Skip to content

Conversation

Tmonster
Copy link
Collaborator

@Tmonster Tmonster commented Aug 11, 2025

This PR updates how we handle STS roles with aws credentials.

This PR updates it so the rules are as follows

  • STS can be used if and only if ASSUME_ROLE_ARN is also present
  • If the credential provider is chain, the requested profile is first loaded. If the requested profile has a role-arn value, then a STSAssumeRoleCredentialsProvider is used to load credentials. This does not break the current functionality since assuming a role within the config file would not work
  • If no chain is provided, first we look to find a valid profile using the Aws::Auth::DefaultAWSCredentialsProviderChain provider; which is a default credentials provider chain. If no credentials are picked up that way, then we default to the config chain and try to find credentials in the ProfileConfigFileAWSCredentialsProvider. The Aws sdk documentation says this is how it should work (although it is not implement that way)

@Tmonster Tmonster merged commit 50da167 into duckdb:main Sep 2, 2025
16 checks passed
@Tmonster Tmonster deleted the sts-profile-v1.3 branch September 2, 2025 12:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants