-
Notifications
You must be signed in to change notification settings - Fork 1.8k
feat(aws_s3 source): separate s3 and sqs auth #23079
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Had this same use case come up and found this PR, so cherry-picked it - thanks 👍🏻 fwiw I do think that having |
on precedence:
The opposite of that, "assume a role for the S3 step, not the SQS step" would, I guess need an more concretely, Both the SQS & S3 calls assume the role
Only the SQS call assumes the role , the S3 call uses the default system credentials:
Only the S3 call assumes the role , the SQS call uses the default system credentials:
there's one use case that I can't think of a sensible way to articulate and that's AssumeRole chaining , "first assume role X, then as role X, assume role Y to do the other step" so probably just ... don't do that ? or launch vector as the role you want it to be in the first place |
took the suggestions, now SQS's auth section set to a string literal falls back to the system / AWS SDK strategy and there's no |
@@ -203,6 +203,8 @@ pub enum AwsAuthentication { | |||
#[configurable(metadata(docs::examples = "us-west-2"))] | |||
region: Option<String>, | |||
}, | |||
/// Explicitly default authentication, using the default credentials chain defined by the AWS SDK | |||
Fallback(String), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is the string used anywhere? Seems like we can just use Default
.
added `sqs.auth` option to specify AWS auth configuration for S3 when different than SQS, and added | ||
a string literal for fallback to default |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Rename file
Summary
add an
s3_auth
config option, using different credentials for polling SQS and fetching files from S3Change Type
Is this a breaking change?
How did you test this PR?
a different role authorized to poll SQS and S3
Does this PR include user facing changes?
Notes
@vectordotdev/vector
to reach out to us regarding this PR.pre-push
hook, please see this template.cargo fmt --all
cargo clippy --workspace --all-targets -- -D warnings
cargo nextest run --workspace
(alternatively, you can runcargo test --all
)./scripts/check_changelog_fragments.sh
git merge origin master
andgit push
.Cargo.lock
), pleaserun
cargo vdev build licenses
to regenerate the license inventory and commit the changes (if any). More details here.References