This repository was archived by the owner on Mar 13, 2020. It is now read-only.
[SP-333] Assume Role Support #74
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
SP-333
Changes
CONNECTION_DATA_ROLE_KEYconstantCONNECTION_DATA_FUNCTION_KEYconstantCONNECTION_DATA_TENANT_KEYconstantAWS_SERVICE_LAMBDAconstantAWS_SERVICE_S3constantstsclient toAWSLambdaDataSource__assume_role(...)method__get_aws_client(...)method__refresh_aws_clients_if_expired(...)methodNotes
Assume Role
The following clients will now be instantiated with AWS credentials:
If the clients are nearing their expiration date (~5 minutes), we will re-assume the role for a fresh set of credentials and update the clients accordingly.
AWS Lambda Connection String
Now expects
role=arn:aws:iam:{accountId}:role/{roleName}