Skip to content

Support passing API Signing Key from the memory #131

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 8 commits into
base: main
Choose a base branch
from

Conversation

durnik-ivo
Copy link

@durnik-ivo durnik-ivo commented Mar 28, 2025

Hi, I would like to add the option to provide the OCI API Signing Key directly from the memory by adding a key attribute. This is already supported by the OCI Terraform provider and is useful when running Packer from CI/CD. The key is not inteded to be checked into the source control, but rather dynamically fetched from a secrets manager system. Setting the key overrides key_file consistently with the documented behaviour of the OCI Terraform provider.

Additionally, small refactor and improvements of the surrounding comments and error messages were done.

@durnik-ivo durnik-ivo requested a review from a team as a code owner March 28, 2025 17:49
Copy link

hashicorp-cla-app bot commented Mar 28, 2025

CLA assistant check
All committers have signed the CLA.

@durnik-ivo
Copy link
Author

Hi, @lbajolet-hashicorp, you have recently helped us (@obabec) to merge an addition of aws_secretsmanager_raw function to Packer, could you please help us with this PR as well?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant