-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
profile param does not working with AWS SSO config #14
Comments
this is still not working for me |
@bobcolner thanks for reporting. SSO configs may not yet be fully supported |
Hey @samansmink!
This does work. So, I guess we missed a small thing in the extension 🤔? |
This all seems somewhat broken on v0.10 on Linux:
I can't make either |
same issue as @herebebeasties but on macos |
Hey everyone, thanks for reporting. I will try to set up some SSO config in our CI testing environment to properly test the SSO login method and fix any issues. Just for clarity here, @herebebeasties Did you also try the create secret syntax as described by @mehd-io? |
Afaict the workflow described by @mehd-io works. I will PR this to the docs. Since I will leave this open until this is properly tested in the aws extension ci |
Yes. It did not work for me - see the bullet points in my above message. What I've put in my above message is accurate. Adding the |
Could you provide a reproducible example for the |
I'm not really sure what a "reproducible example" would look like here beyond what I've already described, other than scripting up the creation of a whole AWS environment, S3 bucket, AWS policy, role, policy mapping, Microsoft Azure AD domain creation, SSO setup, etc. which would be pretty complex and time-consuming. Do you have something smaller and more specific in mind? I'll try to find some time to have a stab at debugging why this is failing in gdb, as tbh it's probably easier to do that than the above. |
Well, for example, I ran:
now my
Then to login I run:
Now I get a pop up in my browser to login, which I do. Then in DuckDB i run: CREATE SECRET (
TYPE s3,
PROVIDER credential_chain,
CHAIN 'sso',
PROFILE 'duckdb-sso-test'
); And now my auth works fine, and when I query
Alternatively, If you would give a stab at debugging this, that would be super useful for sure. |
That's exactly the same skeleton as my set-up and yet it doesn't work for me. I'll have a look in a debugger. |
Thanks! Be aware of the fact that I had to rerun the |
interesting, I have the same problem with duckdb under linux what worked in the end:
Using the CONFIG storage above, it returns "success" but does not store any secret:
(no |
I put up a PR (#49) to support SSO auth using the new method. It works on my machine ™️ |
I will close this issue, it works now on at least 2 machines ;) Feel free to open a new issue if sso problems persist |
I am able to use
load_aws_credentials()
with my default profile but it does not work when I specify a different profile, e.g.load_aws_credentials('prod')
The text was updated successfully, but these errors were encountered: