Skip to content

Feature request: reuse password tokens for their lifetime #3

@matt-domsch-sp

Description

@matt-domsch-sp

First, thank you for this work. We'd like to use it to eliminate needing to manually manage and rotate mysql passwords when in the AWS environment.

I'm concerned that because a new password token is generated on every point of need, that we will run into the AWS 200-per-second rate limit for our production uses, which will spin up dozens of ECS instances, each with upwards of 100 connections. This concern would be alleviated if password tokens were cached and reused until expiry, which is what Amazon recommends.

I opened a similar feature request with the haines/pg-aws_rds_iam project, who implemented token caching and reuse. Since this project was inspired by the pg project, could something similar be added to this gem to cache and reuse tokens until expiry.

Full disclosure: I took a stab at adding IAM support directly in the mysql2 gem.. Upstream maintainers haven't commented on it, and like the pg maintainer, may not want AWS-specific code in the gem like this, hence being in a gem as you have may be deemed the best approach.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions