mirror of
https://github.com/s3fs-fuse/s3fs-fuse.git
synced 2026-04-26 05:45:57 +03:00
[GH-ISSUE #1894] s3fs: specifying both passwd_file and the access keys options is invalid. - ec2_instance - IAM Role #961
Labels
No labels
bug
bug
dataloss
duplicate
enhancement
feature request
help wanted
invalid
need info
performance
pull-request
question
question
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/s3fs-fuse#961
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @OliverBailey on GitHub (Feb 17, 2022).
Original GitHub issue: https://github.com/s3fs-fuse/s3fs-fuse/issues/1894
Version of s3fs being used
V1.9Version of fuse being used
2.9.7Kernel information
5.4.0-1065-awsGNU/Linux Distribution, if applicable (cat /etc/os-release)
/etc/fstab entry, if applicable
s3fs syslog messages (grep s3fs /var/log/syslog, journalctl | grep s3fs, or s3fs outputs)
if you execute s3fs with dbglevel, curldbg option, you can get detail debug messages
Details about issue
Appears occasionally, we run into an issue with an auto-mount via the fstab for our ec2-instances. 95% of the time, we have no issues, but on rare occasions we get an issue like the below.
We auto-mount the instance via fstab, as we use codebuild and packer to build our instances and save as AMI images. These are then utilised via terraform to spin up new instances, and switch across in a blue-green deployment.
We utilise iam_roles which are attached to the ec2 instances (Can verify that the role is assigned correctly, and on a problem instance where the mount won't work, we can still use the aws-cli to access appropriately.
I can verify also, that there are no aws_credentials lying around on the instance, other than from the aws_role.
Rarely (as per the above) we have it where the bucket hasn't been mounted properly, which causes issues with content being delivered.
Error message we get is
s3fs: specifying both passwd_file and the access keys options is invalid.when running
sudo mount -awhen we notice that the mount hasn't occured.Normally a re-build of the instance, and the issue goes away, however ideally I'd like to try ensure this doesn't happen again in the future.
Testing today, things were fine yesterday, but now today, appear to be broken, even with a new build process.
Does anybody have any recommendations on this, or come across anything similar? I've had a browse through threads, but didn't really come across anything similar.
Thanks
@OliverBailey commented on GitHub (Feb 17, 2022):
Upon further investigation, the last build was on 10/02/2022 - The next latest, was today, which is where the issues began to stem from.
I took a look over a few commits -
github.com/s3fs-fuse/s3fs-fuse@1678803566 (diff-2a7c1dbdf7)I can see that there was a change to how credentials were managed, which falls in line with the error message that I'm getting above.
I don't personally know C++ very well. Is it possible these are related?
@ggtakec commented on GitHub (Feb 19, 2022):
@OliverBailey One bug has been fixed in #1896.
If you can build the latest master code available, is it possible to try it?There seems to be other problems.
I will investigate again, so please be patient.
@ggtakec commented on GitHub (Feb 20, 2022):
@OliverBailey
The modified code (# 1897) has been merged.
Please try it with the code in the master branch.
Thanks in advance for your assistance.
@ggtakec commented on GitHub (Feb 12, 2023):
I think this bug has been fixed in master, so I will close this issue.
If you still have problems with the master code, please reopen it.