-
Notifications
You must be signed in to change notification settings - Fork 28
Description
When a DCS server is hosted in AWS, it is possible to attach an IAM Instance Profile (a IAM role) to the EC2 instance, That role can be granted permissions to do things in AWS. This allows AWS SDK calls to be made without specifying credentials in code/configs.
What happens behind the scenes is that the AWS SDK client uses the the EC2 Instance Metadata Service to pull in temporary creds for the session. In that case, you don't need to put IAM Access keys into the AWS SDK client. See https://docs.aws.amazon.com/sdk-for-rust/latest/dg/credentials.html
In the DCS-gRPC aws.rs
code, it looks like we ALWAYS expect AWS credentials to be present.
https://github.com/DCS-gRPC/rust-server/blob/e91b9064f91277abd875b90f0562cd300647c6c1/tts/src/aws.rs#L7C12-L15
This is unnecessary in cases where the DCS server is hosted in AWS and actually less secure.
This issue is a request to allow the AWS tts service to use credentials discovered by sdk client.