-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
S3 binary cache: support assumed roles #4748
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
As a workaround, the bucket policy can allow IAM users in other accounts to access it. |
Ugh, I just discovered this issue today myself. We've been configuring our EC2 NixOS instances to use IAM auth to assume a role that can read our private S3 Nix binary cache, and all this time I thought it was working.... At the very least, the docs should be updated to mention this limitation. |
I marked this as stale due to inactivity. → More info |
Still relevant, and you're still annoying. |
I tried wiring the |
Has there been any developments on this issue? |
Is your feature request related to a problem? Please describe.
It is not currently possible to use a private S3 binary cache with an assumed IAM role, because
STSProfileCredentialsProvider
is not in the default credentials resolution chain.Describe the solution you'd like
Given a profile in
.aws/config
that setsrole_arn
andsource_profile
in a profilefoo
, haves3://bucket?profile=foo
perform ansts:AssumeRole
call instead of failing withAccess Denied
.Describe alternatives you've considered
A workaround is to create a new key pair in the account holding the bucket, but that means creating and managing more sets of credentials.
The text was updated successfully, but these errors were encountered: