Dockerun.aws.json referring to bucket of another account The 2019 Stack Overflow Developer Survey Results Are InWhat are the pros and cons of AWS Elastic Beanstalk compared with other deployment strategies?Getting files from an s3 bucket using IAM role credentialsSCP from docker image on elastic beanstalkAWS Elastic Beanstalk CPU CappedMulti-container docker on AWS - Nginx use host machine /etc/hosts resolverElastic Beanstalk: IAM policy for deploying a multicontainer Docker environment from a private repositoryNo network connection on Multiple docker container in Elastic BeanstalkAWS Elastic Beanstalk Docker Multicontainer Deployment Error, Can't Set MemoryCannotPullContainerError when trying to deploy AWS multicontainer using elasticbeanstalk with eb cliRedirect a http request to a specific IP and port in a Docker Container
Mathematics of imaging the black hole
Ubuntu Server install with full GUI
What's the name of these plastic connectors
Falsification in Math vs Science
Did any laptop computers have a built-in 5 1/4 inch floppy drive?
A word that means fill it to the required quantity
What information about me do stores get via my credit card?
Getting crown tickets for Statue of Liberty
Is bread bad for ducks?
How can I define good in a religion that claims no moral authority?
Can we generate random numbers using irrational numbers like π and e?
Star Trek - X-shaped Item on Regula/Orbital Office Starbases
Are spiders unable to hurt humans, especially very small spiders?
Why not take a picture of a closer black hole?
Is it correct to say the Neural Networks are an alternative way of performing Maximum Likelihood Estimation? if not, why?
Kerning for subscripts of sigma?
Can there be female White Walkers?
Worn-tile Scrabble
What is the motivation for a law requiring 2 parties to consent for recording a conversation
The phrase "to the numbers born"?
Is it possible for absolutely everyone to attain enlightenment?
Is it ethical to upload a automatically generated paper to a non peer-reviewed site as part of a larger research?
What could be the right powersource for 15 seconds lifespan disposable giant chainsaw?
"as much details as you can remember"
Dockerun.aws.json referring to bucket of another account
The 2019 Stack Overflow Developer Survey Results Are InWhat are the pros and cons of AWS Elastic Beanstalk compared with other deployment strategies?Getting files from an s3 bucket using IAM role credentialsSCP from docker image on elastic beanstalkAWS Elastic Beanstalk CPU CappedMulti-container docker on AWS - Nginx use host machine /etc/hosts resolverElastic Beanstalk: IAM policy for deploying a multicontainer Docker environment from a private repositoryNo network connection on Multiple docker container in Elastic BeanstalkAWS Elastic Beanstalk Docker Multicontainer Deployment Error, Can't Set MemoryCannotPullContainerError when trying to deploy AWS multicontainer using elasticbeanstalk with eb cliRedirect a http request to a specific IP and port in a Docker Container
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;
I have the following Dockerrun.aws.json
:
"AWSEBDockerrunVersion": "1",
"Authentication":
"Bucket": "bucket-of-another-aws-account",
"Key": "docker/.dockercfg"
,
"Image":
"Name": "docker-image"
,
"Ports": [
"ContainerPort": "8080"
]
The Elastic Beanstalk Environment with our Docker container is running in the customer's AWS account and the S3 bucket with the .dockercfg
belongs to our AWS account.
For testing purposes I set the bucket policy principle to *
so that anyone can download the .dockercfg
file. Nevertheless Elastic Beanstalk is not able to download that file ("Failed to download authentication credentials docker/.dockercfg from bucket-of-another-aws-account
").
The next test was to move the file to an S3 bucket within the customer's AWS account. That worked.
Question is: Is it possible to use a bucket of another account in the Dockerrun.aws.json
? I could not find any hints in the documentation and I don't want to give the DockerHub API key to our customer.
amazon-web-services docker elastic-beanstalk
add a comment |
I have the following Dockerrun.aws.json
:
"AWSEBDockerrunVersion": "1",
"Authentication":
"Bucket": "bucket-of-another-aws-account",
"Key": "docker/.dockercfg"
,
"Image":
"Name": "docker-image"
,
"Ports": [
"ContainerPort": "8080"
]
The Elastic Beanstalk Environment with our Docker container is running in the customer's AWS account and the S3 bucket with the .dockercfg
belongs to our AWS account.
For testing purposes I set the bucket policy principle to *
so that anyone can download the .dockercfg
file. Nevertheless Elastic Beanstalk is not able to download that file ("Failed to download authentication credentials docker/.dockercfg from bucket-of-another-aws-account
").
The next test was to move the file to an S3 bucket within the customer's AWS account. That worked.
Question is: Is it possible to use a bucket of another account in the Dockerrun.aws.json
? I could not find any hints in the documentation and I don't want to give the DockerHub API key to our customer.
amazon-web-services docker elastic-beanstalk
add a comment |
I have the following Dockerrun.aws.json
:
"AWSEBDockerrunVersion": "1",
"Authentication":
"Bucket": "bucket-of-another-aws-account",
"Key": "docker/.dockercfg"
,
"Image":
"Name": "docker-image"
,
"Ports": [
"ContainerPort": "8080"
]
The Elastic Beanstalk Environment with our Docker container is running in the customer's AWS account and the S3 bucket with the .dockercfg
belongs to our AWS account.
For testing purposes I set the bucket policy principle to *
so that anyone can download the .dockercfg
file. Nevertheless Elastic Beanstalk is not able to download that file ("Failed to download authentication credentials docker/.dockercfg from bucket-of-another-aws-account
").
The next test was to move the file to an S3 bucket within the customer's AWS account. That worked.
Question is: Is it possible to use a bucket of another account in the Dockerrun.aws.json
? I could not find any hints in the documentation and I don't want to give the DockerHub API key to our customer.
amazon-web-services docker elastic-beanstalk
I have the following Dockerrun.aws.json
:
"AWSEBDockerrunVersion": "1",
"Authentication":
"Bucket": "bucket-of-another-aws-account",
"Key": "docker/.dockercfg"
,
"Image":
"Name": "docker-image"
,
"Ports": [
"ContainerPort": "8080"
]
The Elastic Beanstalk Environment with our Docker container is running in the customer's AWS account and the S3 bucket with the .dockercfg
belongs to our AWS account.
For testing purposes I set the bucket policy principle to *
so that anyone can download the .dockercfg
file. Nevertheless Elastic Beanstalk is not able to download that file ("Failed to download authentication credentials docker/.dockercfg from bucket-of-another-aws-account
").
The next test was to move the file to an S3 bucket within the customer's AWS account. That worked.
Question is: Is it possible to use a bucket of another account in the Dockerrun.aws.json
? I could not find any hints in the documentation and I don't want to give the DockerHub API key to our customer.
amazon-web-services docker elastic-beanstalk
amazon-web-services docker elastic-beanstalk
asked Dec 1 '14 at 12:51
AlexanderAlexander
13113
13113
add a comment |
add a comment |
1 Answer
1
active
oldest
votes
We managed to overcome the "Failed to download authentication credentials" like this:
1) In account B (the one trying to access the remote bucket), look in the Elastic Beanstalk environments' settings for the instance role name it is using (configuration, instances (cog), Instance profile)
2) Still in account B, in the IAM manager, go to Roles and find the ec2 role from the previous step that EB is using for the instances, and attach an inline policy
"Version": "2012-10-17",
"Statement": [
"Sid": "BucketAccess",
"Effect": "Allow",
"Action": [
"s3:List*",
"s3:GetBucketLocation"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account"
]
,
"Sid": "S3ObjectAccess",
"Effect": "Allow",
"Action": [
"s3:GetObject*",
"s3:List*"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
]
3) on the target s3 bucket in Account A attach a policy (where 222222222222 is your account no of Account B)
"Version": "2012-10-17",
"Statement":
"Sid": "AccountBAccess1",
"Effect": "Allow",
"Principal":
"AWS": "222222222222"
,
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account",
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
I know its a late answer to the OP (made me think of https://xkcd.com/979/ ) but I also could not find any concise or definitive answer in the docs online, and with more people moving to AWS and Elastic Beanstalk I hope this can be of use to others!
add a comment |
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f648207%2fdockerun-aws-json-referring-to-bucket-of-another-account%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
We managed to overcome the "Failed to download authentication credentials" like this:
1) In account B (the one trying to access the remote bucket), look in the Elastic Beanstalk environments' settings for the instance role name it is using (configuration, instances (cog), Instance profile)
2) Still in account B, in the IAM manager, go to Roles and find the ec2 role from the previous step that EB is using for the instances, and attach an inline policy
"Version": "2012-10-17",
"Statement": [
"Sid": "BucketAccess",
"Effect": "Allow",
"Action": [
"s3:List*",
"s3:GetBucketLocation"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account"
]
,
"Sid": "S3ObjectAccess",
"Effect": "Allow",
"Action": [
"s3:GetObject*",
"s3:List*"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
]
3) on the target s3 bucket in Account A attach a policy (where 222222222222 is your account no of Account B)
"Version": "2012-10-17",
"Statement":
"Sid": "AccountBAccess1",
"Effect": "Allow",
"Principal":
"AWS": "222222222222"
,
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account",
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
I know its a late answer to the OP (made me think of https://xkcd.com/979/ ) but I also could not find any concise or definitive answer in the docs online, and with more people moving to AWS and Elastic Beanstalk I hope this can be of use to others!
add a comment |
We managed to overcome the "Failed to download authentication credentials" like this:
1) In account B (the one trying to access the remote bucket), look in the Elastic Beanstalk environments' settings for the instance role name it is using (configuration, instances (cog), Instance profile)
2) Still in account B, in the IAM manager, go to Roles and find the ec2 role from the previous step that EB is using for the instances, and attach an inline policy
"Version": "2012-10-17",
"Statement": [
"Sid": "BucketAccess",
"Effect": "Allow",
"Action": [
"s3:List*",
"s3:GetBucketLocation"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account"
]
,
"Sid": "S3ObjectAccess",
"Effect": "Allow",
"Action": [
"s3:GetObject*",
"s3:List*"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
]
3) on the target s3 bucket in Account A attach a policy (where 222222222222 is your account no of Account B)
"Version": "2012-10-17",
"Statement":
"Sid": "AccountBAccess1",
"Effect": "Allow",
"Principal":
"AWS": "222222222222"
,
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account",
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
I know its a late answer to the OP (made me think of https://xkcd.com/979/ ) but I also could not find any concise or definitive answer in the docs online, and with more people moving to AWS and Elastic Beanstalk I hope this can be of use to others!
add a comment |
We managed to overcome the "Failed to download authentication credentials" like this:
1) In account B (the one trying to access the remote bucket), look in the Elastic Beanstalk environments' settings for the instance role name it is using (configuration, instances (cog), Instance profile)
2) Still in account B, in the IAM manager, go to Roles and find the ec2 role from the previous step that EB is using for the instances, and attach an inline policy
"Version": "2012-10-17",
"Statement": [
"Sid": "BucketAccess",
"Effect": "Allow",
"Action": [
"s3:List*",
"s3:GetBucketLocation"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account"
]
,
"Sid": "S3ObjectAccess",
"Effect": "Allow",
"Action": [
"s3:GetObject*",
"s3:List*"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
]
3) on the target s3 bucket in Account A attach a policy (where 222222222222 is your account no of Account B)
"Version": "2012-10-17",
"Statement":
"Sid": "AccountBAccess1",
"Effect": "Allow",
"Principal":
"AWS": "222222222222"
,
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account",
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
I know its a late answer to the OP (made me think of https://xkcd.com/979/ ) but I also could not find any concise or definitive answer in the docs online, and with more people moving to AWS and Elastic Beanstalk I hope this can be of use to others!
We managed to overcome the "Failed to download authentication credentials" like this:
1) In account B (the one trying to access the remote bucket), look in the Elastic Beanstalk environments' settings for the instance role name it is using (configuration, instances (cog), Instance profile)
2) Still in account B, in the IAM manager, go to Roles and find the ec2 role from the previous step that EB is using for the instances, and attach an inline policy
"Version": "2012-10-17",
"Statement": [
"Sid": "BucketAccess",
"Effect": "Allow",
"Action": [
"s3:List*",
"s3:GetBucketLocation"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account"
]
,
"Sid": "S3ObjectAccess",
"Effect": "Allow",
"Action": [
"s3:GetObject*",
"s3:List*"
],
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
]
3) on the target s3 bucket in Account A attach a policy (where 222222222222 is your account no of Account B)
"Version": "2012-10-17",
"Statement":
"Sid": "AccountBAccess1",
"Effect": "Allow",
"Principal":
"AWS": "222222222222"
,
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::bucket-of-another-aws-account",
"arn:aws:s3:::bucket-of-another-aws-account/*"
]
I know its a late answer to the OP (made me think of https://xkcd.com/979/ ) but I also could not find any concise or definitive answer in the docs online, and with more people moving to AWS and Elastic Beanstalk I hope this can be of use to others!
edited Feb 27 '17 at 20:23
answered Feb 21 '17 at 18:24
NevynNevyn
162
162
add a comment |
add a comment |
Thanks for contributing an answer to Server Fault!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f648207%2fdockerun-aws-json-referring-to-bucket-of-another-account%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown