-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fall back to IAM policy #1
Comments
I've just pushed a commit that makes this possible :) |
Please let me know if this works for you. If so, I'll publish a new version on PyPi. |
I think that setting the access key and secret to "None" in the aws config dict will stop boto from authenticating (well it tries to auth with "None" and "None"). I'll try the commit to confirm though. Will try to get to it asap. |
That's pretty much what happens now. If you don't supply the environment variables, it will use |
So this seems to work, though I have errors about the |
Has this been pushed out to PyPi? |
Simply removing the check for mandatory existence of the |
Boto on an EC2 instance can grab its credentials from AWS directly, rather than from environment variables.
Would it be possible to allow for this? I've monkey patched my local version to just ignore the env vars, but it's not a great solution.
The text was updated successfully, but these errors were encountered: