victorquinn / dynasty

Dynasty - Promise-based, clean DynamoDB API
http://dynastyjs.com
MIT License
159 stars 51 forks source link

Unable to use IAM role credentials in Lambda #87

Open xavier-musy opened 8 years ago

xavier-musy commented 8 years ago

Rather than having to configure credentials explicitly, I'd like to use the IAM user execution role permissions.
http://docs.aws.amazon.com/lambda/latest/dg/intro-permission-model.html

I've simulated that this works fine. However, dynasty needs explicit credentials, and using process.env credentials doesn't work in Lambda, see this thread: https://gist.github.com/cmawhorter/3cf67164414c4a97fcd8

victorquinn commented 8 years ago

Ooooo good catch, I'll work out a way to use IAM credentials!

This, like many other missing features of Dynasty, simply didn't exist in 2013 when we initially wrote this library. Will update!!

Cheers, Victor Sent from my iPhone

On Sep 2, 2016, at 11:55 AM, Xavier Musy notifications@github.com wrote:

Rather that having to configure credentials explicitly, I'd like to use the IAM user execution role permissions.

http://docs.aws.amazon.com/lambda/latest/dg/intro-permission-model.html

I've simulated that this works fine. However, dynasty needs explicit credentials, and using process.env credentials doesn't work in Lambda, see this thread: https://gist.github.com/cmawhorter/3cf67164414c4a97fcd8

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub, or mute the thread.

xavier-musy commented 8 years ago

👍

gozup commented 7 years ago

+1

davidplappert commented 6 years ago

What is the status on this?

p0fi commented 6 years ago

like really, whats the status here?

brianknight10 commented 5 years ago

Added a PR to address this...