![]() |
|
|
|
|
Change By:
|
Gavin Hamill
(23/Jan/15 3:52 PM)
|
|
Description:
|
AWS allows EC2 instances to 'inherit' an IAM policy, so that any application on that instance can have account access at the level specified in that policy.
This
For people like me who run Jenkins on an EC2 instance, this
means that instead of having to manually specify a pair of Access + Secret keys,
any app using the AWS SDK can automatically
Jenkins could magically
get
account
access
.
http://docs.aws.amazon.com/AWSSdkDocsJava/latest/DeveloperGuide/java-dg-roles.html
i.e. if there is no access / secret key provided, then try falling back to the InstanceProfileCredentialsProvider()
Cheers, Gavin.
|
|
|
|
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators.
For more information on JIRA, see: http://www.atlassian.com/software/jira
|
--
You received this message because you are subscribed to the Google Groups "Jenkins Issues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
[email protected].
For more options, visit
https://groups.google.com/d/optout.