-
Notifications
You must be signed in to change notification settings - Fork 527
Add support for workload identity federation #2203
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
All contributors have signed the CLA ✍️ ✅ |
sfc-gh-dbasavin
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great!
|
I have read the CLA Document and I hereby sign the CLA |
sfc-gh-jkasten
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Awesome, Peter!
ed1542e to
d927243
Compare
sfc-gh-pmansour
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Posting on behalf of Maxim
d3d2124 to
70f399c
Compare
…d fixtures, add support for Azure Functions MDS
c2912f8 to
b6bc1ee
Compare
Please answer these questions before submitting your pull requests. Thanks!
What GitHub issue is this PR addressing? Make sure that there is an accompanying issue to your PR.
Fixes SNOW-1967309: SNOW-1927956: Add support for workload identity federation #2202
Fill out the following pre-review checklist:
Please describe how your code solves the related issue.
Adds a new authentication plugin called
AuthByWorkloadIdentity, and plumbs it through the connection creation. This relies on a few parameters:authenticator: This is an existing parameter, but now has a new supported valueWORKLOAD_IDENTITY.workload_identity_provider: A new optional parameter that can describe how to load the workload identity credential. Can be AWS, AZURE, GCP, OIDC or None. If this is set to None, it will attempt to auto-discover a credential based on the environment.workload_identity_entra_resource: A new optional parameter, to be used when targeting a custom Azure Entra ID application as the resource, for example in a sovereign cloud.There is a broad suite of tests for all the new functionality, including a set of new fixtures that fake the behavior of the major CSP metadata services.
Usage examples:
These changes cannot be used yet as the backend support is not ready. They're gated by a new environment variable
SF_ENABLE_EXPERIMENTAL_AUTHENTICATIONwhich must be set.Also note that the default Entra ID application resource is not ready yet, so I used a placeholder value that's guaranteed to fail in reality. This will be updated in a follow-up PR once that application is ready.