pulumi assume role aws
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Exception: invocation of aws:route53/getZone:getZone returned an error: 1 error occurred: | |
* error configuring Terraform AWS Provider: IAM Role (arn:aws:iam::XXXXXXXXXXXX:role/PulumiRoute53) cannot be assumed. | |
There are a number of possible causes of this - the most common are: | |
* The credentials used in order to assume the role are invalid | |
* The credentials do not have appropriate permission to assume the role | |
* The role ARN is not valid | |
Error: NoCredentialProviders: no valid providers in chain. Deprecated. | |
For verbose messaging see aws.Config.CredentialsChainVerboseErrors | |
error: an unhandled error occurred: Program exited with non-zero exit code: 1 | |
##### Provider ####### | |
dns_provider = Provider( | |
'route53_privileged', | |
assume_role={ | |
'role_arn': PULUMI_ROUTE53_ASSUME_ROLE_ARN, | |
'session_name': f'pulumi-{dt.utcnow().isoformat()}', | |
'externalId': 'Cyclope', | |
}, | |
region=PULUMI_ROUTE53_REGION, | |
) | |
######## Actual Code ############### | |
zone = route53.get_zone(name='my.domain.', opts=pulumi.ResourceOptions(provider=dns_provider)) | |
pulumi.export('zone_id', zone.id) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment