You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 8, 2024. It is now read-only.
Describe the bug
I'm using an AWS profile that's an assumed cross-organization role. When running waypoint build with AWS_PROFILE set to the profile for the role, waypoint build fails when trying to push the image to the ECR repo with the following error:
! NoCredentialProviders: no valid providers in chain. Deprecated.
For verbose messaging see aws.Config.CredentialsChainVerboseErrors
Waypoint is probably using version 1 of the AWS SDK for Go – have you tried setting AWS_SDK_LOAD_CONFIG=1 in your environment? Because I use so much Go stuff with AWS, I've put it in my .bash_profile.
Fixes#604
This enables loading ~/.aws/config for assumed role auth.
We should talk to the Terraform about making aws-sdk-go-base less
Terraform-specific so we can share it, since they've solved a lot more
problems that we're going to run into: https://github.com/hashicorp/aws-sdk-go-base
But for now, this will work.
Describe the bug
I'm using an AWS profile that's an assumed cross-organization role. When running
waypoint build
withAWS_PROFILE
set to the profile for the role,waypoint build
fails when trying to push the image to the ECR repo with the following error:Steps to Reproduce
With a second AWS organization, set up cross organization roles following this guide: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_cross-account-with-roles.html
Then configure the role for use with the CLI and use the
AWS_PROFILE
env variable to specify that URL.For example,
~/.aws/config
will contain the following:When running
AWS_PROFILE=otherprofile waypoint build
, it's unable to find credentials, though running otheraws
commands from the CLI works.FWIW, this setup is working with terraform.
Expected behavior
It works with the profile/credentials that are specified by
AWS_PROFILE
.The text was updated successfully, but these errors were encountered: