Skip to main content
Archived

Harmonize access key settings of SQS and S3 transformers

Related products:Transformers
siennaatsafe
geosander
  • siennaatsafe
    siennaatsafe
  • geosander
    geosander

geosander

Currently, you need to specify a "hard-coded" AccessKeyId and SecretAccessKey for the SQSReceiver/Sender/Deleter/MessageCounter, or you can set it through a Public/Private Parameter.In the S3Downloader/Uploader/Deleter/ObjectLister, you can omit these values and get them through a file, Java system properties or environment variables. I think it would be nice if this behavior is consistent among these AWS transformers.

This post is closed to further activity.
It may be a question with a best answer, an implemented idea, or just a post needing no comment.
If you have a follow-up or related question, please post a new question or idea.
If there is a genuine update to be made, please contact us and request that the post is reopened.

2 replies

donatsafe
Safer
Forum|alt.badge.img
  • Safer
  • December 15, 2015

Great one Sander. Consistency. Sorry we missed that. I will create a PR!


geosander
Forum|alt.badge.img+7
  • Author
  • January 20, 2016

Any news on when the PR is due, @donatsafe?

 

We are now using IAM Roles on our EC2 instances. This works perfectly with the S3 transformers. Would be nice if the SQS transformers picked up the credentials from the IAM Role as well! Same goes for SQS publications/subscriptions on FME Server, by the way.

 

Now I am implementing some Boto solution, because we don't want to pass credentials as parameters to a workspace.

Thanks! :)


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings