|
%!s(int64=3) %!d(string=hai) anos | |
---|---|---|
.. | ||
README.md | %!s(int64=3) %!d(string=hai) anos | |
iam_phantom_s3_role.tf | %!s(int64=3) %!d(string=hai) anos | |
kms.tf | %!s(int64=3) %!d(string=hai) anos | |
main.tf | %!s(int64=3) %!d(string=hai) anos | |
outputs.tf | %!s(int64=3) %!d(string=hai) anos | |
vars.tf | %!s(int64=3) %!d(string=hai) anos |
Phantom instance must assume-role first. To do this from the command-line:
aws --region us-gov-east-1 sts assume-role --role-arn arn:aws-us-gov:iam::738800754746:role/service/phantom_s3 --role-session-name ftd_testing
# Output will contain AccessKeyId and SecretAcessKeyID
AWS_ACCESS_KEY_ID=[REPLACE] AWS_SECRET_ACCESS_KEY=[REPLACE] AWS_SESSION_TOKEN=[replace] aws --region us-gov-east-1 s3 ls