little-soccer-5693
02/11/2022, 7:29 PMDiagnostics:
aws:acm:Certificate (Bopmatic-wwwcert):
error: 1 error occurred:
* error configuring Terraform AWS Provider: no valid credential sources for Terraform AWS Provider found.
Please see <https://registry.terraform.io/providers/hashicorp/aws>
for more information about providing credentials.
Error: NoCredentialProviders: no valid providers in chain
caused by: EnvAccessKeyNotFound: failed to find credentials in the environment.
SharedCredsLoad: failed to load profile, .
EC2RoleRequestError: no EC2 instance role found
caused by: RequestCanceled: EC2 IMDS access disabled via AWS_EC2_METADATA_DISABLED env var
I have awsskipMetadataApiCheck "false" in my Pulumi.dev.yaml and when i create a non-default provider I have:
aws.NewProvider(ctx, "us-east-1-provider", &aws.ProviderArgs{
Region: pulumi.String("us-east-1"),
SkipMetadataApiCheck: pulumi.Bool(false),
})
any idea what else i need to do to fix this?bored-table-20691
02/11/2022, 8:41 PMlittle-soccer-5693
02/11/2022, 9:01 PMbored-table-20691
02/11/2022, 9:03 PMlittle-soccer-5693
02/11/2022, 9:04 PMbored-table-20691
02/11/2022, 9:07 PMBopmatic-wwwcert
little-soccer-5693
02/11/2022, 9:08 PMbored-table-20691
02/11/2022, 9:11 PMlittle-soccer-5693
02/11/2022, 9:15 PMcertArgs := &acm.CertificateArgs{
DomainName: pulumi.String(domainNames[0]),
ValidationMethod: pulumi.String("DNS"),
}
if len(domainNames) == 2 {
certArgs.SubjectAlternativeNames = pulumi.StringArray{pulumi.String(domainNames[1])}
}
cert, err := acm.NewCertificate(ctx, certName, certArgs, pulumi.Provider(wwwCertProvider))
if err != nil {
return nil, nil, err
}
bored-table-20691
02/11/2022, 9:17 PMwwwCertProvider
is what you posted before, that should indeed work.little-soccer-5693
02/11/2022, 9:17 PMbored-table-20691
02/11/2022, 9:18 PMlittle-soccer-5693
02/11/2022, 9:19 PM$ curl <http://169.254.169.254/latest/meta-data/iam/security-credentials>
Pulumi-EC2-Role
bored-table-20691
02/11/2022, 9:22 PMlittle-soccer-5693
02/11/2022, 9:22 PMbillowy-army-68599
aws sts get-caller-identity
return?little-soccer-5693
02/11/2022, 11:39 PM$ aws sts get-caller-identity
{
"UserId": "AROAYMJT3EWAONHLETVZT:i-06741991e64dec4fb",
"Account": "<ACCOUNT_ID_REDACTED>",
"Arn": "arn:aws:sts::<ACCOUNT_ID_REDACTED>:assumed-role/Pulumi-EC2-Role/i-06741991e64dec4fb"
}
sparse-state-34229
03/29/2022, 4:25 PM