You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently the only way to grant access to additional aws resources (such as an s3 bucket) to the instance created by dstack, you need to pass in access creds as env vars to your task. This works, but generally it's recommended for access to aws resources from an ec2 instance be managed via the iam role assigned to the instance.
Solution
It'd be great if as part of the server config, you could optionally have it attach a specified iam-role, under which additional permissions could be managed
Workaround
No response
Would you like to help us implement this feature by sending a PR?