Skip to content

Certificate path detection is incorrect when using AWS STS (eg with AWS EKS) #1129

Open
@poodlewars

Description

@poodlewars

Describe the bug

The Azure we detect (using the openssl python lib) correct certificate locations, and use them in the Azure SDK.

For S3, we use the system default. But since we build on manylinux, and statically link libcurl and openssl, this means the "system default" we end up using is CentOS', which can lead to problems when running on other Linuxes.

Example failing flow:

  • Use passwordless authentication
  • Assume IAM role using AWS STS
  • The SSL verification with STS fails

On S3, we should use the same certificate location detection logic that we have for Azure.

There is a private thread that Alex Seaton can add you to about this with more context, https://arcticdb.slack.com/archives/C064NA7BK5H/p1701703865582509 .

Metadata

Metadata

Assignees

Labels

enhancementNew feature or request

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions