Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support AWS IRSA. #140

Closed
davinchia opened this issue Aug 4, 2023 · 3 comments
Closed

Support AWS IRSA. #140

davinchia opened this issue Aug 4, 2023 · 3 comments

Comments

@davinchia
Copy link
Contributor

davinchia commented Aug 4, 2023

Hi @bluedenim !

Thanks again for the great plugin. We at Airbyte love this. I'm wondering if you know whether this plugin supports IRSA.

We have several OSS community members interested in getting this working: airbytehq/airbyte-platform#263. I'm not sure if IRSA works well with this plugin now, and I would prefer to contribute back than roll our own.

We are happy to take pointers & submit a contribution.

Thanks!

@bluedenim
Copy link
Owner

I'll look into it.

@bluedenim
Copy link
Owner

I looked at the conversation you cited. The S3 access key and secret key are indeed optional. In fact, it's safer to not use them but instead use the IAM roles set up for your processes.

There was a question of whether they can be blank. Currently setting them to blank certainly will not work because the code only checks for null and not blanks. If for some reason your setup needs to set them to blank (e.g. for some backward compatibility),

if ((null != accessKey) && (null != secretKey)) {
can be amended to use instead.

@bluedenim
Copy link
Owner

Anyway. from the conversation, it looks like this is not an actual issue for your setup; I believe there was a confusion over whether the s3AwsKey and s3AwsSecret properties were required.

Let me know if this is not the case.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants