-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adds the ability to use IAM roles from EC2 instances for credentials #21
Conversation
@@ -14,5 +14,5 @@ | |||
<span class="form_error" ng-show="GOINPUTNAME[Destination].$error.server">{{ GOINPUTNAME[Destination].$error.server }}</span> | |||
</div> | |||
<div class="form_item_block"> | |||
<p class="required">Make sure AWS_SECRET_ACCESS_KEY, AWS_ACCESS_KEY_ID and GO_ARTIFACTS_S3_BUCKET environment variables are present with appropriate values on any of pipeline / Go Environments / on all agent machines. </p> | |||
<p class="required">Make sure either AWS_USE_IAM_ROLE or AWS_SECRET_ACCESS_KEY + AWS_ACCESS_KEY_ID, GO_ARTIFACTS_S3_BUCKET and GO_ARTIFACTS_S3_BUCKET environment variables are present with appropriate values on any of pipeline / Go Environments / on all agent machines. </p> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GO_ARTIFACTS_S3_BUCKET
is repeating on both the template files.
2ec5dd3
to
0412c8a
Compare
@ashwanthkumar No worries at all, I've fixed that template issue. |
LGTM. Open source is beneficial for everyone :) Let's make sure docs are updated too? https://github.com/ind9/gocd-s3-artifacts/tree/gh-pages |
@manojlds do you want me to open a separate pr for the docs? |
@lobsterdore - if you can, then yes, please! If not, we will take care of it. Just do confirm if you want take a stab at it :) |
0412c8a
to
4af4b08
Compare
4af4b08
to
99deb3f
Compare
@manojlds Rebased and updated, I will pop in a PR for the docs hopefully tomorrow. |
Documentation PR -> #22 |
Adds the ability to use IAM roles from EC2 instances for credentials
When using GOCD in AWS it's best practice to avoid keys and use an IAM role attached to the machine itself, this change will enable that functionality.