timvw commented on issue #2178:
URL: https://github.com/apache/arrow-rs/issues/2178#issuecomment-1222124221

   Existing implementation can be found in aws-sdk-rust 
[sso.rs](https://github.com/awslabs/aws-sdk-rust/blob/b8050cb19f4f11270150315a45c42b6f01d934fc/sdk/aws-config/src/sso.rs)
   
   
   This is typically used by devs, while awaiting this feature, one can run the 
following commands to acquire temporal credentials:
   
   ```bash
   ACCOUNT_ID="XXX"
   ROLE_NAME="XXX"
   ACCOUNT_ROLE_NAME="${ACCOUNT_ID}-${ROLE_NAME}"
   ACCESS_TOKEN="$(cat ~/.aws/sso/cache/*.json | jq -r ".accessToken" | grep -v 
null)"
   ROLE_CREDENTIALS="$(aws sso get-role-credentials 
--account-id="${ACCOUNT_ID}" --role-name="${ACCOUNT_ROLE_NAME}" 
--access-token="${ACCESS_TOKEN}")"
   
   export AWS_ACCESS_KEY_ID="$(echo "${ROLE_CREDENTIALS}" | jq -r 
".roleCredentials.accessKeyId")"
   export AWS_SECRET_ACCESS_KEY="$(echo "${ROLE_CREDENTIALS}" | jq -r 
".roleCredentials.secretAccessKey")"
   export AWS_SESSION_TOKEN="$(echo "${ROLE_CREDENTIALS}" | jq -r 
".roleCredentials.sessionToken")"
   ```


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: github-unsubscr...@arrow.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to