-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Require all credentials options to be explicit #15
Comments
Implicit credentials is useful when running Meltano inside an ECS Task, as AWS provides credentials for Boto3 automatically |
@danilofuchs check out my write up in #3 (comment) that describes my thoughts. I dont have an issue using implicit credentials but I'm suggesting that the user should be required to tell the tap where the credentials are coming from, in this case This is a bit of a crazy scenario 😄 but imagine the case where youre running meltano inside an ECS task that has proper IAM roles to access the data but theres also credentials set as environment variables for something else the ECS task does and also the meltano config has credentials set. Each has different levels of access. Its hard for me to understand which one will be used by the tap. |
Agreed! Makes sense to have this option explicit When implementing the tap, I was confused if it was required to set env vars/config values. So an explicit config for the credential source would make it better documented as well! |
After this is resolved we'll have a code path where implicit credentials are used. This could be install config/credentials files on the machine or instance roles.
The idea would be to require the tap user to always explicitly define where the credentials are coming from so theres no chance of accidentally using the wrong ones.
My thoughts from slack https://meltano.slack.com/archives/C04TSH483DF/p1681752224881609?thread_ts=1681741163.334529&cid=C04TSH483DF
The text was updated successfully, but these errors were encountered: