Results 12 comments of Szymon Jednac

Assuming that your CI services will run in the cloud, you can [assume role](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html) on the instance itself and use the `InstanceProfileCredentialsProvider`, which is already in [the credentials provider chain](https://github.com/sbilinski/sbt-ecr/blob/master/src/main/scala/sbtecr/Aws.scala#L19)....

@michaelgroening Try attaching `AmazonEC2ContainerRegistryFullAccess` to your user account in the [IAM panel](http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-using.html#attach-managed-policy-console) (for example).