aws-sdk-rust icon indicating copy to clipboard operation
aws-sdk-rust copied to clipboard

[request]: Support static & STS assume role credentials in the ECS / HTTPS credentials provider

Open rcoh opened this issue 3 years ago • 0 comments
trafficstars

Tell us about your request

Currently, the ECS/HTTPS credentials provider only supports refreshable credentials with a token & an expiry but this doesn't support all use cases effectively eg. for customers with their own HTTPS credentials provider that returns static credentials. Add support for static credentials:

       //  {
       //    "AccessKeyId" : "MUA...",
       //    "SecretAccessKey" : "/7PC5om...."
       //  }

and assume role credentials:

       //   {
       //     // fields to construct STS client:
       //     "Region": "sts-region-name",
       //     "AccessKeyId" : "MUA...",
       //     "Expiration" : "2016-02-25T06:03:31Z", // optional
       //     "SecretAccessKey" : "/7PC5om....",
       //     "Token" : "AQoDY....=", // optional
       //     // fields controlling the STS role:
       //     "RoleArn": "...", // required
       //     "RoleSessionName": "...", // required
       //     // and also: DurationSeconds, ExternalId, SerialNumber, TokenCode, Policy
       //     ...
       //   }

Tell us about the problem you're trying to solve.

use my HTTP credential provider that I use with other AWS SDKs

Are you currently working around this issue?

with my own custom credentials provider

Additional context

No response

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue, please leave a comment

rcoh avatar Dec 13 '21 16:12 rcoh