Skip to content

ecsta seems to require unnecessary permission ecs:DiscoverPollEndpoint #74

@snaka

Description

@snaka

Expected behavior:

ecsta exec should execute commands with the same IAM permission as aws ecs execute-command.

Actual behavior:

When running ecsta exec with an IAM user that can successfully execute aws ecs execute-command , the following error occurs:

User: arn:aws:iam::xxxxxxxx:user/foo is not authorized to perform: ecs:DiscoverPollEndpoint
 on resource: * because no identity-based policy allows the ecs:DiscoverPollEndpoint action

This indicates that ecsta requires the ecs:DiscoverPoolEndpoint permission, which does not seem necessary based on the AWS CLI's behavior.

Background:

I am trying to use ecsta to execute commands in my ECS tasks. I have an IAM user with permissions to execute commands using the AWS CLI, but ecsta requires additional permissions that seems unnecessary. This may be an unnecessary permission requirement.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions