Skip to content

feat: idempotent fetch #1289

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Feb 8, 2025
Merged

feat: idempotent fetch #1289

merged 5 commits into from
Feb 8, 2025

Conversation

lehmanmj
Copy link
Member

@lehmanmj lehmanmj commented Feb 7, 2025

Issue #, if available:
#1288

Description of changes:
Adds a new config option, use-existing-credentials. When set, the action will attempt to re-use existing credentials instead of fetching new credentials. If there are no existing credentials (or if the existing credentials are no longer valid), the action will proceed as normal.


By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@lehmanmj lehmanmj linked an issue Feb 7, 2025 that may be closed by this pull request
2 tasks
@lehmanmj lehmanmj changed the title feat:1288 idempotent fetch feat: 1288 idempotent fetch Feb 7, 2025
@lehmanmj lehmanmj changed the title feat: 1288 idempotent fetch feat: idempotent fetch Feb 7, 2025

mockedSTSClient.on(AssumeRoleWithWebIdentityCommand).resolvesOnce(mocks.outputs.STS_CREDENTIALS);
await run();
expect(core.info).toHaveBeenLastCalledWith('Pre-existing credentials are valid. No need to generate new ones.')
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We shouldn't expect on log messages if we can help it.

@kellertk kellertk marked this pull request as ready for review February 8, 2025 00:08
Copy link
Contributor

@alikulka alikulka left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed. Looks good to me!

@aws-sdk-osds aws-sdk-osds merged commit eb70354 into main Feb 8, 2025
9 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Provide a way to idempotently fetch credentials
4 participants