-
-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ec2:DescribeRegions used even when region is specified #387
Comments
I found the --default-region flag now it works: |
It's part of the bootstrap and discovery of the account prior to doing the initial run. I've never heard of blocking that call before, that's strange, it won't prevent you from using another region on it's own. It is part of an automatic region discovery feature. |
Since using the --default-region flag prevents this blocked call and this seems to be very specific to my organisation I'm content and I close the issue. |
That's interesting. @Hermain it seems that perhaps the DescribeRegions is only blocked in specific regions in your accounts as --default-region would have no impact on whether or not DescribeRegions is called or not, but I'm glad that you have it working. I do think though that I should make it so that we only call that API if |
My company denies ec2:DescribeRegions probably in an effort to prevent us from using any other region than the default one.
Now when I run aws-nuke (v3.27.0) with a config like this:
I get the following error:
FATA[0001] failed to get regions: UnauthorizedOperation: You are not authorized to perform this operation. User: ----- is not authorized to perform: ec2:DescribeRegions with an explicit deny in a service control policy
Why is describe regions even executed and why ec2 when I only include buckets?
Is there any way around this?
The text was updated successfully, but these errors were encountered: