Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

extproc: retrieve AWS credentials for every request #185

Closed
wants to merge 1 commit into from

Conversation

wengyao04
Copy link
Contributor

@wengyao04 wengyao04 commented Jan 27, 2025

Commit Message:

Instead of retrieving AWS credentials in newAWSHandler, could we get the AWS credentials for every request in first release and optimize it later with AssumeRoleWithWebIdentity API ?

I propose this change because we have temporary AWS credentials in the credential secrets, and we have our own token-refresher to refresh the credentials.

Retrieve credentials for each request

Related Issues/PRs (if applicable):

Special notes for reviewers (if applicable):

Signed-off-by: yweng14 <yweng14@bloomberg.net>
Copy link

netlify bot commented Jan 27, 2025

Deploy Preview for envoy-ai-gateway canceled.

Name Link
🔨 Latest commit 9975df4
🔍 Latest deploy log https://app.netlify.com/sites/envoy-ai-gateway/deploys/6796e6e16b0d740008966ffe

@wengyao04 wengyao04 changed the title AWS auth: retreive credentials for every request Extproc: AWS auth retreive credentials for every request Jan 27, 2025
@wengyao04 wengyao04 changed the title Extproc: AWS auth retreive credentials for every request extproc: retrieve AWS credentials for every request Jan 27, 2025
@wengyao04
Copy link
Contributor Author

@yuzisun, @aabchoo and @mathetake , do you think if we can retrieve the AWS credentials for every request in first release and optimize it later with AssumeRoleWithWebIdentity API?

@yuzisun
Copy link
Contributor

yuzisun commented Jan 27, 2025

@yuzisun, @aabchoo and @mathetake , do you think if we can retrieve the AWS credentials for every request in first release and optimize it later with AssumeRoleWithWebIdentity API?

We can implement a secret watcher and update the credential in cache which is orthogonal to AssumeRoleWithWebIdentity, it is still a useful feature for user who rotates the aws credential manually.

@mathetake
Copy link
Member

mathetake commented Jan 27, 2025

yes, secret watcher is definitely the way to go and this reading-file-on-request-path is unacceptable (see #169). That's exactly what I suggested to @aabchoo in #125 : #125 (comment)

@mathetake mathetake closed this Jan 27, 2025
@mathetake
Copy link
Member

Btw you can already emulate the refreshing behavior by using a unique secret resource name in your refresher. Anyways this is exactly the opposite of whwre we should go and I don't see any reason to have this now.

mathetake added a commit that referenced this pull request Jan 29, 2025
**Commit Message**:

This adds a secret watcher controller that enables the 
hot reload of any secret referenced by backendTrafficPolicy.

**Related Issues/PRs (if applicable)**:

Follow up on #43  #106 #161 
Supersede #185

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants