Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Enhancement] S3 Client AWS Credentials Provider #2026

Open
CtrlAltDft opened this issue Sep 17, 2024 · 0 comments
Open

[Enhancement] S3 Client AWS Credentials Provider #2026

CtrlAltDft opened this issue Sep 17, 2024 · 0 comments
Assignees
Labels
enhancement New feature or request

Comments

@CtrlAltDft
Copy link
Contributor

Who is this for and what problem do they have today?

This issue affects users of AutoMQ, particularly those running the application in containerised environments such as AWS EKS. Currently, the codebase is hardcoded to use StaticCredentialsProvider and InstanceProfileCredentialsProvider (Code Ref). This setup poses challenges when running AutoMQ in environments like EKS, where the use of IAM Roles for Service Accounts (IRSA) or Pod Identity is the recommended approach for managing AWS credentials.

In such environments, relying on hardcoded credential providers limits flexibility and prevents the application from automatically using the credentials chain as defined by AWS. This makes it difficult for the application to seamlessly acquire credentials, impacting deployments on modern container platforms.

Why is solving this problem impactful?

Switching to the DefaultCredentialsProvider will allow AutoMQ to benefit from AWS’s full credentials provider chain, which automatically handles multiple scenarios, including:

  • Static credentials for local development.
  • Instance profile credentials when running on EC2 instances.
  • EKS IRSA for securely assigning roles to containers in an EKS cluster.

Additional notes

  • Reference AWS documentation: AWS SDK for Java - Credentials Provider Chain.
  • Proposed solution: Replace the current hardcoded usage of StaticCredentialsProvider and InstanceProfileCredentialsProvider with DefaultCredentialsProvider, which includes both these options and more. This change will enable support for EKS IRSA and other containerized environments out of the box.
@CtrlAltDft CtrlAltDft added the enhancement New feature or request label Sep 17, 2024
@SCNieh SCNieh self-assigned this Sep 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants