Skip to content

Commit 8c67a52

Browse files
authored
SPEC-1668 conflicting requirements for AWS creds (#880)
1 parent 07790d1 commit 8c67a52

File tree

1 file changed

+8
-3
lines changed

1 file changed

+8
-3
lines changed

source/auth/auth.rst

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -918,10 +918,12 @@ MUST use these for the AWS IAM access key and AWS IAM secret key, respectively.
918918

919919
The order in which Drivers MUST search for credentials is:
920920

921-
#. Credentials passed through the URI
921+
#. The URI
922922
#. Environment variables
923-
#. ECS endpoint if and only if ``AWS_CONTAINER_CREDENTIALS_RELATIVE_URI`` is set.
924-
#. EC2 endpoint
923+
#. The ECS endpoint if ``AWS_CONTAINER_CREDENTIALS_RELATIVE_URI`` is set. Otherwise, the EC2 endpoint.
924+
925+
.. note::
926+
See *Should drivers support accessing Amazon EC2 instance metadata in Amazon ECS* in `Q & A`_
925927

926928
URI
927929
___
@@ -1251,6 +1253,9 @@ Q: Why does SCRAM sometimes SASLprep and sometimes not?
12511253
problem, MongoDB decided that the best user experience on upgrade and
12521254
lowest technical risk of implementation is to require drivers to continue
12531255
to not SASLprep usernames in SCRAM-SHA-256.
1256+
1257+
Q: Should drivers support accessing Amazon EC2 instance metadata in Amazon ECS?
1258+
No. While it's possible to allow access to EC2 instance metadata in ECS, for security reasons, Amazon states it's best practice to avoid this. (See `accessing EC2 metadata in ECS <https://aws.amazon.com/premiumsupport/knowledge-center/ecs-container-ec2-metadata/>`_ and `IAM Roles for Tasks <https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-iam-roles.html>`_)
12541259

12551260
Version History
12561261
===============

0 commit comments

Comments
 (0)