Skip to content

AWS Credential Fallback to EC2 Instance Profile #1094

@Kellen275

Description

@Kellen275

My Workflow

Using Helmfile (v0.167.1 and v1.3.2), I have the following AWS SecretsManager vals ref:

mysecret: ref+awssecrets://mysecret?profile=dev

I have 2 types of users

  1. Uses helmfile on a non-EC2 instance. They have a configured ~/.aws/config with the dev profile.
  2. Uses helmfile on an EC2 instance. They do not have ~/.aws/config,and instead rely on their instance's IAM role.

Problem

I recently upgraded from Helmfile v0.167.1 (vals v0.37.3) to v1.3.2 (vals v0.43.5). Suddenly my EC2-based users could no longer template/sync their helmfiles, since the dev profile isn't defined on their machines

panic: failed to get shared config profile, dev

With the older version, it appears that it would automatically fall back to the instance's ambient credentials if the specified profile could not be found. Is there a method to achieve this same behavior in newer versions?

One work around I'm aware of is that my EC2 users can define an empty dev profile by creating an ~/.aws/config with

[profile dev]

However, it would be nice to avoid requiring my users to change their local environments.

Metadata

Metadata

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions