You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
We are migrating workloads to EKS - in particular Github Actions runners. The runner scalesets run as service accounts wired up to AWS EKS Pod Identities. We run v2 of the action and receive the following error:
Run aws-actions/amazon-ecr-login@v2
with:
mask-password: true
registry-type: private
skip-logout: false
Error: 169.254.170.23 is not a valid container metadata service hostname
To Reproduce
Create a test action that uses amazon-ecr-login in a pod/runner running in EKS and a service account identity.
Expected behavior
The action discovers the creds mounted in the metadata path and uses them to authenticate with ECR.
Screenshots
No screenshots but we confirmed that raw aws sts commands are returning the correct assumed role that we'd expect.
Desktop (please complete the following information):
EKS 1.29
Running 0.9.0 version of github action runner container and helm chart.
The text was updated successfully, but these errors were encountered:
Describe the bug
We are migrating workloads to EKS - in particular Github Actions runners. The runner scalesets run as service accounts wired up to AWS EKS Pod Identities. We run v2 of the action and receive the following error:
To Reproduce
Create a test action that uses
amazon-ecr-login
in a pod/runner running in EKS and a service account identity.Expected behavior
The action discovers the creds mounted in the metadata path and uses them to authenticate with ECR.
Screenshots
No screenshots but we confirmed that raw
aws sts
commands are returning the correct assumed role that we'd expect.Desktop (please complete the following information):
EKS 1.29
Running 0.9.0 version of github action runner container and helm chart.
The text was updated successfully, but these errors were encountered: