Skip to content
This repository was archived by the owner on Mar 13, 2020. It is now read-only.

Conversation

@waltaro
Copy link
Collaborator

@waltaro waltaro commented Sep 30, 2019

SP-333

Changes

  • Add CONNECTION_DATA_ROLE_KEY constant
  • Add CONNECTION_DATA_FUNCTION_KEY constant
  • Add CONNECTION_DATA_TENANT_KEY constant
  • Add AWS_SERVICE_LAMBDA constant
  • Add AWS_SERVICE_S3 constant
  • Add sts client to AWSLambdaDataSource
  • Add __assume_role(...) method
    • Returns credentials from response
  • Add __get_aws_client(...) method
  • Add __refresh_aws_clients_if_expired(...) method
  • Reformat code

Notes

Assume Role

The following clients will now be instantiated with AWS credentials:

  • Lambda
  • S3

If the clients are nearing their expiration date (~5 minutes), we will re-assume the role for a fresh set of credentials and update the clients accordingly.

AWS Lambda Connection String

Now expects role=arn:aws:iam:{accountId}:role/{roleName}

@waltaro waltaro merged commit dc8205f into master Sep 30, 2019
@waltaro waltaro deleted the feature/SP-333_assume-role-support branch September 30, 2019 04:39
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants