GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Passed
Push — master ( 47c2ea...25ec51 )
by
unknown
05:34
created

credentials/providers/default.go   A

Size/Duplication

Total Lines 98
Duplicated Lines 0 %

Importance

Changes 0
Metric Value
cc 14
eloc 57
dl 0
loc 98
rs 10
c 0
b 0
f 0

3 Methods

Rating   Name   Duplication   Size   Complexity  
B providers.*DefaultCredentialsProvider.GetCredentials 0 39 6
A providers.*DefaultCredentialsProvider.GetProviderName 0 2 1
B providers.NewDefaultCredentialsProvider 0 39 7
1
package providers
2
3
import (
4
	"fmt"
5
	"os"
6
	"strings"
7
)
8
9
type DefaultCredentialsProvider struct {
10
	providerChain    []CredentialsProvider
11
	lastUsedProvider CredentialsProvider
12
}
13
14
func NewDefaultCredentialsProvider() (provider *DefaultCredentialsProvider) {
15
	providers := []CredentialsProvider{}
16
17
	// Add static ak or sts credentials provider
18
	envProvider, err := NewEnvironmentVariableCredentialsProviderBuilder().Build()
19
	if err == nil {
20
		providers = append(providers, envProvider)
21
	}
22
23
	// oidc check
24
	oidcProvider, err := NewOIDCCredentialsProviderBuilder().Build()
25
	if err == nil {
26
		providers = append(providers, oidcProvider)
27
	}
28
29
	// cli credentials provider
30
	cliProfileProvider, err := NewCLIProfileCredentialsProviderBuilder().Build()
31
	if err == nil {
32
		providers = append(providers, cliProfileProvider)
33
	}
34
35
	// profile credentials provider
36
	profileProvider, err := NewProfileCredentialsProviderBuilder().Build()
37
	if err == nil {
38
		providers = append(providers, profileProvider)
39
	}
40
41
	// Add IMDS
42
	if os.Getenv("ALIBABA_CLOUD_ECS_METADATA") != "" {
43
		ecsRamRoleProvider, err := NewECSRAMRoleCredentialsProviderBuilder().WithRoleName(os.Getenv("ALIBABA_CLOUD_ECS_METADATA")).Build()
44
		if err == nil {
45
			providers = append(providers, ecsRamRoleProvider)
46
		}
47
	}
48
49
	// TODO: ALIBABA_CLOUD_CREDENTIALS_URI check
50
51
	return &DefaultCredentialsProvider{
52
		providerChain: providers,
53
	}
54
}
55
56
func (provider *DefaultCredentialsProvider) GetCredentials() (cc *Credentials, err error) {
57
	if provider.lastUsedProvider != nil {
58
		inner, err1 := provider.lastUsedProvider.GetCredentials()
59
		if err1 != nil {
60
			return
61
		}
62
63
		cc = &Credentials{
64
			AccessKeyId:     inner.AccessKeyId,
65
			AccessKeySecret: inner.AccessKeySecret,
66
			SecurityToken:   inner.SecurityToken,
67
			ProviderName:    fmt.Sprintf("%s/%s", provider.GetProviderName(), provider.lastUsedProvider.GetProviderName()),
68
		}
69
		return
70
	}
71
72
	errors := []string{}
73
	for _, p := range provider.providerChain {
74
		provider.lastUsedProvider = p
75
		inner, errInLoop := p.GetCredentials()
76
		if errInLoop != nil {
77
			errors = append(errors, errInLoop.Error())
78
			// 如果有错误,进入下一个获取过程
79
			continue
80
		}
81
82
		if inner != nil {
83
			cc = &Credentials{
84
				AccessKeyId:     inner.AccessKeyId,
85
				AccessKeySecret: inner.AccessKeySecret,
86
				SecurityToken:   inner.SecurityToken,
87
				ProviderName:    fmt.Sprintf("%s/%s", provider.GetProviderName(), p.GetProviderName()),
88
			}
89
			return
90
		}
91
	}
92
93
	err = fmt.Errorf("unable to get credentials from any of the providers in the chain: %s", strings.Join(errors, ", "))
94
	return
95
}
96
97
func (provider *DefaultCredentialsProvider) GetProviderName() string {
98
	return "default"
99
}
100