Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error when specifying a different profile #29

Open
masonbivens opened this issue Sep 10, 2020 · 3 comments
Open

Error when specifying a different profile #29

masonbivens opened this issue Sep 10, 2020 · 3 comments

Comments

@masonbivens
Copy link

I'm receiving the following error when I attempt to specify an assumed role profile instead of the default credentials

➜ awstaghelper_0.15.0_Darwin_x86_64 ./awstaghelper cloudwatch get-cwlog-tags -f cloudwatch_logs_tags_dev.csv -r us-west-2 -t Name,Product,Purpose,Env,Region -p dev
2020/09/10 12:18:17 Not able to get log groupsNoCredentialProviders: no valid providers in chain. Deprecated.
	For verbose messaging see aws.Config.CredentialsChainVerboseErrors
@mpostument
Copy link
Owner

Hello, please share how you assume role. I tested on assumed role with okta, and didn't get errors

@masonbivens
Copy link
Author

I'm utilizing the native AWS cross account assume role functionality, below is a sanitized version of the credentials and config file

[default]
aws_access_key_id=XXXXXXX
aws_secret_access_key=XXXXXXX
region = us-west-2

[ops]
aws_access_key_id=XXXXXXX
aws_secret_access_key=XXXXXXX
region = us-west-2

[sandbox]
role_arn = arn:aws:iam::XXXXXXXXX:role/foobar-sysops
source_profile = ops
mfa_serial = arn:aws:iam::XXXXXXXXX:mfa/mason.bivens
region = us-west-2

[dev]
role_arn = arn:aws:iam::XXXXXXXXX:role/foobar-sysops
source_profile = ops
mfa_serial = arn:aws:iam::XXXXXXXXX:mfa/mason.bivens
region = us-west-2

[uat]
role_arn = arn:aws:iam::XXXXXXXXX:role/foobar-sysops
source_profile = ops
mfa_serial = arn:aws:iam::XXXXXXXXX:mfa/mason.bivens
region = us-west-2

[prod]
role_arn = arn:aws:iam::XXXXXXXXX:role/foobar-sysops
source_profile = ops
mfa_serial = arn:aws:iam::XXXXXXXXX:mfa/mason.bivens
region = us-west-2
[profile default]
cli_pager=
region = us-west-2

[profile ops]
cli_pager=
region = us-west-2

[profile sandbox]
cli_pager=
role_arn = arn:aws:iam::XXXXXXXX:role/foobar-sysops
source_profile = ops
mfa_serial = arn:aws:iam::XXXXXXXX:mfa/mason.bivens
region = us-west-2

[profile dev]
cli_pager=
role_arn = arn:aws:iam::XXXXXXXX:role/foobar-sysops
source_profile = ops
mfa_serial = arn:aws:iam::XXXXXXXX:mfa/mason.bivens
region = us-west-2

[profile uat]
cli_pager=
role_arn = arn:aws:iam::XXXXXXXX:role/foobar-sysops
source_profile = ops
mfa_serial = arn:aws:iam::XXXXXXXX:mfa/mason.bivens
region = us-west-2

[profile prod]
cli_pager=
role_arn = arn:aws:iam::XXXXXXXX:role/foobar-sysops
source_profile = ops
mfa_serial = arn:aws:iam::XXXXXXXX:mfa/mason.bivens
region = us-west-2

@mpostument
Copy link
Owner

An assumed role not supported right now. I will work to add support

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants