-
You must be signed in to change notification settings -
Add support for AWS environmental credential chain for AWS storage providers #9439
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
Conversation
Hi @snelson44, thank you for the contribution. There are a few concerns with this approach:
|
…/add-env-cred-type
Sn/add env cred type
|
|
Added credentials type and setting parameter @Marishka17 |
Motivation and context
Currently there is no way to use the environmental credentials chain for aws cloud storages. You must either explicitly set your credentials or cvat will assume you are attempting to do anonymous access and signing requests will be disabled entirely. I added the ability for the credentials type to be specified and passed on to the aws provider. If anonymous is requested, then signing requests will still be disabled. If credentials are given, they will be used to access aws, if credentials are not explicitly given, boto3 will look for them in the environment.
How has this been tested?
Added rest api tests for adding a cloud storage. One test to show anonymous access was still supported, and a second test to show that the aws provider could pull creds from the environment
Checklist
develop
branchLicense
Feel free to contact the maintainers if that's a concern.