-
Notifications
You must be signed in to change notification settings - Fork 826
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[v2-feedback] Issue when AWS Profile unable to run amplify init #3922
Comments
@kaustavghosh06 - do you know what's going on here? Should we transfer this to the CLI repo? |
Could you elaborate on "create an AWS Profile under our corporate federation"? Does the IAM user that the profile's credential is associated with have all the required permissions for the Amplify CLI? Is it a temp credential? do you use a role? |
Hi @UnleashedMind , thanks for your patience. Our internal tool is aware of the profiles and configuration in And that role contain this policy. Therefore I assume it would work for Amplify. But this is what I see when running
More detail about how our internal tool work: We have a CLI tool that make a call to a token service, then the token service assumes an IAM Role on behalf of an authenticated user and returns back AWS temporary security credentials. We do this via a SSO provider (Okta AWS OIDC). Our tool was inspired by https://github.com/segmentio/aws-okta, and leverage https://github.com/99designs/aws-vault to store IAM credentials. We have not observe other limitation with AWS CLI when authenticate with AWS with this tool. Any pointer is appreciated! |
Hi @UnleashedMind, we face the same problem after introduce AWS SSO for our developers. If you need more input to reproduce the problem: Within AWS Organizations we have e.g.: IAM (from root/admin account): So far this shouldn't be relevant, just want to give you a complete overview. AWS SSO Configuration: I can login with such a user over the SSO portal and can also retrieve my credentials over the button "Command line or programmatic access" But if I want to work with AWS SSO like it is meant to be (https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html) it doesn't work! ..more specifically: $ aws configure sso # introduce a new profile and also set this new account as the default The same problem for another amplify project which is already pushed: Current Environment: dev
⠹ Fetching updates to backend environment: dev from the cloud.(node:32580) UnhandledPromiseRejectionWarning: InvalidAccessKeyId: The AWS Access Key Id you provided does not exist in our records. |
@jimcal Are you using AWS SSO as well. As a workaround could you try out this recommendation out here - #4488 (comment) ? |
This issue has been automatically closed because of inactivity. Please open a new issue if you are still encountering problems. |
This issue has been automatically locked since there hasn't been any recent activity after it was closed. Please open a new issue for related bugs. Looking for a help forum? We recommend joining the Amplify Community Discord server |
Page:
https://docs.amplify.aws/start/getting-started/setup?integration=js
Feedback:
Was trying to create an AWS Profile under our corporate federation. Seems that by using accessKeyId and secretAccessKey to setup the profile is no longer enough.
Here is the exception I get:
The text was updated successfully, but these errors were encountered: