mirror of
https://github.com/open-webui/open-webui.git
synced 2026-05-08 12:58:11 -05:00
[PR #10910] [MERGED] feat: add AWS workload identity support #22617
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/open-webui/open-webui/pull/10910
Author: @saraangelmurphy
Created: 2/27/2025
Status: ✅ Merged
Merged: 2/27/2025
Merged by: @tjbck
Base:
dev← Head:awsworkloadidentity📝 Commits (2)
15485e7Merge pull request #10469 from open-webui/dev5e873bcfeat: add AWS workload identity support📊 Changes
2 files changed (+37 additions, -12 deletions)
View changed files
📝
backend/open_webui/storage/provider.py(+26 -12)📝
backend/open_webui/test/apps/webui/storage/test_provider.py(+11 -0)📄 Description
Pull Request Checklist
Note to first-time contributors: Please open a discussion post in Discussions and describe your changes before submitting a pull request.
Before submitting, make sure you've checked the following:
devbranch.Changelog Entry
Description
This PR adds support for authenticating to AWS S3 buckets without explicitly setting
S3_ACCESS_KEY_IDandS3_SECRET_ACCESS_KEYenvironment variables. The S3StorageProvider now falls back to the AWS default credential provider chain when explicit credentials are not provided, enabling workload identity support for AWS services.This enhancement allows Open WebUI to authenticate to S3 using:
This change also aligns the S3StorageProvider with the existing workload identity support already present in the Azure and GCP storage providers.
Added
Changed
Deprecated
Removed
Fixed
Security
Breaking Changes
Additional Information
This change enables Open WebUI to support workload identity across all major cloud providers (AWS, Azure, GCP). It also avoids the need for static credentials in production environments, which is prohibited by many corporate security teams.
For local development, users can continue to use explicit credentials, or leverage their existing AWS CLI credentials.
Screenshots or Videos
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.