Options) Token(ctx context.Context) (*auth.Token, error) {
if err := setAuthHeader(ctx, o.Tp, req); err != nil {
return nil, err
}
logger.DebugContext(ctx, "impersonated token fetch", "request", internallog.HTTPRequest(req, b))
logger.DebugContext(ctx, "impersonated token request", "request", internallog.HTTPRequest(req, b))
resp, body, err := internal.DoRequest(o.Client, req)
if err != nil {
return nil, fmt.Errorf("credentials: unable to generate access token: %w", err)
Expand Down
2 changes: 1 addition & 1 deletion auth/credentials/internal/stsexchange/sts_exchange.go
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,7 @@ func doRequest(ctx context.Context, opts *Options, data url.Values) (*TokenRespo
}
req.Header.Set("Content-Length", strconv.Itoa(len(encodedData)))

logger.DebugContext(ctx, "sts token fetch", "request", internallog.HTTPRequest(req, []byte(encodedData)))
logger.DebugContext(ctx, "sts token request", "request", internallog.HTTPRequest(req, []byte(encodedData)))
resp, body, err := internal.DoRequest(opts.Client, req)
if err != nil {
return nil, fmt.Errorf("credentials: invalid response from Secure Token Server: %w", err)
Expand Down
2 changes: 1 addition & 1 deletion auth/threelegged.go
Original file line number Diff line number Diff line change
Expand Up @@ -306,7 +306,7 @@ func fetchToken(ctx context.Context, o *Options3LO, v url.Values) (*Token, strin
}
logger := o.logger()

logger.DebugContext(ctx, "3LO token fetch", "request", internallog.HTTPRequest(req, []byte(v.Encode())))
logger.DebugContext(ctx, "3LO token request", "request", internallog.HTTPRequest(req, []byte(v.Encode())))
// Make request
resp, body, err := internal.DoRequest(o.client(), req)
if err != nil {
Expand Down

0 comments on commit aa974d8

Please sign in to comment.