Skip to content
Yum package manager plugin for private S3 repositories. Uses Amazon IAM & EC2 Roles.
Python
Find file
Pull request Compare This branch is 17 commits ahead, 32 commits behind seporaitis:master.
Latest commit b365fa6 Nov 30, 2013 @henrysher Merge pull request #2 from bitdeli-chef/master
Add a Bitdeli Badge to README
Failed to load latest commit information.
pkgs Support to use S3 credentials from config file Nov 13, 2012
src no need to support old yum Mar 25, 2013
test Add the support on RPM packaging Oct 27, 2012
.gitignore
LICENSE Initial commit. Aug 8, 2012
Makefile Add the support on RPM packaging Oct 27, 2012
NOTICE Refactored, fixed and updated code according to code review. Aug 12, 2012
README.md Add a Bitdeli badge to README Nov 30, 2013

README.md

yum-s3-iam

This is Yum plugin that lets you use private S3 buckets as package repositories. Plugin uses AWS Identity and Access Management (IAM) roles for authorization, so you do not need to enter your access/secret key pair anywhere in configuration.

What is IAM Role?

Roles can be assumed by AWS EC2 instances to gain special permissions. About how it works I suggest you dig through docs.

What is important for us: when you assign role to an EC2 instance, a constantly rotated (by AWS) access credentials become available for access within the instance. This means you don't need to store them anywhere, to change and/or rotate them, and you have a fine-grain control on what actions can be made using those credentials.

How-to set it up?

Read a great blog post by Jeremy Carroll which in depth explains how to use this plugin: S3 Yum Repos With IAM Authorization.

What's with the tests?

The tests will fail, except maybe for the aws signature generation test. And although this code successfully runs on a live machine, I would like some advice of how I could write tests for Yum plugin/AWS API consumer like this one.

License

Apache 2.0 license. See LICENSE.

Author(s)

Bitdeli Badge

Something went wrong with that request. Please try again.