CloudInit should support IAM roles

Bug #1027190 reported by Avishai Ish-Shalom on 2012-07-20
This bug affects 7 people
Affects Status Importance Assigned to Milestone

Bug Description

EC2 meta-data provider exposes IAM credentials per server role. CloudInit should expose them for use in plugins, e.g. cloudformation, sns phone home, s3 download, etc.

Changed in cloud-init:
assignee: nobody → Avishai Ish-Shalom (avishai-ish-shalom)
Scott Moser (smoser) on 2012-08-16
Changed in cloud-init:
importance: Undecided → Low
status: New → Triaged
glance (glance-acc) wrote :

O so lovely it would be to be able to use eg.


And have could-init to fetch and run that script from s3 with the iam role credentials. This would help me with a lot of auto-scale scenarios.

Schlomo Schapiro (sschapiro) wrote :

Any progress here? Why not rely on boto which already supports IAM roles out-of-the-box?

Dan Watkins (daniel-thewatkins) wrote :

It's not 100% clear to me how the integration with IAM roles would be intended to work; could someone give some clarification and then set it back to New?


Changed in cloud-init:
assignee: Avishai Ish-Shalom (avishai-ish-shalom) → nobody
status: Triaged → Incomplete
Launchpad Janitor (janitor) wrote :

[Expired for cloud-init because there has been no activity for 60 days.]

Changed in cloud-init:
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers