Skip to content

Conversation

opottone
Copy link

Description

Getting security credentials from Instance Metadata Service fails when an EC2 instance does not have permissions to assume a role. When that happens, we get a very unhelpful error message Value cannot be null. (Parameter 'awsAccessKeyId') Do response validation so that we get better exception message.

See also aws/aws-cli#2060

Motivation and Context

Testing

Screenshots (if appropriate)

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to change)

Checklist

  • My code follows the code style of this project
  • My change requires a change to the documentation
  • I have updated the documentation accordingly
  • I have read the README document
  • I have added tests to cover my changes
  • All new and existing tests passed

License

  • I confirm that this pull request can be released under the Apache 2 license

Getting security credentials from Instance Metadata Service fails
when an EC2 instance does not have permissions to assume a role.
When that happens, we get a very unhelpful error message
"Value cannot be null. (Parameter 'awsAccessKeyId')"
Do response validation so that we get better exception message.

See also aws/aws-cli#2060
@dscpinheiro dscpinheiro changed the base branch from main to main-staging February 28, 2024 11:57
@bhoradc bhoradc requested a review from normj March 1, 2024 17:29
@ashishdhingra
Copy link
Contributor

The change needs to be tested in all compute environments (like EC2, ECS, EKS, etc.).

@ashishdhingra ashishdhingra self-requested a review March 6, 2025 17:29
@ashishdhingra
Copy link
Contributor

Reviewed the PR with the team. The unit tests are broken and dry run is failing. This needs to be reworked internally.

@dscpinheiro
Copy link
Contributor

I'm going to close this PR as Ashish mentioned there are some tests that are broken with this change.

We're also currently working on other IMDS changes, and we'll re-evaluate whether the fix can be included there.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants