Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support IAM Instance Roles #26

Open
ianbamforth opened this issue Feb 17, 2016 · 2 comments
Open

Support IAM Instance Roles #26

ianbamforth opened this issue Feb 17, 2016 · 2 comments

Comments

@ianbamforth
Copy link

Would be great to be able to use the Role of the EC2 instance you're running on in order to avoid the need for credentials to be stored anywhere. Seems pretty simple to support - I've done a very quick and dirty local hack to accomplish this.

@maglub
Copy link
Owner

maglub commented Feb 19, 2016

Hi!

I am very interested. Would you like to share your quick and dirty hack? Then I can assess how to implement it in the mainstream code.

Best,
//magnus

@ianbamforth
Copy link
Author

Hi maglub,

I think you have to use the v2 sdk in order to do this, although I'm not 100% on that. Main change for that was to change AWS. to Aws. throughout, and <service>.new() to <service>.Client.new(), plus the consequent aws_api.client.* to aws_api.*. Also AWS.config has changed, so e.g. AWS.config(:region => regionOverride) becomes Aws.config.update({:region => regionOverride}).

I'm only currently using it for a single check, so I haven't thoroughly tested it, but seems ok so far. If you need any further info let me know!

Ian

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants