-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support inline role_arn for IAM Role authentication #225
Comments
Hi @Fleid , thank you for reaching out with this feature request. redshift-connector's
Boto3 does not support this functionality at this time, but they have a long running issue, boto/botocore#761, which tracks this feature request. As such, the recommendation from the boto3 side is to take the following approach:
at this point, the temporary aws credentials can be passed directly to a redshift boto3 client, or in this case to redshift-connector. Below I've included a code snippit which shows how this can be done:
Regardless, this isn't very clean. Ideally, redshift-connector should be able to perform this role assumption internally using the steps I've provided above. As such, I will raise this feature request with the Redshift driver team so we can determine a path forward in improving the user experience for this scenario. |
Thanks a lot @Brooke-white - will relay the info on my side as well :) |
Hey @Brooke-white ! We’re working on setting up a cross-account connection to Redshift on Superset using Would it be possible to add support for assuming roles directly in the Redshift connector? For example, introducing a parameter like conn = redshift_connector.connect(
iam=True,
database="main",
cluster_identifier="<cluster_identifier>",
db_user="<user>",
assume_role_arn="<desired_role_arn>",
) In this scenario:
Currently, we are using a Thank you! |
See this issue for context : dbt-labs/dbt-redshift#842
The connector need to be able to support IAM Role via inline parameters in addition to via an AWS profile, the same way it does for IAM Users.
If I open a connection with
role_arn
,source_access_key_id
, andsource_secret_access_key
, currently it ignoresrole_arn
and uses the access key to open an IAM user connection.What I need instead is to leverage the access key to assume the role - see boto3 credentials, we're in the assume role provider chapter, particularly:
What I need is to pass all the parameters inline, not a
source_profile
.The text was updated successfully, but these errors were encountered: