Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Credentials Extraction #13

Open
DenisaCG opened this issue Jan 9, 2024 · 2 comments
Open

Credentials Extraction #13

DenisaCG opened this issue Jan 9, 2024 · 2 comments
Assignees

Comments

@DenisaCG
Copy link
Member

DenisaCG commented Jan 9, 2024

The current version of jupyter-drives supports credentials extraction through the config file jupyter_notebook_config.py, where the user can set an access key and secret key to access their S3 buckets. It would look like this:

c.DrivesConfig.acess_key_id = '<YOUR_ACCESS_KEY>'
c.DrivesConfig.secret_access_key = '<YOUR_SECRET_ACCESS_KEY>'

Another option would be to use environment variables for the credentials extraction. This option may seem to be easier for the user, as they can just open jupyterlab with jupyter-drives extension installed and the backend should automatically detect and extract the credentials from their current environment.

For example, the jupyterlab-pullrequests extensions is using the config file for users to set their credentials, similar to the current behavior of this extension, while jupyterlab-git seems to be extracting them directly from the environment.

Both cases require the users' responsibility in specifying their credentials, whether in a config file or in their environment, and don't require storing those credentials from our side.

Any thoughts on how we should proceed, so that we follow the industry norm for the credentials extraction in a way that is secure enough to use S3 buckets, or cloud services in general?

@SylvainCorlay @afshin @trungleduc

@DenisaCG DenisaCG self-assigned this Jan 9, 2024
@trungleduc
Copy link
Member

Generally, AWS users log in by using the aws CLI tool. The credentials will be stored at ~/.aws/credentials, we can support reading this file to get the secrets and maybe allow users to specify the location to read the credentials file.

@DenisaCG
Copy link
Member Author

Thanks for the suggestion @trungleduc! I think your idea makes the experience more seamless for users.

This PR #14 adds direct credentials extraction for AWS CLI users, as well as letting users specify the file path of their credentials.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants