-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Guidelines for IAM/credentials for accessing S3? #151
Comments
You're running an EC2 instance? If you have aws.ec2metadata installed (you don't need to load it explicitly), then |
Yes running an EC2 instance. So I just tried launching a new instance with my IAM role and when I run
|
Do you aws.ec2metadata installed? |
Ok, so I messed up the install of |
Okay, that sounds like a bug. I'll investigate. In the meantime you can set an environment variable to override, or set |
@camrinbraun Can you try reinstalling aws.signature (from GitHub) using |
With the new installation of
|
Thanks. Can you also update aws.ec2metadata - |
That did it with the fresh installs of both |
and Thank you!!! |
Hi @leeper , I am basically trying to do the same thing as @camrinbraun, where previously I was using an access key and secret key, but now I am trying to move towards roles. I already have an IAM role assigned to the EC2 instance, and I know the role is there because the following works:
I am able to see the following when I run:
Session token is empty, and region would be "us-east-1" if I do not explicitly state otherwise. But when I try to access the bucket using the following command:
It doesn't work. I tried running get_bucket_df after this:
I know the role has been assigned because the following returns the name of the IAM role:
The packages were installed sometime in November 2017. Would appreciate the help in getting this up and running! Am I missing some argument for something? Still new to all this AWS stuff! Many thanks! |
Can you let me know if this is still happening with the latest version of aws.ec2metadata (0.1.5)? |
Hi @leeper , I'm using the aws.ec2metadata(0.1.5) and still seeing the same issue that @SheldonTsen reported. I'm doing the same kind of list that he is trying to do. Any help?
Matrix products: default locale: attached base packages: other attached packages: loaded via a namespace (and not attached): Thanks! |
aws.signature::locate_credentials() didn't work for me, Rather using aws.ec2metadata how can we assume iam role to access the s3 bucket? |
Same question - I want to assume the IAM role to access the S3 bucket |
Is there some documentation somewhere that shows exactly how to setup and use IAM roles in order to get permissions for reading/writing S3? I can manually set the credentials via
Then I can use
aws.s3
functionality just fine. But it's unclear to me howaws.s3
looks for my credentials automatically and would get them from the IAM role I've launched with. Do I need to specify the IAM role somehow fromaws.ec2metadata
before even loadingaws.s3
?The text was updated successfully, but these errors were encountered: