Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: remove custom credentials chain to use default #2485

Merged
merged 6 commits into from
Sep 27, 2022

Conversation

koladilip
Copy link
Contributor

@koladilip koladilip commented Sep 27, 2022

Description

OSS user reported that custom credentials chain is causing issues so removing to use default chain provided by SDK.

I have mistakenly configured AWS creds chain thinking about requirements from Kubernetes stand point and missed other types deployment like ECS so it is causing failures in ECS tasks when users want to task role instead of access keys from destination config. When no chain is mentioned default chain is taking care of this use case without any issues.

Notion Ticket

https://www.notion.so/rudderstacks/AWS-FTR-fix-OSS-issues-d64b93d9ed1d4c00a8d7e5573f7992c3

Security

  • The code changed/added as part of this pull request won't create any security issues with how the software is being used.

@codecov
Copy link

codecov bot commented Sep 27, 2022

Codecov Report

Base: 40.55% // Head: 40.60% // Increases project coverage by +0.04% 🎉

Coverage data is based on head (4a8487d) compared to base (33ba5ef).
Patch coverage: 100.00% of modified lines in pull request are covered.

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #2485      +/-   ##
==========================================
+ Coverage   40.55%   40.60%   +0.04%     
==========================================
  Files         174      174              
  Lines       36259    36252       -7     
==========================================
+ Hits        14706    14720      +14     
+ Misses      20635    20615      -20     
+ Partials      918      917       -1     
Impacted Files Coverage Δ
utils/awsutils/session.go 87.32% <100.00%> (+6.55%) ⬆️
config/backend-config/namespace_config.go 77.37% <0.00%> (-2.19%) ⬇️
config/backend-config/backend-config.go 67.46% <0.00%> (-0.61%) ⬇️
processor/processor.go 72.09% <0.00%> (+0.82%) ⬆️
enterprise/suppress-user/suppressUser.go 82.71% <0.00%> (+1.85%) ⬆️

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report at Codecov.
📢 Do you have feedback about the report comment? Let us know in this issue.

@koladilip koladilip self-assigned this Sep 27, 2022
@@ -46,6 +44,9 @@ func createDefaultSession(config *SessionConfig) (*session.Session, error) {
}

func createCredentailsForRole(config *SessionConfig) (*credentials.Credentials, error) {
if config.ExternalID == "" {
return nil, errors.New("externalID is required fo IAM role")
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

typo: fo -> for

…rudderlabs/rudder-server into fix.aws-session-utils-use-default-chain
@koladilip koladilip merged commit de0fe36 into master Sep 27, 2022
@koladilip koladilip deleted the fix.aws-session-utils-use-default-chain branch September 27, 2022 15:33
@koladilip koladilip restored the fix.aws-session-utils-use-default-chain branch September 29, 2022 06:57
@github-actions github-actions bot deleted the fix.aws-session-utils-use-default-chain branch November 28, 2022 02:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants