You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have Concourse setup in an Amazon EKS (k8s) cluster. The cluster has an IAM role that provides it to access a restricted set of resources needed to maintain the cluster.
Concourse is additionally seeded with a specific Concourse IAM user (via secret_access_key and access_key_id) that has access to ECR.
When I use that IAM user to push to ECR, I get a denied and not authorized to perform error. Weirdly, the role the error message references is the assumed IAM role of the cluster, and not the Concourse user of the secret_access_key and access_key_id that I passed to the docker-image resource.
Successfully tagged <IMAGE_NAME>
18:13:35
The push refers to repository [<ECR_REPO_URL_HERE]
18:13:35
82dcad63e746: Preparing
18:13:35
a4c502aa9e69: Preparing
18:13:35
8137f1ad3edc: Preparing
18:13:35
beee9f30bc1f: Preparing
18:13:35
beee9f30bc1f: Waiting
18:13:35
denied: User: arn:aws:sts::<some-assumed-cluster-role> is not authorized to perform: ecr:InitiateLayerUpload on resource: arn:aws:ecr:us-west-2:<ECR_REPO_URL>
The text was updated successfully, but these errors were encountered:
christopher-wong
changed the title
Permission issues when pushing to AWS ECR
docker-image resource not using provided AWS creds, assuming IAM role instead
Apr 6, 2020
christopher-wong
changed the title
docker-image resource not using provided AWS creds, assuming IAM role instead
Push to ECR ignoring provided AWS creds, assuming IAM role instead
Apr 6, 2020
I have Concourse setup in an Amazon EKS (k8s) cluster. The cluster has an IAM role that provides it to access a restricted set of resources needed to maintain the cluster.
Concourse is additionally seeded with a specific Concourse IAM user (via
secret_access_key
andaccess_key_id
) that has access to ECR.When I use that IAM user to push to ECR, I get a
denied
andnot authorized to perform
error. Weirdly, the role the error message references is the assumed IAM role of the cluster, and not the Concourse user of thesecret_access_key
andaccess_key_id
that I passed to thedocker-image
resource.My resource configuration:
I get the following output:
The text was updated successfully, but these errors were encountered: