Skip to content

Commit

Permalink
SNOW-1825790 Separate secure storage managers based on file and keyring
Browse files Browse the repository at this point in the history
  • Loading branch information
sfc-gh-pfus committed Jan 30, 2025
1 parent e5ae90f commit 205f50d
Show file tree
Hide file tree
Showing 3 changed files with 264 additions and 272 deletions.
12 changes: 6 additions & 6 deletions auth.go
Original file line number Diff line number Diff line change
Expand Up @@ -365,10 +365,10 @@ func authenticate(
logger.WithContext(ctx).Errorln("Authentication FAILED")
sc.rest.TokenAccessor.SetTokens("", "", -1)
if sessionParameters[clientRequestMfaToken] == true {
deleteCredential(sc, mfaToken)
credentialsStorage.deleteCredential(sc, mfaToken)
}
if sessionParameters[clientStoreTemporaryCredential] == true {
deleteCredential(sc, idToken)
credentialsStorage.deleteCredential(sc, idToken)
}
code, err := strconv.Atoi(respd.Code)
if err != nil {
Expand All @@ -384,11 +384,11 @@ func authenticate(
sc.rest.TokenAccessor.SetTokens(respd.Data.Token, respd.Data.MasterToken, respd.Data.SessionID)
if sessionParameters[clientRequestMfaToken] == true {
token := respd.Data.MfaToken
setCredential(sc, mfaToken, token)
credentialsStorage.setCredential(sc, mfaToken, token)
}
if sessionParameters[clientStoreTemporaryCredential] == true {
token := respd.Data.IDToken
setCredential(sc, idToken, token)
credentialsStorage.setCredential(sc, idToken, token)
}
return &respd.Data, nil
}
Expand Down Expand Up @@ -575,9 +575,9 @@ func authenticateWithConfig(sc *snowflakeConn) error {
}

func fillCachedIDToken(sc *snowflakeConn) {
getCredential(sc, idToken)
credentialsStorage.getCredential(sc, idToken)
}

func fillCachedMfaToken(sc *snowflakeConn) {
getCredential(sc, mfaToken)
credentialsStorage.getCredential(sc, mfaToken)
}
Loading

0 comments on commit 205f50d

Please sign in to comment.