timvw commented on issue #2178: URL: https://github.com/apache/arrow-rs/issues/2178#issuecomment-1222124221
Existing implementation can be found in aws-sdk-rust [sso.rs](https://github.com/awslabs/aws-sdk-rust/blob/b8050cb19f4f11270150315a45c42b6f01d934fc/sdk/aws-config/src/sso.rs) This is typically used by devs, while awaiting this feature, one can run the following commands to acquire temporal credentials: ```bash ACCOUNT_ID="XXX" ROLE_NAME="XXX" ACCOUNT_ROLE_NAME="${ACCOUNT_ID}-${ROLE_NAME}" ACCESS_TOKEN="$(cat ~/.aws/sso/cache/*.json | jq -r ".accessToken" | grep -v null)" ROLE_CREDENTIALS="$(aws sso get-role-credentials --account-id="${ACCOUNT_ID}" --role-name="${ACCOUNT_ROLE_NAME}" --access-token="${ACCESS_TOKEN}")" export AWS_ACCESS_KEY_ID="$(echo "${ROLE_CREDENTIALS}" | jq -r ".roleCredentials.accessKeyId")" export AWS_SECRET_ACCESS_KEY="$(echo "${ROLE_CREDENTIALS}" | jq -r ".roleCredentials.secretAccessKey")" export AWS_SESSION_TOKEN="$(echo "${ROLE_CREDENTIALS}" | jq -r ".roleCredentials.sessionToken")" ``` -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: github-unsubscr...@arrow.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org