-
-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please support Cognito authentication using roles #11
Comments
This also does not work from a EC2 instance that has an instance profile assigned and therefore straight access to AWS. Why are you forcing the This is the error I got:
|
This is actually very easy to fix. Somebody already done that I have his commit in my own fork of this repo. What's missing before it's final is to make some type of parameter to switch to this behavior |
Can you please try using v1.3.1 and let me know if this is fixed? |
I am trying v1.3.2 but it is still looking in .aws/credentials even when I give it a profile from .aws/config which has a role. I am trying But it comes back asking for my AWS profile and offering the 2 I have in .aws/credential Am I doing something wrong ? |
I have this exact same issue with v1.3.2. I have an .aws/credentials file and an .aws/config file with the role. It keeps prompting me for the 2 entries I have in .aws/credential and ignores the profile name i passed in. Any resolution on this? |
It seems you only accept a key/password IAM credential. Using a role is a best practice. In the aws config file this is specified as follows (example from aws cli documentation):
[profile marketingadmin]
role_arn = arn:aws:iam::123456789012:role/marketingadminrole
credential_source = Ec2InstanceMetadata
The text was updated successfully, but these errors were encountered: