Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support auth using AssumeRoleWithWebIdentity for non-AWS S3-compatible implementations #7010

Open
Muon opened this issue Jan 23, 2025 · 1 comment
Labels
enhancement Any new improvement worthy of a entry in the changelog

Comments

@Muon
Copy link

Muon commented Jan 23, 2025

Is your feature request related to a problem or challenge? Please describe what you are trying to do.

We're using object_store for S3 access. We're trying to get OIDC auth working in our application and want to have automated tests of that using MinIO as an S3-compatible backend. However, object_store hardcodes the STS endpoint URL to https://sts.{region}.amazonaws.com.

Describe the solution you'd like

I'd like to be able to configure the STS endpoint URL when I build the client.

Describe alternatives you've considered

I've considered hacking around it using a hosts entry and a proxy, but that would fail HTTPS certificate validation.

Additional context

@Muon Muon added the enhancement Any new improvement worthy of a entry in the changelog label Jan 23, 2025
@tustvold
Copy link
Contributor

I don't see any issue with making this configurable

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Any new improvement worthy of a entry in the changelog
Projects
None yet
Development

No branches or pull requests

2 participants