This repository has been archived by the owner on Sep 4, 2021. It is now read-only.
S3 Blobstore: can I use IAM instance profile instead of supplying key/secret? #4303
Comments
to clarify the EC2 instance has an IAM role assigned to it so can access S3 without needing credentials, I think all that flynn needs to be able to do is to disable the check for the credentials. |
Try
|
Nice one! This got me further but still not quite all the way there:
|
Drop |
Dropping
Thanks a lot! Is there a documentation that describes |
We should add that option in the error message. I might try and do that as
I need an excuse to try some go and make a first commit to flynn 😀
…On 11 Dec 2017 6:09 pm, "artem avetisyan" ***@***.***> wrote:
Dropping -1a didn't work, but dropping a did!
***@***.***:~$ flynn -a blobstore env set BACKEND_S3MAIN="backend=s3 region=eu-west-1 bucket=bs-pr-apps-flynn-stack-flynnblobstore-16u5r9o614986 ec2_role=true"
Created release 70c303f6-53c2-415b-8ca5-8da1e749c5b6.
Thanks a lot! Is there a documentation that describes ec2_role=true trick
(and perhaps some others too)?
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#4303 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AAI2Gh6bEi8F4vYKPJZ2yBOHEcTRBk_Qks5s_W_MgaJpZM4Q9Sqa>
.
|
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
The reason for that is that IAM instance profile access can scripted in cloud formation template.
The text was updated successfully, but these errors were encountered: