Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

added support for IAM role authentication #132

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dylanjsa
Copy link

this functionality would be useful when applications are deployed with cloudformation stacks.

we can deploy an IAM role with access to the specified s3 bucket alongside the application without needing to worry about creating a User with access keys.

Amazon recommends that User accounts are created for physical real people and not for robots.

@pylover pylover self-requested a review November 18, 2022 20:02
Copy link

@MoralCode MoralCode left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Despite being someone who hasnt ever really used S3, this looks good to me overall!

Could you maybe add some unit test cases that demonstrate the functionality of this new auth mechanism (the GoogleCloudStorage class uses mocks to fake the google backend, that may be a useful starting point, i just added some fixups to these tests on my fork of the repo)

@timdelange
Copy link

To me it looks like the current s3 tests covers this usage already. On AWS, if deployed on AWS infrastructure, boto will automatically be authed according to an IAM role assigned to the infrastructure(EC2/lambda), if the auth details are not specified. This PR merely allows you to not specify auth details.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants