Skip to content

Commit

Permalink
fix(event_listeners): check identity type in VALIDATE_CREDENTIALS
Browse files Browse the repository at this point in the history
  • Loading branch information
kuhe committed Nov 28, 2022
1 parent 282e61d commit 8523ff4
Showing 1 changed file with 26 additions and 9 deletions.
35 changes: 26 additions & 9 deletions lib/event_listeners.js
Expand Up @@ -92,16 +92,33 @@ function getIdentityType(req) {

AWS.EventListeners = {
Core: new SequentialExecutor().addNamedListeners(function(add, addAsync) {
addAsync('VALIDATE_CREDENTIALS', 'validate',
function VALIDATE_CREDENTIALS(req, done) {
if (!req.service.api.signatureVersion && !req.service.config.signatureVersion) return done(); // none
req.service.config.getCredentials(function(err) {
if (err) {
req.response.error = AWS.util.error(err,
{code: 'CredentialsError', message: 'Missing credentials in config, if using AWS_CONFIG_FILE, set AWS_SDK_LOAD_CONFIG=1'});
addAsync(
'VALIDATE_CREDENTIALS', 'validate',
function VALIDATE_CREDENTIALS(req, done) {
if (!req.service.api.signatureVersion && !req.service.config.signatureVersion) return done(); // none

var identityType = getIdentityType(req);
if (identityType === 'bearer') {
req.service.config.getToken(function(err) {
if (err) {
req.response.error = AWS.util.error(err, {code: 'TokenError'});
}
done();
});
return;
}
done();
});

req.service.config.getCredentials(function(err) {
if (err) {
req.response.error = AWS.util.error(err,
{
code: 'CredentialsError',
message: 'Missing credentials in config, if using AWS_CONFIG_FILE, set AWS_SDK_LOAD_CONFIG=1'
}
);
}
done();
});
});

add('VALIDATE_REGION', 'validate', function VALIDATE_REGION(req) {
Expand Down

0 comments on commit 8523ff4

Please sign in to comment.