You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This product is continuously tested with the most recent releases of Node.js to ensure compatibility. We follow the [Node.js Long Term Support plan](https://github.com/nodejs/Release) and only test against versions that are officially supported and have not reached their end-of-life date.
58
+
Parse Server S3 Adapter is continuously tested with the most recent releases of Node.js to ensure compatibility. We follow the [Node.js Long Term Support plan](https://github.com/nodejs/Release) and only test against versions that are officially supported and have not reached their end-of-life date.
52
59
53
-
|Version | Latest Version | End-of-Life | Compatible |
Due to the deprecation of the AWS SDK v2, Parse Server S3 Adapter 4.x adopts the AWS SDK v3. When upgrading from Parse Server S3 Adapter 3.x to 4.x, consider that S3 credentials are passed differently:
321
+
322
+
*Parse Server S3 Adapter 3.x:*
323
+
324
+
```js
325
+
constoptions= {
326
+
bucket:'<AWS_S3_BUCKET>',
327
+
s3overrides: {
328
+
accessKeyId:'<AWS_ACCESS_KEY>',
329
+
secretAccessKey:'<AWS_SECRET_KEY>'
330
+
}
331
+
};
332
+
```
333
+
334
+
*Parse Server S3 Adapter 4.x:*
335
+
336
+
```js
337
+
constoptions= {
338
+
bucket:'<AWS_S3_BUCKET>',
339
+
s3overrides: {
340
+
credentials: {
341
+
accessKeyId:'<AWS_ACCESS_KEY>',
342
+
secretAccessKey:'<AWS_SECRET_KEY>'
343
+
}
344
+
}
345
+
};
346
+
```
347
+
348
+
Alternatively, the credentials can be set on the root object:
349
+
350
+
```js
351
+
constoptions= {
352
+
bucket:'<AWS_S3_BUCKET>',
353
+
credentials: {
354
+
accessKeyId:'<AWS_ACCESS_KEY>',
355
+
secretAccessKey:'<AWS_SECRET_KEY>'
356
+
}
357
+
};
358
+
```
359
+
360
+
> [!NOTE]
361
+
> It is best practice to not store credentials as environment variables, as they can be easily retrieved on a compromised machine. For Parse Server running in an AWS environment, use more secure alternatives like AWS Secrets Manager, or AWS Credential Identity Provider to access shared credentials:
0 commit comments