Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: make aws credentials optional when s3 backup #552

Conversation

salasberryfin
Copy link
Contributor

@salasberryfin salasberryfin commented Jan 9, 2025

What this PR does / why we need it*:

The S3CredentialSecret field in ServerConfig.Etcd.BackupConfig.S3.S3CredentialSecret is required and limits users to authenticate with AWS access/secret keys only. Making this optional allows using assumed IAM roles instead.

When setting ServerConfig, it will now check if the value is empty and ignore it, so it does not trigger a controller error. Even though this is not required, users are expected to set this if they need to use access/secret key authentication. Controller behavior should not be changed if user provides a valid S3CredentialSecret value.

Which issue(s) this PR fixes:
Fixes #512

Special notes for your reviewer:

Checklist:

  • squashed commits into logical changes
  • includes documentation
  • adds unit tests
  • adds or updates e2e tests

@salasberryfin salasberryfin added the kind/feature New feature or request label Jan 9, 2025
@salasberryfin salasberryfin requested a review from a team as a code owner January 9, 2025 15:15
@salasberryfin salasberryfin force-pushed the backup-s3-optional-credential-keys branch 2 times, most recently from b9367bb to 70372e8 Compare January 9, 2025 15:28
@salasberryfin salasberryfin requested a review from a team January 10, 2025 09:00
@salasberryfin salasberryfin force-pushed the backup-s3-optional-credential-keys branch from 70372e8 to ded588a Compare January 10, 2025 11:01
@alexander-demicev alexander-demicev merged commit 31818d7 into rancher:main Jan 10, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Allow using IAM Profiles for etcd S3 credentials
3 participants