-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to use IAM role credentials in Lambda #87
Comments
Ooooo good catch, I'll work out a way to use IAM credentials! This, like many other missing features of Dynasty, simply didn't exist in 2013 when we initially wrote this library. Will update!! Cheers,
|
👍 |
1 similar comment
+1 |
What is the status on this? |
like really, whats the status here? |
Added a PR to address this... |
Rather than having to configure credentials explicitly, I'd like to use the IAM user execution role permissions.
http://docs.aws.amazon.com/lambda/latest/dg/intro-permission-model.html
I've simulated that this works fine. However, dynasty needs explicit credentials, and using process.env credentials doesn't work in Lambda, see this thread:
https://gist.github.com/cmawhorter/3cf67164414c4a97fcd8
The text was updated successfully, but these errors were encountered: