You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This should be a conditional addition, or update to the AWS config used to create component sessions to fully support this auth profile on the other native aws components.
Release Note
RELEASE NOTE:
The text was updated successfully, but these errors were encountered:
This issue has been automatically marked as stale because it has not had activity in the last 30 days. It will be closed in the next 7 days unless it is tagged (pinned, good first issue, help wanted or triaged/resolved) or other activity occurs. Thank you for your contributions.
This issue has been automatically closed because it has not had activity in the last 37 days. If this issue is still valid, please ping a maintainer and ask them to label it as pinned, good first issue, help wanted or triaged/resolved. Thank you for your contributions.
Describe the feature
Currently, only kafka and postgres components fully support the Assume IAM Role auth profile for AWS: https://github.com/dapr/components-contrib/blob/main/.build-tools/builtin-authentication-profiles.yaml#L30
This is due to additional logic here:
components-contrib/common/authentication/aws/x509.go
Line 341 in 6200ea8
components-contrib/common/authentication/aws/static.go
Line 290 in 6200ea8
components-contrib/common/authentication/aws/client.go
Line 311 in 6200ea8
This should be a conditional addition, or update to the AWS config used to create component sessions to fully support this auth profile on the other native aws components.
Release Note
RELEASE NOTE:
The text was updated successfully, but these errors were encountered: