8000 feat(auth): add IAM credentials LSP requests to AuthUtils and auth2 by liramon1 · Pull Request #7507 · aws/aws-toolkit-vscode · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

feat(auth): add IAM credentials LSP requests to AuthUtils and auth2 #7507

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 21 commits into
base: feature/flare-mega
Choose a base branch
from

Conversation

liramon1
Copy link

WORK IN PROGRESS, DO NOT MERGE

Problem

The authentication flow does not make requests to IAM credentials endpoints on Flare.

Solution

  • Add IAM credentials options to LanguageClientAuth requests
  • Add IAM credentials option and form to webview
  • Modify AuthUtils to switch between SsoLogin and IamLogin strategies
  • Begin modifying clients to support IAM credentials

  • Treat all work as PUBLIC. Private feature/x branches will not be squash-merged at release time.
  • Your code changes must meet the guidelines in CONTRIBUTING.md.
  • License: I confirm that my contribution is made under the terms of the Apache 2.0 license.

Copy link
  • This pull request implements a feat or fix, so it must include a changelog entry (unless the fix is for an unreleased feature). Review the changelog guidelines.
    • Note: beta or "experiment" features that have active users should announce fixes in the changelog.
    • If this is not a feature or fix, use an appropriate type from the title guidelines. For example, telemetry-only changes should use the telemetry type.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants
0