-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refresh token with WebIdentityTokenCredentialsProvider #2606
Comments
Hi @bpuertolas The Web Identity Token is provided by EKS in the file present in the path configured in AWS_WEB_IDENTITY_TOKEN_FILE env variable, the SDK just uses the token to make the AssumeRole call. Any token refresh request must be made from the container side. Let us know if this makes sense (or maybe I misunderstood the ask). |
Hi @debora-ito Thanks for your response but I think you misunderstood the ask. I will try to be more precise.
|
We are closing stale v1 issues before going into Maintenance Mode, so if this issue is still relevant in v2 please open a new issue in the v2 repo. Reference:
|
This issue is now closed. Comments on closed issues are hard for our team to see. |
Describe the Feature
Actually there is no way to refresh the AWS credentials when using the WebIdentityTokenCredentialsProvider. (Or maybe I didn't find it?)
Is your Feature Request related to a problem?
I use WebIdentityTokenCredentialsProvider to get IAM credential when working with EKS.
Actually, I see in the tracing tool we use, that
AWSSecurityTokenService.AssumeRoleWithWebIdentity
calls took more than 500ms in average and we would like to reduce this with a background task which refresh the token manually.Proposed Solution
I don't know if it can solve the problem but actually the refresh method in the WebIdentityTokenCredentialsProvider.class doesn't do nothing. Maybe it can call
this.credentialsProvider.refresh()
instead ?The text was updated successfully, but these errors were encountered: