Scott; The user passes in the AWS access and secret keys in the user-data box. This page has all the details about the YAML format CloudMan expects (in step 2 of the detailed steps): http://wiki.g2.bx.psu.edu/Admin/Cloud You can pick the passed in user-data up from any instance with this url: http://169.254.169.254/latest/user-data and parsing it. CloudMan uses a script (in Python) that runs at boot: https://github.com/chapmanb/cloudbiolinux/blob/master/installed_files/ec2aut... with a little upstart script in /etc/init/cloudman.conf: https://github.com/chapmanb/cloudbiolinux/blob/master/cloudbio/cloudman.py#L... Once you've got it in your script you can parse and use it as you need. Hope this helps, Brad
This is only sort of a Galaxy question, in the sense of "how did you guys do that so I can too" sort of way. I'm trying to clean up some code written by an undergrad for the GBrowse2 cloud machine, where he used less than secure methods of doing things. I gather from the page on Cloudman that it uses a parameterized launch, where the user provides both halves of his API key, so that the Cloudman master node can do things like provision storage and start other instances. Since I need to be able to do essentially the same thing (but in perl!), I was wondering if you could direct me to the resources you used to implement that and point out any gotchas that you can think of.
Thanks much and keep up the good work! Scott
-- ------------------------------------------------------------------------ Scott Cain, Ph. D. scott at scottcain dot net GMOD Coordinator (http://gmod.org/) 216-392-3087 Ontario Institute for Cancer Research Non-text part: text/html ___________________________________________________________ Please keep all replies on the list by using "reply all" in your mail client. To manage your subscriptions to this and other Galaxy lists, please use the interface at: