Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Hi! This PR includes several additional template functions in order to support several types of AWS authentication:
awsEnvCredentials
: supports passing credentials through environment variables, such asAWS_ACCESS_KEY_ID
,AWS_ACCESS_KEY
,AWS_SECRET_ACCESS_KEY
andAWS_SECRET_KEY
;awsProfileCredentials
: supports getting credentials from a credentials file, also used by boto/awscli;awsEC2RoleCredentials
: supports getting role-based credentials, i.e. getting the automatically generated credentials in EC2 instances;awsChainCredentials
: tries to get credentials from each of the three methods above in order, using the first one returned.They all output strings in the Redshift credentials format (
CREDENTIALS 'aws_access_key_id=%s;aws_secret_access_key=%s'
).All these methods were implemented using directly the official Go SDK, and it's very easy to extend them in the future to support different providers (say, using Hashicorp's Vault).