Hello,
Maybe the answer is already out there, but I didn't find it.
Is there a way to make s3ql commands use an assumed role to access the s3 bucket?
Basically, my s3 buckets can be accessed only with a specific IAM role, so I either use a profile, or temporary credentials using aws sts.
Example:
aws sts assume-role --role-arn arn:aws:iam::123456789:role/s3admin --role-session-name s3backup --profile default
Which gives me back temporary credentials with aws key, aws secret and aws_token.
I tried this with awscli and it works perfectly if I update the .aws/credentials file with aws_access_key_id, aws_secret_access_key and aws_session_token
All 3 are mandatory, or aws s3 commands don't work.
I originally thought I could just create a authinfo file with these informations so s3ql can access my bucket under a temporary identity, but there's no parameter for the token. Without it, I get a 403 denied.
I can't even start to make a mkfs.s3ql.
After reading the aws doc (https://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html) , the headers must contain x-amz-security-token
Which s3ql doesn't support?
Any idea?