CloudInit should support IAM roles

Bug #1027190 reported by Avishai Ish-Shalom
42
This bug affects 7 people
Affects Status Importance Assigned to Milestone
cloud-init
Expired
Low
Unassigned

Bug Description

EC2 meta-data provider exposes IAM credentials per server role. CloudInit should expose them for use in plugins, e.g. cloudformation, sns phone home, s3 download, etc.

Changed in cloud-init:
assignee: nobody → Avishai Ish-Shalom (avishai-ish-shalom)
Scott Moser (smoser)
Changed in cloud-init:
importance: Undecided → Low
status: New → Triaged
Revision history for this message
glance (glance-acc) wrote :

O so lovely it would be to be able to use eg.

#include
s3://my-bucket-with-cloud-init-data/the-init-script.sh

And have could-init to fetch and run that script from s3 with the iam role credentials. This would help me with a lot of auto-scale scenarios.

Revision history for this message
Schlomo Schapiro (sschapiro) wrote :

Any progress here? Why not rely on boto which already supports IAM roles out-of-the-box?

Revision history for this message
Dan Watkins (oddbloke) wrote :

It's not 100% clear to me how the integration with IAM roles would be intended to work; could someone give some clarification and then set it back to New?

Thanks!

Changed in cloud-init:
assignee: Avishai Ish-Shalom (avishai-ish-shalom) → nobody
status: Triaged → Incomplete
Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for cloud-init because there has been no activity for 60 days.]

Changed in cloud-init:
status: Incomplete → Expired
Revision history for this message
James Falcon (falcojr) wrote :
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.