Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add EC2 IAM Instance Profile to decryption #1

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

mindriot88
Copy link

  • allow KMS decrypt to be used via IAM instance credentials.

@mindriot88
Copy link
Author

@schattingh first of all thanks very much for working on this, when running eyaml kms from within aws this is the correct authentication mechanism to be using.

I have been trying out your patch, it works well in our case were we are using kms to decrypt our eyaml secrets during a packer build pipeline, hence the addition in this PR.

Once your happy with your implementation do you mind submitting this back to https://github.com/adenot/hiera-eyaml-kms ? as this I think would be useful for many others.

@schattingh
Copy link
Owner

schattingh commented Nov 8, 2018

Thanks @mindriot88 , I should get some time to complete testing this over the next few days and will then be submitting a PR.

@schattingh
Copy link
Owner

@mindriot88 I have tested this further and found that my changes are not required in order to use EC2 IAM Instance Profiles. The SDK tries the IAM Instance Profile credentials if a profile is not configured. Tested with both encryption and decryption, confirmed by monitoring CloudTrail to check the InstanceID was appearing in the logs as the username.

So won't be submitting my changes, but may submit a clarification in the documentation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants