-
I follow the BUILDING.md and successfully build my own bottlerocket ami. But I'm not able to share it with another account because of the error: I'm not familiar with the snapshot encryption part, is it related to the settings "signing_keys = { kms = { key_id = "abc-def-123" } }" in Infra.toml? I'm sharing with python sdk boto3: boto3.client('ec2').modify_image_attribute(
ImageId=ami_id,
LaunchPermission={
'Add': user_ids
}
) And this is similar to the rust implementation of I would be grateful if someone could help here! Update:
IAM permission |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 8 replies
-
I checked that the snapshots (os and data) are encrypted with the default kms key I went through the source code and it's using coldsnap package to upload the image to snapshot. From the code, the kms key for encryption is not configured for the ebs_client.start_snapshot, so the default key is used
How could we encrypt with custom kms key? Or how could we share it with other accounts? Thank you very much! |
Beta Was this translation helpful? Give feedback.
-
In the past, I have been able to share one of my private AMIs with another AWS account using the EC2 web console. On EC2/AMIs, after selecting an individual AMI, the Actions pulldown has an |
Beta Was this translation helpful? Give feedback.
coldsnap would first need to support a custom KMS key ARN, and then pubsys (part of twoliter) would need to allow that to be specified in
Infra.toml
, and use it if present when registering snapshots.The code changes involved should be relatively small if you want to contribute the functionality. Otherwise, you can open an issue and I can try to find a few cycles.