-
Notifications
You must be signed in to change notification settings - Fork 231
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Workload identity federation doesn't support full aws credential sources. #1408
Comments
I think It doesn't work for spark-bigquery-connector because the connector doesn't the config item to change the supplier. I hope core auth library would have this functionality without any patches by users. Otherwise, GCP users have to make a patch to each google libraries involving google-auth-library-java. |
Hi @lsirac, it's impossible to use custom The issue: Besides that, you can write custom ExternalCredentials, cause its list of supported types hardcoded in GoogleCredentials class. Yep, I agree with @ksauzz that we need to fix this part to specify different suppliers. P.S.
Theoretically, we can support both cases, but this makes API even less clean for me. But flexible. P.P.S. |
By the way, in our case environment is AWS EMR-S, and we use it to populate data in BQ and GCS. |
InternalAwsSecurityCredentialsSupplier only support environment variables or EC2 metadata server to get AWS credential.
In my usecase, I can't use workload identity federation from AWS Glue (spark) to load data to BigQuery table using spark-bigquery-connector. This spark environment has no EC2 metadata endpoint, and spark driver process' environment variables cannot be updated from a job.
Environment details
AWS Glue 4.0 (spark) + pyspark
Steps to reproduce
External references such as API reference guides
Any additional information below
I think AWS SDKs including aws-sdk-java provide comprehensive ways to get credential from various AWS environments, so it would be nice to use DefaultCredentialsProvider or something instead of custom implementation in this library. But I guess google team wouldn't like to use such other vendor library...
DefaultCredentialsProvider's docs
The text was updated successfully, but these errors were encountered: