-
Notifications
You must be signed in to change notification settings - Fork 1
Description
First, thank you for this work. We'd like to use it to eliminate needing to manually manage and rotate mysql passwords when in the AWS environment.
I'm concerned that because a new password token is generated on every point of need, that we will run into the AWS 200-per-second rate limit for our production uses, which will spin up dozens of ECS instances, each with upwards of 100 connections. This concern would be alleviated if password tokens were cached and reused until expiry, which is what Amazon recommends.
I opened a similar feature request with the haines/pg-aws_rds_iam project, who implemented token caching and reuse. Since this project was inspired by the pg project, could something similar be added to this gem to cache and reuse tokens until expiry.
Full disclosure: I took a stab at adding IAM support directly in the mysql2 gem.. Upstream maintainers haven't commented on it, and like the pg maintainer, may not want AWS-specific code in the gem like this, hence being in a gem as you have may be deemed the best approach.