victorquinn/dynasty

Unable to use IAM role credentials in Lambda

xavier-musy opened this issue · 6 comments

Rather than having to configure credentials explicitly, I'd like to use the IAM user execution role permissions.
http://docs.aws.amazon.com/lambda/latest/dg/intro-permission-model.html

I've simulated that this works fine. However, dynasty needs explicit credentials, and using process.env credentials doesn't work in Lambda, see this thread:
https://gist.github.com/cmawhorter/3cf67164414c4a97fcd8

Ooooo good catch, I'll work out a way to use IAM credentials!

This, like many other missing features of Dynasty, simply didn't exist in 2013 when we initially wrote this library. Will update!!

Cheers,
Victor
Sent from my iPhone

On Sep 2, 2016, at 11:55 AM, Xavier Musy notifications@github.com wrote:

Rather that having to configure credentials explicitly, I'd like to use the IAM user execution role permissions.

http://docs.aws.amazon.com/lambda/latest/dg/intro-permission-model.html

I've simulated that this works fine. However, dynasty needs explicit credentials, and using process.env credentials doesn't work in Lambda, see this thread:
https://gist.github.com/cmawhorter/3cf67164414c4a97fcd8


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.

👍

gozup commented

+1

What is the status on this?

p0fi commented

like really, whats the status here?

Added a PR to address this...