Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IAM Temporary Role Credentials must be refreshed #103

Open
tamsky opened this issue Jun 29, 2016 · 0 comments
Open

IAM Temporary Role Credentials must be refreshed #103

tamsky opened this issue Jun 29, 2016 · 0 comments

Comments

@tamsky
Copy link

tamsky commented Jun 29, 2016

Currently I don't believe gof3r refreshes IAM role credentials, but they will expire if used for a long enough period of time.
This is usually many (10+ hours) after they are retrieved.

For large file transfers with gof3r this has definitely been an issue for us.
Our fix was to remove IAM roles from the hosts and use environment variables with static credentials in order to push those large files.

This credential expiry is by design, as explained in this similar issue:
fog/fog#3544 (comment)
which cites:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html

One strategy, employed by boto is anticipatory based on expiry time.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant