aboutsummaryrefslogtreecommitdiffstats
path: root/routers/web/org/home.go
diff options
context:
space:
mode:
authorMichael Owoc <130198442+mowoc-ocp@users.noreply.github.com>2024-11-22 15:12:06 -0500
committerGitHub <noreply@github.com>2024-11-22 20:12:06 +0000
commit713364fc718d1d53840bd83ba6f6c307bd213fa8 (patch)
tree7ac042cdf7743ed5152b326a24028aaba260a309 /routers/web/org/home.go
parentf2a995174101b9fa9409acb2b47b065262098b28 (diff)
downloadgitea-713364fc718d1d53840bd83ba6f6c307bd213fa8.tar.gz
gitea-713364fc718d1d53840bd83ba6f6c307bd213fa8.zip
Support optional/configurable IAMEndpoint for Minio Client (#32581) (#32581)
Targeting issue #32271 This modification allows native Kubernetes + AWS (EKS) authentication with the Minio client, to Amazon S3 using the IRSA role assigned to a Service account by replacing the hard coded reference to the `DefaultIAMRoleEndpoint` with an optional configurable endpoint. Internally, Minio's `credentials.IAM` provider implements a discovery flow for IAM Endpoints if it is not set. For backwards compatibility: - We have added a configuration mechanism for an `IamEndpoint` to retain the unit test safety in `minio_test.go`. - We believe existing clients will continue to function the same without needing to provide a new config property since the internals of Minio client also often resolve to the `http://169.254.169.254` default endpoint that was being hard coded before To test, we were able to build a docker image from source and, observe it choosing the expected IAM endpoint, and see files uploaded via the client.
Diffstat (limited to 'routers/web/org/home.go')
0 files changed, 0 insertions, 0 deletions