-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add aws_use_instance_role flag #309
Conversation
Signed-off-by: James Relph <[email protected]>
Signed-off-by: James Relph <[email protected]>
Signed-off-by: James Relph <[email protected]>
Signed-off-by: James Relph <[email protected]>
Signed-off-by: James Relph <[email protected]>
Signed-off-by: James Relph <[email protected]>
Signed-off-by: James Relph <[email protected]>
Thanks for the PR. Please refer to #287 (comment). |
Sorry, had chance to read up properly now and can see the issue with the versioning of resources. It's probably pushed me in another direction with how to solve this (I think if we wanted to move Concourse to Kubernetes this would stand as a blocker given k2iam/more team-scoped workers but given we're using EC2 directly instance roles were relatively coarse, so alternatives had upsides) |
779ef34
to
09bdeda
Compare
Closing this issue and it won't be merged |
This is in relation to the bug discussed here: #277
The current default behaviour doesn't allow EC2 IAM Roles to be assumed directly, I have added an aws_use_instance_role flag which - when set to true alongside the instance name - ignores other cred settings when authenticating with ECR to allow the instance role to be assumed.