Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pass AWS client config when creating STSAssumeRoleCredentialsProvider. #4616

Merged
merged 1 commit into from
Jan 12, 2024

Conversation

KiterLuc
Copy link
Contributor

@KiterLuc KiterLuc commented Jan 11, 2024

This fixes an issue with assume role where the client configuration was not getting passed to the STSAssumeRoleCredentialsProvider, which resulted in options like the CA path not being honored when the AWS SDK was making HTTP requests for assume role.


TYPE: BUG
DESC: Fix HTTP requests for AWS assume role not honoring config options.

@KiterLuc
Copy link
Contributor Author

Getting a PR ready so that we can get a build faster if we confirm the fix.

@KiterLuc KiterLuc changed the title [WIP] Pass AWS client config when creating STSAssumeRoleCredentialsProvider. Pass AWS client config when creating STSAssumeRoleCredentialsProvider. Jan 11, 2024
Copy link
Member

@teo-tsirpanis teo-tsirpanis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The fix is validated.

Copy link
Member

@ihnorton ihnorton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Confirmed on release-2.18 with azp builds.

@KiterLuc KiterLuc merged commit 6b29117 into dev Jan 12, 2024
65 checks passed
@KiterLuc KiterLuc deleted the teo/assume-role-config branch January 12, 2024 08:01
github-actions bot pushed a commit that referenced this pull request Jan 12, 2024
…r`. (#4616)

This fixes an issue with assume role where the client configuration was
not getting passed to the `STSAssumeRoleCredentialsProvider`, which
resulted in options like the CA path not being honored when the AWS SDK
was making HTTP requests for assume role.

---
TYPE: BUG
DESC: Fix HTTP requests for AWS assume role not honoring config options.

Co-authored-by: Theodore Tsirpanis <theodore.tsirpanis@tiledb.com>
(cherry picked from commit 6b29117)
KiterLuc added a commit that referenced this pull request Jan 12, 2024
…meRoleCredentialsProvider`. (#4619)

Backport 6b29117 from #4616.

Co-authored-by: KiterLuc <67824247+KiterLuc@users.noreply.github.com>
github-actions bot pushed a commit that referenced this pull request Jan 12, 2024
…r`. (#4616)

This fixes an issue with assume role where the client configuration was
not getting passed to the `STSAssumeRoleCredentialsProvider`, which
resulted in options like the CA path not being honored when the AWS SDK
was making HTTP requests for assume role.

---
TYPE: BUG
DESC: Fix HTTP requests for AWS assume role not honoring config options.

Co-authored-by: Theodore Tsirpanis <theodore.tsirpanis@tiledb.com>
(cherry picked from commit 6b29117)
KiterLuc pushed a commit that referenced this pull request Jan 17, 2024
…sProvider`. (#4641)

This PR applies a similar fix to #4616 but for
`STSProfileWithWebIdentityCredentialsProvider`. That class was also
adjusted to prevent a memory leak, to use the user-provided `STSClient`
if available, and to use public APIs.

The issue has been validated to be fixed.

---
TYPE: BUG
DESC: Fix HTTP requests for AWS assume role with web identity not
honoring config options.
KiterLuc added a commit that referenced this pull request Jan 17, 2024
…meRoleCredentialsProvider`. (#4622)

Backport 6b29117 from #4616.

Co-authored-by: KiterLuc <67824247+KiterLuc@users.noreply.github.com>
github-actions bot pushed a commit that referenced this pull request Jan 17, 2024
…sProvider`. (#4641)

This PR applies a similar fix to #4616 but for
`STSProfileWithWebIdentityCredentialsProvider`. That class was also
adjusted to prevent a memory leak, to use the user-provided `STSClient`
if available, and to use public APIs.

The issue has been validated to be fixed.

---
TYPE: BUG
DESC: Fix HTTP requests for AWS assume role with web identity not
honoring config options.

(cherry picked from commit 4498063)
github-actions bot pushed a commit that referenced this pull request Jan 17, 2024
…sProvider`. (#4641)

This PR applies a similar fix to #4616 but for
`STSProfileWithWebIdentityCredentialsProvider`. That class was also
adjusted to prevent a memory leak, to use the user-provided `STSClient`
if available, and to use public APIs.

The issue has been validated to be fixed.

---
TYPE: BUG
DESC: Fix HTTP requests for AWS assume role with web identity not
honoring config options.

(cherry picked from commit 4498063)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants