Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow role-based authentication for Athena #447

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

jdelStrother
Copy link

@jdelStrother jdelStrother commented Oct 10, 2023

WDYT to something like this?

You can now specify role_arn to assume a role for querying Athena, rather than using the access key & secret directly.

STS tokens expire after 1 hour by default, so I've also wrapped the client calls in a autorefresh_credentials block. (Which is a little gross, open to better suggestions)
[I've since updated to using Aws::AssumeRoleCredentials, which handles autorefreshing for you]

STS requires you to specify a region, which might not be the same as the database's region. To try & clean up the distinction I've moved all the Athena credential settings to a new credentials sub-hash, but it should continue to work with people still setting access key & secret at the top level.

@jdelStrother
Copy link
Author

Anything I can do to help get this merged?

@jdelStrother jdelStrother marked this pull request as draft September 23, 2024 15:54
You can now specify role_arn to assume a role for querying Athena,
rather than using the access key & secret directly.

STS requires a region, which might not be the same region as the
database's region. To try & clean up the distinction I've moved all the
Athena credential settings to a new `credentials` sub-hash.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant