Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

create persistent credentials provider #27

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

sarah-story
Copy link

Hello! My name is Sarah, and I'm a backend engineer at Zapier. We've been using your SQS sink connector, and we've made a few tweaks to it in our own fork. We are planning to submit a few pull requests with changes that we think would be useful to the community at large.

This PR introduces a change to the STS Assume Role auth provider. It moves the creation of the CredentialsProvider into the configure method. The benefit to this change is that the CredentialsProvider is only created once. Then getCredentials will use cached credentials until they expire, at which point the refresh method is called.

At high volumes of events, we found that creating the CredentialsProvider in the getCredentials method led to AWS rate limits. This change resolved the rate limit errors for us.

@sarah-story
Copy link
Author

Hi @dylanmei! It looks like you're the most recent contributor to this repo, so I hope it's alright that I tagged you. Just wanted get your thoughts on this PR!

@dylanmei
Copy link
Contributor

Hello @sarah-story the MR is most welcome. 🎉 We will get a review going.

</dependencies>
</dependencyManagement>

<dependencies>
<dependency>
<groupId>com.google.guava</groupId>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Kindly share insights into the addition of Guava here.

@valmoz
Copy link
Contributor

valmoz commented Feb 16, 2023

@sarah-story is this PR still useful?

@hazooma
Copy link

hazooma commented Jun 21, 2023

Is this imrpovement still valid ? @sarah-story

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants