You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: agent/credentials/instancecreds/instancecreds_linux.go
+4-4
Original file line number
Diff line number
Diff line change
@@ -25,10 +25,10 @@ import (
25
25
// GetCredentials returns the instance credentials chain. This is the default chain
26
26
// credentials plus the "rotating shared credentials provider", so credentials will
27
27
// be checked in this order:
28
-
// 1. Env vars (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY).
29
-
// 2. Shared credentials file (https://docs.aws.amazon.com/ses/latest/DeveloperGuide/create-shared-credentials-file.html) (file at ~/.aws/credentials containing access key id and secret access key).
30
-
// 3. EC2 role credentials. This is an IAM role that the user specifies when they launch their EC2 container instance (ie ecsInstanceRole (https://docs.aws.amazon.com/AmazonECS/latest/developerguide/instance_IAM_role.html)).
31
-
// 4. Rotating shared credentials file located at /rotatingcreds/credentials
28
+
// 1. Env vars (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY).
29
+
// 2. Shared credentials file (https://docs.aws.amazon.com/ses/latest/DeveloperGuide/create-shared-credentials-file.html) (file at ~/.aws/credentials containing access key id and secret access key).
30
+
// 3. EC2 role credentials. This is an IAM role that the user specifies when they launch their EC2 container instance (ie ecsInstanceRole (https://docs.aws.amazon.com/AmazonECS/latest/developerguide/instance_IAM_role.html)).
31
+
// 4. Rotating shared credentials file located at /rotatingcreds/credentials
Copy file name to clipboardExpand all lines: agent/credentials/instancecreds/instancecreds_unsupported.go
+4-4
Original file line number
Diff line number
Diff line change
@@ -23,10 +23,10 @@ import (
23
23
// GetCredentials returns the instance credentials chain. This is the default chain
24
24
// credentials plus the "rotating shared credentials provider", so credentials will
25
25
// be checked in this order:
26
-
// 1. Env vars (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY).
27
-
// 2. Shared credentials file (https://docs.aws.amazon.com/ses/latest/DeveloperGuide/create-shared-credentials-file.html) (file at ~/.aws/credentials containing access key id and secret access key).
28
-
// 3. EC2 role credentials. This is an IAM role that the user specifies when they launch their EC2 container instance (ie ecsInstanceRole (https://docs.aws.amazon.com/AmazonECS/latest/developerguide/instance_IAM_role.html)).
29
-
// 4. Rotating shared credentials file located at /rotatingcreds/credentials
26
+
// 1. Env vars (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY).
27
+
// 2. Shared credentials file (https://docs.aws.amazon.com/ses/latest/DeveloperGuide/create-shared-credentials-file.html) (file at ~/.aws/credentials containing access key id and secret access key).
28
+
// 3. EC2 role credentials. This is an IAM role that the user specifies when they launch their EC2 container instance (ie ecsInstanceRole (https://docs.aws.amazon.com/AmazonECS/latest/developerguide/instance_IAM_role.html)).
29
+
// 4. Rotating shared credentials file located at /rotatingcreds/credentials
Copy file name to clipboardExpand all lines: agent/credentials/instancecreds/instancecreds_windows.go
+17-13
Original file line number
Diff line number
Diff line change
@@ -25,21 +25,25 @@ import (
25
25
// GetCredentials returns the instance credentials chain. This is the default chain
26
26
// credentials plus the "rotating shared credentials provider", so credentials will
27
27
// be checked in this order:
28
-
// 1. Env vars (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY).
29
-
// 2. Shared credentials file (https://docs.aws.amazon.com/ses/latest/DeveloperGuide/create-shared-credentials-file.html) (file at ~/.aws/credentials containing access key id and secret access key).
30
-
// 3. EC2 role credentials. This is an IAM role that the user specifies when they launch their EC2 container instance (ie ecsInstanceRole (https://docs.aws.amazon.com/AmazonECS/latest/developerguide/instance_IAM_role.html)).
31
-
// 4. Rotating shared credentials file located at /rotatingcreds/credentials
32
28
//
33
-
// The default credential chain provided by the SDK includes:
34
-
// * EnvProvider
35
-
// * SharedCredentialsProvider
36
-
// * RemoteCredProvider (EC2RoleProvider)
29
+
// 1. Env vars (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY).
37
30
//
38
-
// In the case of ECS-A on Windows, the `SharedCredentialsProvider` takes
39
-
// precedence over the `RotatingSharedCredentialsProvider` and this results
40
-
// in the credentials not being refreshed. To mitigate this issue, we will
41
-
// reorder the credential chain and ensure that `RotatingSharedCredentialsProvider`
42
-
// takes precedence over the `SharedCredentialsProvider` for ECS-A.
31
+
// 2. Shared credentials file (https://docs.aws.amazon.com/ses/latest/DeveloperGuide/create-shared-credentials-file.html) (file at ~/.aws/credentials containing access key id and secret access key).
32
+
//
33
+
// 3. EC2 role credentials. This is an IAM role that the user specifies when they launch their EC2 container instance (ie ecsInstanceRole (https://docs.aws.amazon.com/AmazonECS/latest/developerguide/instance_IAM_role.html)).
34
+
//
35
+
// 4. Rotating shared credentials file located at /rotatingcreds/credentials
36
+
//
37
+
// The default credential chain provided by the SDK includes:
38
+
// * EnvProvider
39
+
// * SharedCredentialsProvider
40
+
// * RemoteCredProvider (EC2RoleProvider)
41
+
//
42
+
// In the case of ECS-A on Windows, the `SharedCredentialsProvider` takes
43
+
// precedence over the `RotatingSharedCredentialsProvider` and this results
44
+
// in the credentials not being refreshed. To mitigate this issue, we will
45
+
// reorder the credential chain and ensure that `RotatingSharedCredentialsProvider`
46
+
// takes precedence over the `SharedCredentialsProvider` for ECS-A.
Copy file name to clipboardExpand all lines: agent/dockerclient/dockerauth/doc.go
+4-3
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@
15
15
Package dockerauth handles storing auth configuration information for Docker
16
16
registries.
17
17
18
-
Usage
18
+
# Usage
19
19
20
20
This package pulls authentication information from the passed configuration.
21
21
A user should set the "EngineAuthType" and "EngineAuthData" configuration
@@ -24,7 +24,7 @@ keys to values indicated below.
24
24
These keys may be set by either setting the environment variables
25
25
"ECS_ENGINE_AUTH_TYPE" and "ECS_ENGINE_AUTH_DATA" or by setting the keys "EngineAuthData" and "EngineAuthType" in the JSON configuration file located at the configured "ECS_AGENT_CONFIG_FILE_PATH" (see http://godoc.org/github.com/aws/amazon-ecs-agent/agent/config)
26
26
27
-
Auth Types
27
+
# Auth Types
28
28
29
29
The two currently supported auth types are "docker" and "dockercfg".
30
30
@@ -34,6 +34,7 @@ The auth type "docker" is intended to work most naturally with a JSON
34
34
configuration file. The "AuthData" is a structured JSON object which specifies
35
35
values for the docker "AuthConfig" structure. The "AuthData" should be an object
36
36
similar to the following:
37
+
37
38
{
38
39
"my.registry.example.com": {
39
40
"username": "myUsername",
@@ -46,13 +47,13 @@ similar to the following:
46
47
}
47
48
}
48
49
49
-
50
50
Dockercfg:
51
51
52
52
The auth type "dockercfg" is intended to allow easy use of an existing
53
53
".dockercfg" file generated by running "docker login". This auth type expects
54
54
the "AuthData" to be a string containing the contents of that file. The contents
55
55
of your ".dockercfg" will generally be a string of the following form:
0 commit comments