From 7adfbfabcf01e4aba7380e5f095da164851d2ae2 Mon Sep 17 00:00:00 2001 From: "Ryan F." <77812147+RyanFitzSimmonsAK@users.noreply.github.com> Date: Fri, 8 Nov 2024 11:53:37 -0800 Subject: [PATCH 1/2] Updated credentials precedence documentation --- docs/source/guide/credentials.rst | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/docs/source/guide/credentials.rst b/docs/source/guide/credentials.rst index 9fa24c9125..f0ce6f0b6f 100644 --- a/docs/source/guide/credentials.rst +++ b/docs/source/guide/credentials.rst @@ -37,6 +37,7 @@ Boto3 will look in several locations when searching for credentials. The mechani #. Shared credential file (``~/.aws/credentials``) #. AWS config file (``~/.aws/config``) #. Boto2 config file (``/etc/boto.cfg`` and ``~/.boto``) +#. Container credential provider #. Instance metadata service on an Amazon EC2 instance that has an IAM role configured. Each of those locations is discussed in more detail below. @@ -287,6 +288,11 @@ Boto3 will attempt to load credentials from the Boto2 config file. It first chec This credential provider is primarily for backwards compatibility purposes with Boto2. +Container credential provider +--------- +You can associate an IAM role with each of your Amazon Elastic Container Service (Amazon ECS) task definitions. Temporary credentials for that role are then available to that task's containers. For more information, see `IAM Roles for Tasks `_ in the Amazon Elastic Container Service Developer Guide. + + IAM roles --------- From c87e4b0ba34b30218f9e1c3475a747a819207c2f Mon Sep 17 00:00:00 2001 From: "Ryan F." <77812147+RyanFitzSimmonsAK@users.noreply.github.com> Date: Fri, 22 Nov 2024 11:56:52 -0800 Subject: [PATCH 2/2] updated description of container credential provider --- docs/source/guide/credentials.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/source/guide/credentials.rst b/docs/source/guide/credentials.rst index f0ce6f0b6f..4e2fd134e1 100644 --- a/docs/source/guide/credentials.rst +++ b/docs/source/guide/credentials.rst @@ -290,7 +290,7 @@ Boto3 will attempt to load credentials from the Boto2 config file. It first chec Container credential provider --------- -You can associate an IAM role with each of your Amazon Elastic Container Service (Amazon ECS) task definitions. Temporary credentials for that role are then available to that task's containers. For more information, see `IAM Roles for Tasks `_ in the Amazon Elastic Container Service Developer Guide. +If you are using Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS), you can obtain credentials by specifying an HTTP endpoint as an environment variable. The SDK will request credentials from the specified endpoint. For more information, see `Container credential provider `_ in the Amazon SDKs and Tools Reference Guide. IAM roles