-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use official aws sdk #1600
Comments
If it's possible to avoid specifying the region and and iam_role then we should update the auth plugin accordingly to allow that. Adding a dependency on the AWS Go SDK would be problematic due to versioning conflicts so that's unlikely to happen. EDIT: @patrick-east can you take a look this? |
It seems like we should be able to update our minimal client code to use the same technique to call the ec2 metadata service without a role or needing the region. +1 on the aws sdk being problematic from a dependency/versioning point of view. Looking at the the library it isn't too bad, only has one additional dependency vendored in which has no additional ones. My main concern is that it starts a slippery slope of us adding in gcp, azure, k8s, openstack, etc etc clients which we probably don't want since as an embedded library it is very likely the application we are being embedded in will also have at least one of those.. then we run into versioning problems. If all we need is to add in support for this functionality IMO we can avoid it.. if it turns out that this is a huge can of worms and we have other bugs/missing features/etc then maybe we re-evaluate? |
The original ask for not requiring aws_region might be complete in the latest version of OPA. We need to review the implementation and double check. If that's the case, let's close this issue because whether we use the official AWS SDK is an implementation detail. |
Closing this issue as the AWS signature authentication client in the latest OPA version does not require |
Expected Behavior
I have OPA running inside Amazon EKS with attached iam role for accessing a bundle in S3.
By using AWS native SDK you can access S3 without specifying aws_region or iam_role in opa configuration.
The logic implemented in the sdk (AWS ec2_role_provider.go) solves this issue and maybe other issues that may occur because it is re-implemented in this repo (opa aws.go)
Actual Behavior
AWS SDK was implemented here without crucial logic available in the official SDK
Additional Info
AWS SDK for Go
The text was updated successfully, but these errors were encountered: