Support authentication with AWS_WEB_IDENTITY_TOKEN_FILE
See original GitHub issueUse IAM Service Account roles results in the environment variables AWS_ROLE_ARN
and AWS_WEB_IDENTITY_TOKEN_FILE
which should be usable for auth.
https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-minimum-sdk.html
This project appears to be using a new enough SDK, so probably something wrong with the way it is initialised?
Issue Analytics
- State:
- Created 3 years ago
- Comments:7 (3 by maintainers)
Top Results From Across the Web
AssumeRoleWithWebIdentity - AWS Security Token Service
Returns a set of temporary security credentials for users who have been authenticated in a mobile or web application with a web identity ......
Read more >Add support for AWS Web Identity Token File auth #119 - GitHub
I've deployed a delta-sharing server to an AWS Kubernetes cluster (EKS) which uses ... Add support for AWS Web Identity Token File auth...
Read more >StsWebIdentityTokenFileCredent...
An implementation of AwsCredentialsProvider that periodically sends an AssumeRoleWithWebIdentityRequest to the AWS Security Token Service to maintain ...
Read more >Authentication and Credentials - ACK - GitHub Pages
There are multiple ways in which you can configure an ACK service controller to use a particular set of AWS credentials: Web identity...
Read more >Unable to load AWS credentials from any provider in the chain ...
The containers in your pods must use an AWS SDK version that supports assuming an IAM role via an OIDC web identity token...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Great, so not an issue on our end.
I believe the issue is in the way that the AWS library is being initialised.
e.g. use
DefaultAWSCredentialsProviderChain