You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Steps to reproduce:
List the minimal actions needed to reproduce the behaviour.
Log in to AWS by cli: aws sso login
Run influxdb3 with an s3 bucket
Expected behaviour:
Describe what you expected to happen.
influxdb3 should integrate with the AWS SDK for authentication and authenticate based on the previous AWS login, without needing to export the standard AWS environmental variables of AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.
Actual behaviour:
Describe What actually happened.
Service fails with authentication issues
Additional Information:
The desired behaviour is seen in the aws cli client itself and also, for example, terraform. Neither require the environment variables to be exported in order to utilise the existing AWS session. This also means that authentication is not limited to the scope of a single bash session, an aws login in one terminal results in (for example) terraform being able to access AWS from other terminals too.
This is the same behaviour I observed with datafusion-cli, as suggested by @alamb, suggesting that there is a common root cause here, presumably in object_store, as influxdb3 uses object_store's AmazonS3Builder interface to establish connectivity S3.
The text was updated successfully, but these errors were encountered:
I believe I have established that the authentication process that is working in this scenario is either "Assume role" or "Assume role with web identity" here https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-authentication.html and under the hood ~/.aws/cli/cache/xxxxx.json is being used. This is a newer file than the previously used ~/.aws/credentials and there are a number of issues I see in the past relating to this on Terraform where support was officially added in the go api. aws/aws-sdk-go#3755 Naturally this is go, not rust, but potentially points towards equivalent functionality hopefully already present in the rust SDK.
Steps to reproduce:
List the minimal actions needed to reproduce the behaviour.
aws sso login
Expected behaviour:
Describe what you expected to happen.
influxdb3 should integrate with the AWS SDK for authentication and authenticate based on the previous AWS login, without needing to export the standard AWS environmental variables of AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.
Actual behaviour:
Describe What actually happened.
Service fails with authentication issues
Additional Information:
The desired behaviour is seen in the aws cli client itself and also, for example, terraform. Neither require the environment variables to be exported in order to utilise the existing AWS session. This also means that authentication is not limited to the scope of a single bash session, an aws login in one terminal results in (for example) terraform being able to access AWS from other terminals too.
This is the same behaviour I observed with datafusion-cli, as suggested by @alamb, suggesting that there is a common root cause here, presumably in object_store, as influxdb3 uses object_store's AmazonS3Builder interface to establish connectivity S3.
The text was updated successfully, but these errors were encountered: