Skip to content

AssumeRole with AWS EC2 credentials #875

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: antalya
Choose a base branch
from
Open

Conversation

zvonand
Copy link
Collaborator

@zvonand zvonand commented Jul 2, 2025

Successor to #688

If extra_credentials(role_arn=...) is provided, temporary credentials are requested from AWS STS and used to access S3.

It is now possible to use EC2 metadata to perform AssumeRole. So, no need to explicitly specify AWS credentials

Changelog category (leave one):

  • New Feature

Changelog entry (a user-readable short description of the changes that goes to CHANGELOG.md):

Added AWS IAM role assumption in s3 table function using AWS EC2 credentials.

Documentation entry for user-facing changes

...

Exclude tests:

  • Fast test
  • Integration Tests
  • Stateless tests
  • Stateful tests
  • Performance tests
  • All with ASAN
  • All with TSAN
  • All with MSAN
  • All with UBSAN
  • All with Coverage
  • All with Aarch64
  • All Regression
  • Disable CI Cache

@zvonand zvonand marked this pull request as ready for review July 3, 2025 17:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant