-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Assume Role doesn't work as expected #86
Comments
yep, i am experiencing similar issues as well. my error is |
Same here. This issue started occurring very recently. even for me. my error is |
Have the same issue as well. Did someone find a workaround ? |
As far as I remember, on Jenkins side you have to provide IAM user credentials (SK/AK). The IAM Policy attached to this user has to allow assumeRole action. Do not configure assume role on Jenkins Then configure assumeRole in Jenkinsfile like this:
Where: It's not perfect because developers can change something but it works. |
hello @tomasz-bres What was not clear to me is the ability to specify an IAM ROLE in the AWS credentials ; not configuring it and specify the role in the steps works well. |
I encountered what may be a related issue recently. tl;dr; - You cannot use an AWS Credential with a Role ARN set with the withAWS pipeline step. I created an AWS Credential with a Role ARN and attempted to use the credential in my pipeline via the |
I have credentials configured to use IAM Role.
IAM Role To Use is provided as full ARN (i.e arn:aws:iam::account-id:role/role-name)
The error I have
com.amazonaws.services.s3.model.AmazonS3Exception: The AWS Access Key Id you provided does not exist in our records. (Service: Amazon S3; Status Code: 403; Error Code: InvalidAccessKeyId; Request ID:
I checked user and role configuration with AWS CLI - it's working as expected (I'm able to use assumed role with CLI)
aws-credentials-plugin version: 1.28.1
The text was updated successfully, but these errors were encountered: