-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update aws-sdk-go to v1.23.13 #115
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks a lot for the contribution. This is great!
Overall it looks good to me. Trusting that our test cases cover existing functionality we could merge this.
However, if you think you can a basic test case to cover this case to prevent regression would be great.
Only thing I'd love to see, is to update the warning message to notify user
drone-cache/storage/backend/s3/s3.go
Line 42 in 3172b74
level.Warn(l).Log("msg", "aws key and/or Secret not provided (falling back to anonymous credentials)") |
@zdoherty One other thing, why don't we upgrade to latest? https://github.com/aws/aws-sdk-go/releases |
@kakkoyun Definitely agree that upgrading to the most recent version could be ideal, but I wasn't sure if that was something which would be welcome. I'll give it a shot! Also, found this in the minio docs: https://github.com/minio/minio/blob/master/docs/sts/web-identity.md |
Hi, any progress on this? This looks like a very useful feature. |
@zdoherty any updates? |
@zdoherty friendly ping |
@zdoherty Any plans to push this to finish line? Or shall we close it? |
Closing this one. Because of inactivity and we have another PR in the pipeline that updates this dependency. |
Updates go.mod to use a more recent version of aws-sdk-go, specifically one which is recommended for supporting IAM Roles for Service Accounts (IRSA) when running in Kubernetes.
Fixes #114
Proposed Changes
Description
Newer versions of the Go AWS SDK include additional methods for automatically obtaining IAM credentials. Specifically, credentials can be obtained using
sts.AssumeRoleWithWebIdentity
, which is a requirement for using IAM Roles for Service Accounts when running in Kubernetes. The AWS documentation recommends using v1.23.13 or above to use this feature.Based on the existing S3 client code, using that version of the SDK should be all that's needed to support this feature.
Not sure how to best test this change. The built-in tests pass and I was able to use drone-cache with IRSA credentials using the updated SDK. Mocking out an STS service may prove to be tough. Any input on how to best accomplish this would be welcome.
Checklist
Add tests to cover changes.Created tests which fail without the change (if possible).Unreleased
section of CHANGELOG.