Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Guidance on how to use AWSAssumeRoleCredentialsProvider #409

Closed
mt-rpranata opened this issue Apr 27, 2021 · 1 comment
Closed

Guidance on how to use AWSAssumeRoleCredentialsProvider #409

mt-rpranata opened this issue Apr 27, 2021 · 1 comment

Comments

@mt-rpranata
Copy link

mt-rpranata commented Apr 27, 2021

Hi,

We are using io.confluent.connect.s3.S3SinkConnector from kafka-connect-s3:5.5.3 installed by

confluent-hub install --no-prompt confluentinc/kafka-connect-s3:5.5.3

We have been trying to use AWSAssumeRoleCredentialsProvider with s3.credentials.provider.class. We followed the guide at https://docs.confluent.io/5.5.1/connect/kafka-connect-s3/index.html

    "s3.credentials.provider.class": "AWSAssumeRoleCredentialsProvider",
    "sts.role.arn": "arn:aws:iam::111111111111:role/service-role/SinkerRole",
    "sts.role.external.id": "external-id",
    "sts.role.session.name": "session-name",

However, when we send the REST request we got this

{"error_code":400,"message":"Connector configuration is invalid and contains the following 2 error(s):\nInvalid value AWSAssumeRoleCredentialsProvider for configuration s3.credentials.provider.class: Class AWSAssumeRoleCredentialsProvider could not be found.\nInvalid value null for configuration s3.credentials.provider.class: Class must extend: interface com.amazonaws.auth.AWSCredentialsProvider\nYou can also find the above list of errors at the endpoint /connector-plugins/{connectorType}/config/validate"}

However, when we use com.amazonaws.auth.DefaultAWSCredentialsProviderChain

We thought that #366 could be a related issue but no luck.

@mt-rpranata
Copy link
Author

I made a fool of myself.

- "s3.credentials.provider.class": "AWSAssumeRoleCredentialsProvider",
+ "s3.credentials.provider.class": "AwsAssumeRoleCredentialsProvider",

And I am having the same issues with #366 now that throw an exception caused by blank sts.role.external.id

Caused by: org.apache.kafka.common.config.ConfigException: Missing required configuration "sts.role.external.id" which has no default value.

Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant