GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Passed
Push — master ( e98371...36e3cf )
by
unknown
17:37 queued 07:40
created

credentials/internal/providers/default.go   A

Size/Duplication

Total Lines 93
Duplicated Lines 0 %

Importance

Changes 0
Metric Value
cc 12
eloc 53
dl 0
loc 93
rs 10
c 0
b 0
f 0

3 Methods

Rating   Name   Duplication   Size   Complexity  
B providers.*DefaultCredentialsProvider.GetCredentials 0 39 6
A providers.*DefaultCredentialsProvider.GetProviderName 0 2 1
A providers.NewDefaultCredentialsProvider 0 34 5
1
package providers
2
3
import (
4
	"fmt"
5
	"os"
6
	"strings"
7
)
8
9
type DefaultCredentialsProvider struct {
10
	providerChain    []CredentialsProvider
11
	lastUsedProvider CredentialsProvider
12
}
13
14
func NewDefaultCredentialsProvider() (provider *DefaultCredentialsProvider) {
15
	providers := []CredentialsProvider{}
16
17
	// Add static ak or sts credentials provider
18
	envProvider, err := NewEnvironmentVariableCredentialsProviderBuilder().Build()
19
	if err == nil {
20
		providers = append(providers, envProvider)
21
	}
22
23
	// oidc check
24
	oidcProvider, err := NewOIDCCredentialsProviderBuilder().Build()
25
	if err == nil {
26
		providers = append(providers, oidcProvider)
27
	}
28
29
	// cli credentials provider
30
	providers = append(providers, NewCLIProfileCredentialsProviderBuilder().Build())
31
32
	// profile credentials provider
33
	// providers = append(providers)
34
	providers = append(providers, NewProfileCredentialsProviderBuilder().Build())
35
36
	// Add IMDS
37
	if os.Getenv("ALIBABA_CLOUD_ECS_METADATA") != "" {
38
		ecsRamRoleProvider, err := NewECSRAMRoleCredentialsProviderBuilder().WithRoleName(os.Getenv("ALIBABA_CLOUD_ECS_METADATA")).Build()
39
		if err == nil {
40
			providers = append(providers, ecsRamRoleProvider)
41
		}
42
	}
43
44
	// TODO: ALIBABA_CLOUD_CREDENTIALS_URI check
45
46
	return &DefaultCredentialsProvider{
47
		providerChain: providers,
48
	}
49
}
50
51
func (provider *DefaultCredentialsProvider) GetCredentials() (cc *Credentials, err error) {
52
	if provider.lastUsedProvider != nil {
53
		inner, err1 := provider.lastUsedProvider.GetCredentials()
54
		if err1 != nil {
55
			return
56
		}
57
58
		cc = &Credentials{
59
			AccessKeyId:     inner.AccessKeyId,
60
			AccessKeySecret: inner.AccessKeySecret,
61
			SecurityToken:   inner.SecurityToken,
62
			ProviderName:    fmt.Sprintf("%s/%s", provider.GetProviderName(), provider.lastUsedProvider.GetProviderName()),
63
		}
64
		return
65
	}
66
67
	errors := []string{}
68
	for _, p := range provider.providerChain {
69
		provider.lastUsedProvider = p
70
		inner, errInLoop := p.GetCredentials()
71
		if errInLoop != nil {
72
			errors = append(errors, errInLoop.Error())
73
			// 如果有错误,进入下一个获取过程
74
			continue
75
		}
76
77
		if inner != nil {
78
			cc = &Credentials{
79
				AccessKeyId:     inner.AccessKeyId,
80
				AccessKeySecret: inner.AccessKeySecret,
81
				SecurityToken:   inner.SecurityToken,
82
				ProviderName:    fmt.Sprintf("%s/%s", provider.GetProviderName(), p.GetProviderName()),
83
			}
84
			return
85
		}
86
	}
87
88
	err = fmt.Errorf("unable to get credentials from any of the providers in the chain: %s", strings.Join(errors, ", "))
89
	return
90
}
91
92
func (provider *DefaultCredentialsProvider) GetProviderName() string {
93
	return "default"
94
}
95