You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The updated approach adheres to AWS SDK v3's modular and secure design, improving compatibility with advanced credential management techniques and security best practices.
318
+
# Migration Guide from 3.x to 4.x
319
+
320
+
Due to the deprecation of the AWS SDK v2, Parse Server S3 Adapter 4.x adopts the AWS SDK v3. When upgrading from Parse Server S3 Adapter 3.x to 4.x, consider that S3 credentials are passed differently:
321
+
322
+
*Parse Server S3 Adapter 3.x:*
323
+
324
+
```js
325
+
constoptions= {
326
+
bucket:'<AWS_S3_BUCKET>',
327
+
s3overrides: {
328
+
accessKeyId:'<AWS_ACCESS_KEY>',
329
+
secretAccessKey:'<AWS_SECRET_KEY>'
330
+
}
331
+
};
332
+
```
333
+
334
+
*Parse Server S3 Adapter 4.x:*
335
+
336
+
```js
337
+
constoptions= {
338
+
bucket:'<AWS_S3_BUCKET>',
339
+
s3overrides: {
340
+
credentials: {
341
+
accessKeyId:'<AWS_ACCESS_KEY>',
342
+
secretAccessKey:'<AWS_SECRET_KEY>'
343
+
}
344
+
}
345
+
};
346
+
```
347
+
348
+
Alternatively, the credentials can be set on the root object:
349
+
350
+
```js
351
+
constoptions= {
352
+
bucket:'<AWS_S3_BUCKET>',
353
+
credentials: {
354
+
accessKeyId:'<AWS_ACCESS_KEY>',
355
+
secretAccessKey:'<AWS_SECRET_KEY>'
356
+
}
357
+
};
358
+
```
359
+
360
+
> [!NOTE]
361
+
> It is best practice to not store credentials as environment variables, as they can be easily retrieved on a compromised machine. For Parse Server running in an AWS environment, use more secure alternatives like AWS Secrets Manager, or AWS Credential Identity Provider to access shared credentials:
0 commit comments