This message was deleted.
# general
s
This message was deleted.
c
Can you please show what your Provider looks like? Also does your bitbucket runner have an Ec2 Instance Profile that allows the
sts:AssumeRoleWithWebIdentity
action?
r
Thanks for your reply, I’ve solved the issue, by exporting the
access key
and
secret key
from the sts command
Copy code
export $(printf "AWS_ACCESS_KEY_ID=%s AWS_SECRET_ACCESS_KEY=%s AWS_SESSION_TOKEN=%s" $(aws sts assume-role-with-web-identity --role-arn arn:aws:iam::**********:role/test --role-session-name test --web-identity-token "$BITBUCKET_STEP_OIDC_TOKEN" --duration-seconds 1000 --query "Credentials.[AccessKeyId,SecretAccessKey,SessionToken]" --output text))
👍 1