-
Notifications
You must be signed in to change notification settings - Fork 970
Description
Describe the bug
The S3 CRT client does not use the IAM role attached to the service account in Kubernetes. I'm building the client with default credentials provider chain. Instead, it tries to use the role of the EKS/Kubernetes node. I do have the STS module on the the classpath. Other SDK clients are correctly use the IAM role. Even the Netty-based async client works with the role.
Expected Behavior
The CRT based client use the default credentials provider chain correctly, and use the IAM role for the container.
Current Behavior
It tries to use the role of the Kubernetes node. I see authentication error where it points to the node role not having the correct IAM actions. Those actions only exists on the container IAM role.
Reproduction Steps
- Create a standard CRT client
- Deploy to a container, and attach IAM role to the service account for the container.
- Make a request to upload/download with the CRT client.
Possible Solution
It should use the IAM role for the container.
Additional Information/Context
No response
AWS Java SDK version used
2.20.162, 0.27.3 (CRT)
JDK version used
Corretto 17.0.8
Operating System and version
Amazon Linux 2023