Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add an aws_creds function for COPY commands #36

Closed
alexanderdean opened this issue Sep 14, 2015 · 7 comments
Closed

Add an aws_creds function for COPY commands #36

alexanderdean opened this issue Sep 14, 2015 · 7 comments

Comments

@alexanderdean
Copy link
Member

No description provided.

@alexanderdean alexanderdean self-assigned this Sep 14, 2015
@alexanderdean alexanderdean added this to the Version 0.3.0 milestone Sep 14, 2015
@andrioni
Copy link
Contributor

👍
Another useful thing would be the option to get role-based credentials whenever available, and it seems the Golang SDK already has this implemented.

@alexanderdean
Copy link
Member Author

Yes that would be nice...

@andrioni
Copy link
Contributor

Any ideas on how do you plan on doing it? I think I might be able to contribute something towards it in the next few days, since I'm gonna need it too.

The easiest way I see is to use the Golang SDK (which automatically gives us the support to reading the credentials from profiles, environment variables and roles), and then inject them as predefined variables (aws_access_key_id and aws_secret_access_key?) inside the playbook. Any objections to this approach?

@alexanderdean
Copy link
Member Author

Using the Golang SDK sounds good. I think the two options are:

inject them as predefined variables (aws_access_key_id and aws_secret_access_key?) inside the playbook

or

\2. Create a template function aws_access_credentials which generates a string of the format:

'aws_access_key_id=<access-key-id>;aws_secret_access_key=<secret-access-key>'

This is because the only places I can think these creds would be useful are in COPY and UNLOAD statements, which use the above credentials syntax...

@andrioni
Copy link
Contributor

Yes, indeed, and it avoids horribly overextending the meaning and creation methods of variables.

@alexanderdean
Copy link
Member Author

Cool!

@alexanderdean
Copy link
Member Author

Duplicate of #39

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants