-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Access denied when using ECS task IAM role #1309
Comments
The default credential provider chain forks between the ECS Credential Provider and the EC2 Credential Provider. If putting credentials on the instance fixed the issue, my suspicion is that the ENV variable isn't present in the container. Can you double check that the credential provider feature flag is on?
|
How would I make sure that the flag is on? Is that something I would configure from the AWS console, or would it be in my Ruby code? |
The SDK is looking for the |
Did this resolve your issue, or does the issue persist? |
Yes, it did. Thanks! |
I'm using the sdk to interact with s3. I have my application running in a container on ECS. When I assign an IAM role directly to the task that my ruby app is running on, it fails to detect the credentials and I get an access denied whenever I try to use the s3 client. It works fine when I bind the role to the EC2 instance that it's running on.
The text was updated successfully, but these errors were encountered: