-
Notifications
You must be signed in to change notification settings - Fork 880
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CloudInit should support IAM roles #2275
Comments
Launchpad user glance(glance-acc) wrote on 2012-08-28T12:04:25.097015+00:00 O so lovely it would be to be able to use eg. #include And have could-init to fetch and run that script from s3 with the iam role credentials. This would help me with a lot of auto-scale scenarios. |
Launchpad user Schlomo Schapiro(sschapiro) wrote on 2014-07-02T13:36:41.122074+00:00 Any progress here? Why not rely on boto which already supports IAM roles out-of-the-box? |
Launchpad user Dan Watkins(oddbloke) wrote on 2019-03-06T22:29:39.230794+00:00 It's not 100% clear to me how the integration with IAM roles would be intended to work; could someone give some clarification and then set it back to New? Thanks! |
Launchpad user Launchpad Janitor(janitor) wrote on 2019-05-06T04:18:07.378098+00:00 [Expired for cloud-init because there has been no activity for 60 days.] |
This bug was originally filed in Launchpad as LP: #1027190
Launchpad details
Launchpad user Avishai Ish-Shalom(avishai-ish-shalom) wrote on 2012-07-20T18:09:05.085209+00:00
EC2 meta-data provider exposes IAM credentials per server role. CloudInit should expose them for use in plugins, e.g. cloudformation, sns phone home, s3 download, etc.
The text was updated successfully, but these errors were encountered: