@@ -306,12 +306,9 @@ pub(crate) enum TableStoreBackend {
306306 bucket : String ,
307307 region : String ,
308308 prefix : String ,
309- <<<<<<< HEAD
310- =======
311309 /// When both `access_key_id` and `secret_access_key` are omitted, the
312310 /// AWS credential chain is used: IRSA web-identity token → ECS task
313311 /// creds → EC2 instance profile.
314- >>>>>>> 3e11546 ( remove IRSA backend, allow optional access_key, secret in S3Compatible backend for IRSA )
315312 access_key_id : Option < String > ,
316313 secret_access_key : Option < String > ,
317314 endpoint : Option < String > ,
@@ -325,7 +322,6 @@ pub(crate) enum TableStoreBackend {
325322 #[ serde( default ) ]
326323 virtual_hosted_style_request : bool ,
327324 } ,
328- <<<<<<< HEAD
329325}
330326
331327impl TableStoreBackend {
@@ -343,8 +339,6 @@ impl TableStoreBackend {
343339 Self :: LocalFilesystem { .. } => None ,
344340 }
345341 }
346- =======
347- >>>>>>> 3e11546 ( remove IRSA backend, allow optional access_key, secret in S3Compatible backend for IRSA )
348342}
349343
350344#[ derive( Debug , Clone , Deserialize ) ]
@@ -620,8 +614,6 @@ backend = "s3_compatible"
620614bucket = "bucket"
621615region = "us-east-1"
622616prefix = "tables"
623- access_key_id = "access"
624- secret_access_key = "secret"
625617{extra_table_store}
626618
627619[job_scheduler]
@@ -673,56 +665,15 @@ bind_addr = "127.0.0.1:8080"
673665 config. validate ( ) . expect ( "config should validate" ) ;
674666 }
675667
676- <<<<<<< HEAD
677668 #[ test]
678669 fn s3_timeout_defaults_are_applied ( ) {
679- =======
680- fn sample_s3_config_toml ( circuit_path : & Path , credential_lines : & str ) -> String {
681- format ! (
682- r#"
683- [logging]
684- filter = "debug"
685-
686- [circuit]
687- path = "{}"
688-
689- [network]
690- signing_key_hex = "1111111111111111111111111111111111111111111111111111111111111111"
691- bind_addr = "127.0.0.1:7000"
692-
693- [[network.peers]]
694- peer_id_hex = "2222222222222222222222222222222222222222222222222222222222222222"
695- addr = "127.0.0.1:7001"
696-
697- [storage]
698-
699- [table_store]
700- backend = "s3_compatible"
701- bucket = "bucket"
702- region = "us-east-1"
703- prefix = "prefix"
704- {}
705-
706- [job_scheduler]
707-
708- [sm_executor]
709-
710- [rpc]
711- bind_addr = "127.0.0.1:8080"
712- "# ,
713- circuit_path. display( ) ,
714- credential_lines
715- )
716- }
717-
718- #[ test]
719- fn validate_accepts_s3_default_credential_chain( ) {
720- >>>>>>> 6 d1277f ( config: reject invalid s3 session token configs)
721670 let path = std:: env:: current_exe ( ) . expect ( "current executable path" ) ;
722- let config: MosaicConfig =
723- toml:: from_str ( & sample_s3_config_toml( & path, "" ) ) . expect( "config should parse" ) ;
671+ let config: MosaicConfig = toml:: from_str ( & sample_s3_config_toml (
672+ & path,
673+ "request_timeout_secs = 7200\n connect_timeout_secs = 5" ,
674+ ) )
675+ . expect ( "config should parse" ) ;
724676
725- <<<<<<< HEAD
726677 let options = config
727678 . table_store
728679 . backend
@@ -769,7 +720,18 @@ bind_addr = "127.0.0.1:8080"
769720 assert_eq ! (
770721 options. get_config_value( & ClientConfigKey :: ConnectTimeout ) ,
771722 expected. get_config_value( & ClientConfigKey :: ConnectTimeout )
772- =======
723+ ) ;
724+ }
725+
726+ #[ test]
727+ fn validate_accepts_s3_default_credential_chain ( ) {
728+ let path = std:: env:: current_exe ( ) . expect ( "current executable path" ) ;
729+ let config: MosaicConfig = toml:: from_str ( & sample_s3_config_toml (
730+ & path,
731+ "request_timeout_secs = 7200\n connect_timeout_secs = 5" ,
732+ ) )
733+ . expect ( "config should parse" ) ;
734+
773735 config. validate ( ) . expect ( "config should validate" ) ;
774736 }
775737
@@ -806,7 +768,6 @@ session_token = "token"
806768 . to_string( )
807769 . contains( "table_store.session_token requires table_store.access_key_id" ) ,
808770 "unexpected error: {error}"
809- >>>>>>> 6 d1277f ( config: reject invalid s3 session token configs)
810771 ) ;
811772 }
812773}
0 commit comments