You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem?
As an analyst, I would like to connect to Opensearch via a JDBC client such as DBeaver Community Edition.
Currently, the SQL JDBC Driver accepts the parameter auth to use AWS SIGV4.
In this case, the driver can then use an awsCredentialsProvider, which must be created separately. If not specified, the driver uses the default aws profile.
Within DBeaver, I cannot create an awsCredentialsProvider.
What solution would you like?
I would like to be able to use a custom named profile to connect, for example if I have a profile called awsdev or awsprod, I would like to supply this as a parameter to the driver to select which credentials to use, without creating a custom awsCredentialsProvider.
Alternatively, I would like to be able to supply an AWS Access Key and AWS Secret Access Key directly to the JDBC driver to be used.
These two options would allow easier use of the JDBC driver.
What alternatives have you considered?
I am currently researching solutions for creating a custom awsCredentialsProvider within DBeaver or otherwise, however this requires further research and seems unnecessarily laborious.
The text was updated successfully, but these errors were encountered:
@jkdll,
It is possible to set environment variables with the keys to a process which uses JDBC driver. For example, you can set/export env vars in the shell and run DBeaver from it.
@Yury-Fridlyand - thank you for the reply. Indeed I can confirm that environment variables do work, but I feel like the experience would be improved if a profile/set of keys can be supplied to the JDBC driver. Can I submit a PR for this?
This makes it very difficult to use the awsCredentialsProvider property.
A better solution is for awsCredentialsProvider to accept a String value. The ConnectionConfig class could then parse the String value and create the AWSCredentialsProvider.
Apache DBCP2 also forces all driver properties to be Strings. It is best to avoid Object values in Driver properties.
Is your feature request related to a problem?
As an analyst, I would like to connect to Opensearch via a JDBC client such as DBeaver Community Edition.
Currently, the SQL JDBC Driver accepts the parameter auth to use
AWS SIGV4
.In this case, the driver can then use an
awsCredentialsProvider
, which must be created separately. If not specified, the driver uses thedefault
aws profile.Within DBeaver, I cannot create an
awsCredentialsProvider
.What solution would you like?
I would like to be able to use a custom named profile to connect, for example if I have a profile called
awsdev
orawsprod
, I would like to supply this as a parameter to the driver to select which credentials to use, without creating a customawsCredentialsProvider
.Alternatively, I would like to be able to supply an AWS Access Key and AWS Secret Access Key directly to the JDBC driver to be used.
These two options would allow easier use of the JDBC driver.
What alternatives have you considered?
I am currently researching solutions for creating a custom awsCredentialsProvider within DBeaver or otherwise, however this requires further research and seems unnecessarily laborious.
The text was updated successfully, but these errors were encountered: