emr-user-role-mapper-application/src/main/java/com/amazon/aws/emr/api/MetadataController.java [78:94]:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                .map(request -> metadataCredentialsProvider.getUserCredentials(request))
                .map(credentials -> {
                    log.debug("Done with request {}", assumeRoleRequest);
                    return GSON.toJson(credentials.get());
                })
                .orElse(null);
    }

    /**
     * Get credentials for an impersonated user, if allowed
     * Empty credentials are returned if the calling user has no mapping defined, or is unauthorized to assume the role.
     *
     * @param httpServletRequest the HTTP Request object
     * @param username           the name of impersonated user
     * @return credentials obtained by serializing {@link EC2MetadataUtils.IAMSecurityCredential}
     */
    @GET
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



emr-user-role-mapper-application/src/main/java/com/amazon/aws/emr/api/MetadataController.java [101:116]:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                .map(request -> metadataCredentialsProvider.getUserCredentials(request))
                .map(credentials -> {
                    log.debug("Done with request {}", assumeRoleRequest);
                    return GSON.toJson(credentials.get());
                })
                .orElse(null);
    }

    /**
     * Returns the role that the user can assume.
     * This is the call that SDK makes to determine the role to assume.
     *
     * @param httpServletRequest the HTTP Request object
     * @return the role name that the caller could assume
     */
    @GET
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



