-
Notifications
You must be signed in to change notification settings - Fork 301
improvements for s3
environements variables
#1343
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
08c464a
to
116dc39
Compare
s3
environements variabless3
environements variables
In a related event, I've just sent a PR to |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
PR looks good, thanks for the improvement!
@yongtang should we remove these envs in this PR ? |
@vnvo2409 I think we can remove the env in this PR. It will not impact users in product environment anyway. |
Good news! My PR localstack/localstack#3797 is merged. @yongtang Could you merge this PR ? Linux tests have passed. |
@vnvo2409 Great effort! |
* lazy loading for `s3` environements variables * `S3_ENDPOINT` supports http/https * remove `S3_USE_HTTPS` and `S3_VERIFY_SSL`
We just updated our TF, and realized that Is it possible to bring this functionality back? I think it should be up to the user if/how they want to configure the S3 connection. |
@fsonntag PR are welcomed👍 |
116dc39: Now, we have to set 3 envs
S3_DISABLE_MULTI_PART_DOWNLOAD
,S3_MULTI_PART_UPLOAD_CHUNK_SIZE
andS3_MULTI_PART_DOWNLOAD_CHUNK_SIZE
before importingtensorflow-io
if we want to change the default behavior. This PR defers the reading:S3_DISABLE_MULTI_PART_DOWNLOAD
now should be set before the first calling tos3
filesystem ( read inGetS3Client
)S3_MULTI_PART_UPLOAD_CHUNK_SIZE
should be set before uploading something tos3
( read inGetTransferManager
inAws::Transfer::TransferDirection::UPLOAD
).S3_MULTI_PART_DOWNLOAD_CHUNK_SIZE
should be set before reading something froms3
( read inGetTransferManager
inAws::Transfer::TransferDirection::DOWNLOAD
).6e9e86d: This commit use
OverrideEndpoint
ofs3_client
instead of forcing users to setS3_ENDPOINT
andS3_USE_HTTPS
.OverrideEndpoint
supports both with and withouturi
( in the latter case it will fallback toS3_USE_HTTPS
). We could eventually removeS3_USE_HTTPS
andS3_VERIFY_SSL
since users might accidentally setS3_USE_HTTPS=0
in a production environment which is extremely dangerous. ( we could remove those envs in this PR I think )