Skip to content

extproc: retrieve AWS credentials for every request#185

Closed
wengyao04 wants to merge 1 commit intoenvoyproxy:mainfrom
wengyao04:aws-auth
Closed

extproc: retrieve AWS credentials for every request#185
wengyao04 wants to merge 1 commit intoenvoyproxy:mainfrom
wengyao04:aws-auth

Conversation

@wengyao04
Copy link
Copy Markdown
Contributor

@wengyao04 wengyao04 commented Jan 27, 2025

Commit Message:

Instead of retrieving AWS credentials in newAWSHandler, could we get the AWS credentials for every request in first release and optimize it later with AssumeRoleWithWebIdentity API ?

I propose this change because we have temporary AWS credentials in the credential secrets, and we have our own token-refresher to refresh the credentials.

Retrieve credentials for each request

Related Issues/PRs (if applicable):

Special notes for reviewers (if applicable):

@netlify
Copy link
Copy Markdown

netlify bot commented Jan 27, 2025

Deploy Preview for envoy-ai-gateway canceled.

Name Link
🔨 Latest commit 9975df4
🔍 Latest deploy log https://app.netlify.com/sites/envoy-ai-gateway/deploys/6796e6e16b0d740008966ffe

@wengyao04 wengyao04 changed the title AWS auth: retreive credentials for every request Extproc: AWS auth retreive credentials for every request Jan 27, 2025
@wengyao04 wengyao04 changed the title Extproc: AWS auth retreive credentials for every request extproc: retrieve AWS credentials for every request Jan 27, 2025
@wengyao04
Copy link
Copy Markdown
Contributor Author

@yuzisun, @aabchoo and @mathetake , do you think if we can retrieve the AWS credentials for every request in first release and optimize it later with AssumeRoleWithWebIdentity API?

@yuzisun
Copy link
Copy Markdown
Contributor

yuzisun commented Jan 27, 2025

@yuzisun, @aabchoo and @mathetake , do you think if we can retrieve the AWS credentials for every request in first release and optimize it later with AssumeRoleWithWebIdentity API?

We can implement a secret watcher and update the credential in cache which is orthogonal to AssumeRoleWithWebIdentity, it is still a useful feature for user who rotates the aws credential manually.

@mathetake
Copy link
Copy Markdown
Member

mathetake commented Jan 27, 2025

yes, secret watcher is definitely the way to go and this reading-file-on-request-path is unacceptable (see #169). That's exactly what I suggested to @aabchoo in #125 : #125 (comment)

@mathetake mathetake closed this Jan 27, 2025
@mathetake
Copy link
Copy Markdown
Member

Btw you can already emulate the refreshing behavior by using a unique secret resource name in your refresher. Anyways this is exactly the opposite of whwre we should go and I don't see any reason to have this now.

mathetake added a commit that referenced this pull request Jan 29, 2025
**Commit Message**:

This adds a secret watcher controller that enables the 
hot reload of any secret referenced by backendTrafficPolicy.

**Related Issues/PRs (if applicable)**:

Follow up on #43  #106 #161 
Supersede #185

---------

Signed-off-by: Takeshi Yoneda <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants