-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
s3: Respect SignatureV2 flag for all credential providers #3496
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
simonswine
force-pushed
the
support-v2-signatures
branch
2 times, most recently
from
November 23, 2020 16:43
149127c
to
a320463
Compare
simonswine
commented
Nov 23, 2020
bwplotka
approved these changes
Nov 23, 2020
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some style nits only. Thanks! 💪 LGTM otherwise.
simonswine
force-pushed
the
support-v2-signatures
branch
from
November 24, 2020 18:50
a320463
to
b6a2568
Compare
Thanos currently only supports V2 signatures when the credentials are statically specified in its configuration. This change supports requesting signature V2 on other credential sources. Signed-off-by: Christian Simon <simon@swine.de>
Signed-off-by: Christian Simon <simon@swine.de>
simonswine
force-pushed
the
support-v2-signatures
branch
from
November 25, 2020 08:54
b6a2568
to
f3faf74
Compare
bwplotka
approved these changes
Nov 25, 2020
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
💪 Thanks!
LGTM
3 tasks
Oghenebrume50
pushed a commit
to Oghenebrume50/thanos
that referenced
this pull request
Dec 7, 2020
…3496) * s3: Respect SignatureV2 flag for all credential providers Thanos currently only supports V2 signatures when the credentials are statically specified in its configuration. This change supports requesting signature V2 on other credential sources. Signed-off-by: Christian Simon <simon@swine.de> * Fix docs drift Signed-off-by: Christian Simon <simon@swine.de> Signed-off-by: Oghenebrume50 <raphlbrume@gmail.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Changes
Thanos currently only supports V2 signatures when the credentials are statically specified in its configuration. This change supports using signature V2 on other credential sources, too.
Verification
The object storage appliance is not fully compatible with S3V4 signatures and we are able to run it statically configured with V2.
As we need to roll over the used accessKey/secretKey regularly we would like to be able to configure it via the
&credentials.IAM{}
chain.