Skip to content

Commit dd62f90

Browse files
author
Krish
committed
remove proxy for imds
1 parent f0eed4e commit dd62f90

File tree

5 files changed

+0
-64
lines changed

5 files changed

+0
-64
lines changed

include/aws/auth/credentials.h

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -228,12 +228,6 @@ struct aws_credentials_provider_imds_options {
228228

229229
/* For mocking the http layer in tests, leave NULL otherwise */
230230
struct aws_auth_http_system_vtable *function_table;
231-
232-
/*
233-
* (Optional) Settings propagated down to http connection manager to choose proxy options from environment. Read
234-
* aws_http_credentials_provider.h for more information.
235-
*/
236-
const struct proxy_env_var_settings *proxy_ev_settings;
237231
};
238232

239233
/*

source/credentials_provider_default_chain.c

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,6 @@ static struct aws_credentials_provider *s_aws_credentials_provider_new_ecs_or_im
6666
struct aws_credentials_provider_imds_options imds_options = {
6767
.shutdown_options = *shutdown_options,
6868
.bootstrap = bootstrap,
69-
.proxy_ev_settings = proxy_ev_settings,
7069
};
7170
return aws_credentials_provider_new_imds(allocator, &imds_options);
7271
}

source/credentials_provider_imds.c

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,6 @@ struct aws_credentials_provider *aws_credentials_provider_new_imds(
9090
.shutdown_callback = s_on_imds_client_shutdown,
9191
.shutdown_user_data = provider,
9292
},
93-
.proxy_ev_settings = options->proxy_ev_settings,
9493
};
9594

9695
impl->client = aws_imds_client_new(allocator, &client_options);

tests/CMakeLists.txt

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,6 @@ add_test_case(credentials_provider_imds_insecure_then_secure_success)
4141
add_test_case(credentials_provider_imds_success_multi_part_role_name)
4242
add_test_case(credentials_provider_imds_success_multi_part_doc)
4343
add_test_case(credentials_provider_imds_real_new_destroy)
44-
add_net_test_case(credentials_provider_imds_proxy_routing_enabled_test)
4544

4645
if(AWS_BUILDING_ON_EC2)
4746
add_test_case(credentials_provider_imds_real_success)

tests/credentials_provider_imds_tests.c

Lines changed: 0 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@
1212
#include <aws/common/environment.h>
1313
#include <aws/common/string.h>
1414
#include <aws/common/thread.h>
15-
#include <aws/http/proxy.h>
1615
#include <aws/http/request_response.h>
1716
#include <aws/http/status_code.h>
1817
#include <aws/io/channel_bootstrap.h>
@@ -63,8 +62,6 @@ struct aws_mock_imds_tester {
6362
bool token_header_exist[IMDS_MAX_REQUESTS];
6463
bool token_header_expected[IMDS_MAX_REQUESTS];
6564
bool alternate_closed_connections;
66-
67-
struct proxy_env_var_settings *proxy_config;
6865
};
6966

7067
static struct aws_mock_imds_tester s_tester;
@@ -102,12 +99,6 @@ static struct aws_http_connection_manager *s_aws_http_connection_manager_new_moc
10299
(void)allocator;
103100
(void)options;
104101

105-
if (s_tester.proxy_config != NULL) {
106-
AWS_FATAL_ASSERT(options->proxy_ev_settings->env_var_type == s_tester.proxy_config->env_var_type);
107-
AWS_FATAL_ASSERT(options->proxy_ev_settings->connection_type == s_tester.proxy_config->connection_type);
108-
AWS_FATAL_ASSERT(options->proxy_ev_settings->tls_options == s_tester.proxy_config->tls_options);
109-
}
110-
111102
return (struct aws_http_connection_manager *)1;
112103
}
113104

@@ -1198,49 +1189,3 @@ static int s_credentials_provider_imds_real_success(struct aws_allocator *alloca
11981189
}
11991190

12001191
AWS_TEST_CASE(credentials_provider_imds_real_success, s_credentials_provider_imds_real_success);
1201-
1202-
static int s_credentials_provider_imds_proxy_routing_enabled_test(struct aws_allocator *allocator, void *ctx) {
1203-
(void)ctx;
1204-
1205-
s_aws_imds_tester_init(allocator);
1206-
1207-
struct proxy_env_var_settings proxy_config = {
1208-
.env_var_type = AWS_HPEV_ENABLE,
1209-
};
1210-
1211-
s_tester.proxy_config = &proxy_config;
1212-
1213-
struct aws_credentials_provider_imds_options options = {
1214-
.bootstrap = s_tester.bootstrap,
1215-
.function_table = &s_mock_function_table,
1216-
.shutdown_options =
1217-
{
1218-
.shutdown_callback = s_on_shutdown_complete,
1219-
.shutdown_user_data = NULL,
1220-
},
1221-
.proxy_ev_settings = &proxy_config,
1222-
};
1223-
1224-
struct aws_credentials_provider *provider = aws_credentials_provider_new_imds(allocator, &options);
1225-
1226-
aws_credentials_provider_get_credentials(provider, s_get_credentials_callback, NULL);
1227-
1228-
s_aws_wait_for_credentials_result();
1229-
1230-
ASSERT_TRUE(s_tester.credentials == NULL);
1231-
1232-
aws_credentials_provider_release(provider);
1233-
1234-
s_aws_wait_for_provider_shutdown_callback();
1235-
1236-
struct aws_credentials_provider_imds_impl *impl = provider->impl;
1237-
aws_mem_release(provider->allocator, impl->client);
1238-
aws_mem_release(provider->allocator, provider);
1239-
1240-
ASSERT_SUCCESS(s_aws_imds_tester_cleanup());
1241-
1242-
return 0;
1243-
}
1244-
AWS_TEST_CASE(
1245-
credentials_provider_imds_proxy_routing_enabled_test,
1246-
s_credentials_provider_imds_proxy_routing_enabled_test);

0 commit comments

Comments
 (0)