mirror of
https://github.com/s3fs-fuse/s3fs-fuse.git
synced 2026-04-25 13:26:00 +03:00
[GH-ISSUE #2504] SIGv4 , IAM, and credentials issue. New bucket in ap-southeast-2 with url and endpoint specified. #1221
Labels
No labels
bug
bug
dataloss
duplicate
enhancement
feature request
help wanted
invalid
need info
performance
pull-request
question
question
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/s3fs-fuse#1221
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @sxwebster on GitHub (Jul 25, 2024).
Original GitHub issue: https://github.com/s3fs-fuse/s3fs-fuse/issues/2504
Additional Information
Version of s3fs being used (
s3fs --version)1.93
Version of fuse being used (
pkg-config --modversion fuse,rpm -qi fuseordpkg -s fuse)3.14.0
Kernel information (
uname -r)6.8.0-1012-aws
GNU/Linux Distribution, if applicable (
cat /etc/os-release)Ubuntu 24.04 & 22.04
How to run s3fs, if applicable
Established via a service. my-backups is defined as an environment variable and the service file is re-written during deployment to include it. This part works.
I have also tried variations of the options, including the full and subset of the following:
I would very much prefer not to be so granular with my policy name and leave it to auto if possible, since it's already attached to the instance.
s3fs syslog messages (
grep s3fs /var/log/syslog,journalctl | grep s3fs, ors3fs outputs)Details about issue
All advice I've been able to find so far suggests using the url and endpoint flags. Based upon the error messages, they seem to understand that I'm providing these flags. SIGv4 seems to be the first issue, followed by credentials. I do not wish to supply a set of credentials since this is a production system that's web facing, and supplying plaintext credentials is never good policy.
@sxwebster commented on GitHub (Jul 25, 2024):
I made a mistake with the bucket name in my policy. Once this was fixed, everything worked.
@sxwebster commented on GitHub (Jul 25, 2024):
I should also say, I needed to specify the role name and not leave it as auto, even though the iam policy is attached to the instance.