Skip to content

support for role based S3 authentication options for both EC2 VMs and in EKS pods #811

@zoltan

Description

@zoltan

currently one must supply the AWS credentials, however, in systems running on AWS, those are actually not readily available as environment variables, because the EC2 VM or EKS pod uses IAM roles to get permissions.

the AWS SDK handles this, however, the current KvikIO code does not.

a workaround for EKS pods is to use:

TOKEN=$(cat $AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE)
export CREDS=$(curl $AWS_CONTAINER_CREDENTIALS_FULL_URI --header "Authorization: $TOKEN")
ACCESS_KEY_ID=$(echo $CREDS | jq -r '.AccessKeyId')
SECRET_ACCESS_KEY=$(echo $CREDS | jq -r '.SecretAccessKey')
SESSION_TOKEN=$(echo $CREDS | jq -r '.Token')

(original is at hashicorp/terraform-provider-aws#41473)

but would be great if this could be natively supported, along with EC2 IAM role based authorization.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions