-
custom_endpoint_ec2
(string) - This option is useful if you use a cloud
provider whose API is compatible with aws EC2. Specify another endpoint
like this https://ec2.custom.endpoint.com.
-
decode_authorization_messages
(bool) - Enable automatic decoding of any encoded authorization (error) messages
using the sts:DecodeAuthorizationMessage
API. Note: requires that the
effective user/role have permissions to sts:DecodeAuthorizationMessage
on resource *
. Default false
.
-
insecure_skip_tls_verify
(bool) - This allows skipping TLS
verification of the AWS EC2 endpoint. The default is false.
-
mfa_code
(string) - The MFA
TOTP
code. This should probably be a user variable since it changes all the
time.
-
profile
(string) - The profile to use in the shared credentials file for
AWS. See Amazon's documentation on specifying
profiles
for more details.
-
skip_region_validation
(bool) - Set to true if you want to skip
validation of the ami_regions configuration option. Default false.
-
skip_metadata_api_check
(bool) - Skip Metadata Api Check
-
token
(string) - The access token to use. This is different from the
access key and secret key. If you're not sure what this is, then you
probably don't need it. This will also be read from the AWS_SESSION_TOKEN
environmental variable.
-
vault_aws_engine
(VaultAWSEngineOptions) - Get credentials from Hashicorp Vault's aws secrets engine. You must
already have created a role to use. For more information about
generating credentials via the Vault engine, see the Vault
docs.
If you set this flag, you must also set the below options:
name
(string) - Required. Specifies the name of the role to generate
credentials against. This is part of the request URL.
engine_name
(string) - The name of the aws secrets engine. In the
Vault docs, this is normally referred to as "aws", and Packer will
default to "aws" if engine_name
is not set.
role_arn
(string)- The ARN of the role to assume if credential_type
on the Vault role is assumed_role. Must match one of the allowed role
ARNs in the Vault role. Optional if the Vault role only allows a single
AWS role ARN; required otherwise.
ttl
(string) - Specifies the TTL for the use of the STS token. This
is specified as a string with a duration suffix. Valid only when
credential_type is assumed_role or federation_token. When not
specified, the default_sts_ttl set for the role will be used. If that
is also not set, then the default value of 3600s will be used. AWS
places limits on the maximum TTL allowed. See the AWS documentation on
the DurationSeconds parameter for AssumeRole (for assumed_role
credential types) and GetFederationToken (for federation_token
credential types) for more details.
{
"vault_aws_engine": {
"name": "myrole",
"role_arn": "myarn",
"ttl": "3600s"
}
}