Skip to content

Commit ff1f86d

Browse files
authored
Merge pull request #2820 from trycompai/fix/govcloud-session-token-ignore
fix(cloud-security): ignore unused GovCloud session token
2 parents 0bbc73b + ea31178 commit ff1f86d

3 files changed

Lines changed: 3 additions & 4 deletions

File tree

apps/api/.env.example

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,4 +58,5 @@ SECURITY_HUB_ROLE_ASSUMER_ARN=
5858
SECURITY_HUB_GOVCLOUD_ROLE_ASSUMER_ARN=
5959
SECURITY_HUB_GOVCLOUD_ACCESS_KEY_ID=
6060
SECURITY_HUB_GOVCLOUD_SECRET_ACCESS_KEY=
61-
SECURITY_HUB_GOVCLOUD_SESSION_TOKEN=
61+
# Optional: only set when using temporary GovCloud credentials. Leave unset for long-lived IAM user keys.
62+
# SECURITY_HUB_GOVCLOUD_SESSION_TOKEN=

apps/api/src/cloud-security/aws-partition.utils.spec.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,12 +57,11 @@ describe('aws partition utils', () => {
5757
it('uses explicit GovCloud base credentials when configured', () => {
5858
process.env.SECURITY_HUB_GOVCLOUD_ACCESS_KEY_ID = 'AKIAGOV';
5959
process.env.SECURITY_HUB_GOVCLOUD_SECRET_ACCESS_KEY = 'secret';
60-
process.env.SECURITY_HUB_GOVCLOUD_SESSION_TOKEN = 'token';
60+
process.env.SECURITY_HUB_GOVCLOUD_SESSION_TOKEN = 'placeholder';
6161

6262
expect(getAwsBaseCredentials('aws-us-gov')).toEqual({
6363
accessKeyId: 'AKIAGOV',
6464
secretAccessKey: 'secret',
65-
sessionToken: 'token',
6665
});
6766
expect(getAwsBaseCredentials('aws')).toBeUndefined();
6867

apps/api/src/cloud-security/aws-partition.utils.ts

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,6 @@ export function getAwsBaseCredentials(
4141
return {
4242
accessKeyId,
4343
secretAccessKey,
44-
sessionToken: process.env.SECURITY_HUB_GOVCLOUD_SESSION_TOKEN,
4544
};
4645
}
4746

0 commit comments

Comments
 (0)