Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add support for AWS Web Identity auth flow #467

Open
wants to merge 7 commits into
base: main
Choose a base branch
from

Conversation

edelwud
Copy link

@edelwud edelwud commented Oct 22, 2024

Added new schema fields for 'sasl_aws_web_identity_token' and 'sasl_aws_web_identity_token_file' to support AWS Web Identity Token authentication. Updated the Kafka provider configuration accordingly.

Utilized function to generate auth token from web identity (signer.GenerateAuthTokenFromWebIdentity) which is declared in aws/aws-msk-iam-sasl-signer-go#21

edelwud and others added 7 commits October 22, 2024 16:11
Introduced new fields SASLAWSWebIdentityRoleArn, SASLAWSWebIdentityToken, and SASLAWSWebIdentityTokenFilePath to the Kafka configuration. This enables authentication using AWS Web Identity Role for generating auth tokens.
Updated the function call from `GenerateAuthTokenFromWebIdentityRole` to `GenerateAuthTokenFromWebIdentity`. This resolves mismatched function signature issues and ensures proper authentication workflow.
Rename SASLAWSWebIdentityTokenFilePath to SASLAWSWebIdentityTokenFile for consistency and clarity. Adjust related logic to reflect the new field name.
Removed the redundant SASLAWSWebIdentityRoleArn field and reorganized the conditional logic for token generation. This change streamlines the code and ensures proper role handling.
Sensitive fields in the SASL configuration are now masked. This prevents inadvertent exposure of credentials and tokens in logs.
Added new schema fields for 'sasl_aws_web_identity_token' and 'sasl_aws_web_identity_token_file' to support AWS Web Identity Token authentication. Updated the Kafka provider configuration accordingly.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants