From 4d439b3ba352ea62decdb0b2f1f2fa5d56559c25 Mon Sep 17 00:00:00 2001 From: JustFiesta Date: Fri, 17 May 2024 13:04:39 +0200 Subject: [PATCH] Added IAM role allowing EC2 to reach for resources in ECR --- prepare_aws_enviroment.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/prepare_aws_enviroment.sh b/prepare_aws_enviroment.sh index 3f12c468d..cf2288163 100644 --- a/prepare_aws_enviroment.sh +++ b/prepare_aws_enviroment.sh @@ -95,7 +95,7 @@ newgrp docker EOF ) -INSTANCE_ID=$(aws ec2 run-instances --image-id ami-0ac67a26390dc374d --count 1 --instance-type t3.micro --key-name "$KEY_PAIR_NAME" --security-group-ids "$SECURITY_GROUP_ID" --subnet-id "$SUBNET_ID" --region "$REGION" --user-data "$USER_DATA_SCRIPT" --query 'Instances[0].InstanceId' --output text) +INSTANCE_ID=$(aws ec2 run-instances --image-id ami-0ac67a26390dc374d --count 1 --instance-type t3.micro --key-name "$KEY_PAIR_NAME" --security-group-ids "$SECURITY_GROUP_ID" --subnet-id "$SUBNET_ID" --region "$REGION" --user-data "$USER_DATA_SCRIPT" --iam-instance-profile Name=allow_ec2_ecr --query 'Instances[0].InstanceId' --output text) export INSTANCE_ID if [ -z "$INSTANCE_ID" ]; then