The attempt to get SECRET_KEY and ACCESS_KEY was using:
ROLE_NAME=XXXX METADATA_URL="http://169.254.169.254/latest/meta-data/iam/security-credentials/$ROLE_NAME" AWS_ACCESS_KEY_ID=$(curl -s $METADATA_URL | jq -r .AccessKeyId) AWS_SECRET_KEY_ID=$(curl -s $METADATA_URL | jq -r .SecretAccessKey) AWS_SESSION_TOKEN=$(curl -s $METADATA_URL | jq -r .Token) REGION=$(curl -s http://169.254.169.254/latest/dynamic/instance-identity/document | jq -r .region) mkdir -p ~/.local/share juju bootstrap aws
I don't think juju pays attention to AWS_SESSION_TOKEN without --constraints "instance-role=XXXX" being set (either to 'auto' or to an explicit name)
The attempt to get SECRET_KEY and ACCESS_KEY was using:
ROLE_NAME=XXXX 169.254. 169.254/ latest/ meta-data/ iam/security- credentials/ $ROLE_NAME" KEY_ID= $(curl -s $METADATA_URL | jq -r .AccessKeyId) KEY_ID= $(curl -s $METADATA_URL | jq -r .SecretAccessKey) TOKEN=$ (curl -s $METADATA_URL | jq -r .Token) 169.254. 169.254/ latest/ dynamic/ instance- identity/ document | jq -r .region)
METADATA_URL="http://
AWS_ACCESS_
AWS_SECRET_
AWS_SESSION_
REGION=$(curl -s http://
mkdir -p ~/.local/share
juju bootstrap aws
I don't think juju pays attention to AWS_SESSION_TOKEN without --constraints "instance- role=XXXX" being set (either to 'auto' or to an explicit name)