-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Source file: AWS Assumed role credentials doesn't work with source-file connector #8227
Comments
Hi @JD-V our source file connector nor S3 connector supports STS sessions. I'm not sure offering the user to fill a |
This is closely related to the following issue: #5942 |
While I agree with your point @alafanechere, there are users like me who just wants to use airbyte for one time replication. My organisation refrains me from using IAM credentials, hence the only option left to me is to assume a role and use that creds to run Airbyte. If you are worried about temporary sessions breaking the source, how about just adding this feature in backend/image so that atleast apis can support it? |
@JD-V do you feel comfortable enough contributing to this feature? I'm pinging @sherifnada and @misteryeo to give you definitive feedback on this feature addition, but whatever their answer you'll still be able to use your contribution as a custom connector. |
Yes I’d like to contribute to this. Let me know how your conversation goes.
Meanwhile I’ll start looking at the code base.
…On Thu, 30 Dec 2021 at 11:43 PM, Augustin ***@***.***> wrote:
@JD-V <https://github.com/JD-V> do you feel comfortable enough
contributing to this feature? I'm pinging @sherifnada
<https://github.com/sherifnada> and @misteryeo
<https://github.com/misteryeo> to give you definitive feedback on this
feature addition, but whatever their answer you'll still be able to use
your contribution as a custom connector.
—
Reply to this email directly, view it on GitHub
<#8227 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABRIOQSIGLRCS3OSN5ZYKX3UTSOLVANCNFSM5IV5N45Q>
.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub>.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
@JD-V Sorry for the delay here. As yet, we haven't heard from others who have the same use case as you for a one time replication. This is just a thought experiment but I'm curious if you'd be okay with making this change just for your version of the connector and not being merged which the official connector at this time until we see more requests for this particular use case come up. Would that be feasible? We'll keep this issue open to collect feedback from other users in the meantime. |
I'm trying to test this locally on docker and the existing AWS setup requires the STS option. It is OK for the credentials to be temporary when evaluating airbyte, and the boto default fallback using standard AWS env-vars and instance-profile would also be fine and is standard across industry tools. Is there a method to pass credentials down through envvars when running through docker? I tried adding them to the docker-compose.yaml file in the worker section, and it wasn't enough. |
Enviroment
Current Behavior
When I try to use standalone image of source-file to create source connection, it accepts access key and secret key of a user to and creates AWS session. If I have a IAM user in aws this flow works fine but If I have generated access/secret by Assume role service with STS I will have to pass
aws_session_token
along withaws_access_key_id
andaws_secret_access_key
while creating boto3 sesion. But since _setup_boto_session( ) does not addaws_session_token
, at session creation, it fails.Expected Behavior
*_setup_boto_session() should add aws_session_token optionally while creating session in order for assumed role credentials to work *
Steps to Reproduce
Are you willing to submit a PR?
Yes
The text was updated successfully, but these errors were encountered: