[CONJ-877] AWS IAM Credentials Service lacking STS assume role capabilities Created: 2021-05-07  Updated: 2023-10-25

Status: Open
Project: MariaDB Connector/J
Component/s: aurora, authentication
Affects Version/s: None
Fix Version/s: 3.4

Type: Bug Priority: Major
Reporter: Adrian Samatan Assignee: Diego Dupin
Resolution: Unresolved Votes: 2
Labels: None


 Description   

Right now the AWS IAM Credentials Service only supports the following credentials providers:
DefaultAWSCredentialsProviderChain DefaultAwsRegionProviderChain

However, if a user wants to assume a role rather than use the default credentials, he's unable. Support for the STSAssumeRoleSessionCredentialsProvider is needed to be added to the credentials service.



 Comments   
Comment by Diego Dupin [ 2021-08-23 ]

I'm not familliar enough with AWS to understand the difference.
Could you further describe the expected fuctionnality ?

Comment by Adrian Samatan [ 2021-08-23 ]

Currently one of the AWS STS functionalities (assuming any IAM role to act with its permissions) is not supported. More information about STS: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html

The STSAssumeRoleSessionCredentialsProvider class from the Java SDK is not supported.

Comment by Liju [ 2022-03-02 ]

Is there any updates to this issue. We also need this feature to assume another role. As of now the Credential Providers is not configurable in mariadb driver.

Comment by Sreedhar Konireddy [ 2022-03-03 ]

We are also in need of this feature to assume role other than the default credentials.

Generated at Thu Feb 08 03:18:58 UTC 2024 using Jira 8.20.16#820016-sha1:9d11dbea5f4be3d4cc21f03a88dd11d8c8687422.