-
Notifications
You must be signed in to change notification settings - Fork 127
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for eu-central-1 and IAM role authentication #97
Comments
I recall implementing AWS V4 signatures. Please try adding --AWS4 to the command line. I don't recall if the support is for all AWS products. |
Sorry, no, that doesn't work:
|
I just updated the code with support for Signature Version 4 across almost all other services. (S3 was already supported. Now EC2, etc.) Feedback, please. To use, add --AWS4 to all commands or in your ~/.awsrc file. Should it become the default? |
Hi @timkay I am not sure if I am doing something wrong, but I downloaded the latest version and tried it with
Am I doing something wrong? When I remove |
Hmmm. Works for me: ./aws describe-tags --region eu-central-1 --AWS4f9b4a3b4-cb79-4cfa-be74-cfff9d6379fbPlease send the output with -vv (two v's). |
Here is the output
|
@timkay Note I am running this command from an instance in eu-central-1 region. |
I modified my ~.awssecret file to contain an invalid key, and I got aws describe-tags --region eu-central-1 --AWS4+-------------+--------------------------------------------------------------+ You do need new keys for each new region. Please take a look at the ...Tim On Tue, Jul 14, 2015 at 2:13 AM, mattheworiordan [email protected]
Tim Kay |
I am only using IAM authentication though, and the command works with the Amazon |
Yes, but the credentials are stored in a different place. Make sure you
|
Sorry @timkay I am not following you. We never store any credentials on the instance themselves and rely entirely on IAM |
Do you mean IAM role attached to the instance? |
Yes, we use CloudFormation and IAM assigned to the instance Sent from my phone
|
I hadn't realized that you are using role-based authentication. In that
case, you have to add --role. However, then we get a different error, which
I am working on now.
|
has something to do with this, but i'm not sure how to fix... "For Developers – Signature Version 4 Support |
I believe there has been a protocol change for IAM auth that is required in eu-central-1 that is incompatible with the current version of
aws
. See below:This command works fine for other regions, and works with the official AWS cli tool.
The text was updated successfully, but these errors were encountered: