-
Notifications
You must be signed in to change notification settings - Fork 229
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: Adds support for user defined subject token suppliers in AWSCre…
…dentials and IdentityPoolCredentials (#1336) * feat: adds programmatic auth credentials for identity pool and aws credential types * feat: add quality of life improvements for building external account credentials in code. * fix: formatting * fix: add formatting * Adds @CanIgnoreReturnValue on new builder methods * Change test for impersonated credentials * formatting * adding id_token type * formatting * Update oauth2_http/java/com/google/auth/oauth2/AwsCredentials.java Co-authored-by: Leo <[email protected]> * PR comments * Added header value constants * updating java doc * adding integration tests * fix tests * fix tests, add javadoc, and format * PR review comments * Update oauth2_http/java/com/google/auth/oauth2/AwsCredentials.java Co-authored-by: Leo <[email protected]> * PR comments * changing to aws_region instead of region to clarify usage and keep region available for future use. * Adding Aws Security Credential Providers * Adding identity pool providers * PR comments * fix test * refactoring to expose rename provider to supplier and expose it publicly * formatting * updating codeowners * make subject token supplier interface public * Making AwsSecurityCredentials public and change name to sessionToken * lint * fix tests * lint --------- Co-authored-by: Leo <[email protected]>
- Loading branch information
Showing
20 changed files
with
2,424 additions
and
1,105 deletions.
There are no files selected for viewing
Validating CODEOWNERS rules …
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.