Skip to content

andrewjhumphrey/awscli-keyring

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AWS CLI Keyring

AWS command line credentials from OS X Keychain, or anything else Keyring supports.

Usage

Install with pip/setuptools:

$ pip install awscli-keyring

Turn it on and add some credentials:

$ aws configure set plugins.keyring awscli_keyring
$ aws keyring add
AWS Access Key ID [None]: ...
AWS Secret Acess Key [None]: ...
$ aws ec2 describe-instances
{ ... }

This will change your config like:

# ~/.aws/config
[plugins]
keyring = awscli_keyring

[default]
keyring = true

If you already have credentials, it will use them as defaults, but will not remove them from your configuration. We encourage you to rotate your credentials, put the new ones in keyring and remove the old ones.

You can also add keyring credentials for different profiles:

$ aws --profile work keyring add
AWS Access Key ID [None]: ...
AWS Secret Acess Key [None]: ...
$ aws --profile work ec2 describe-instances
{ ... }

Which adds the keyring flag to the profile configuration:

# ~/.aws/config
# ...

[profile work]
keyring = true

If you need to see the credentials, or use other command line tools that require credentials in your env, use show. Adding --export will prefix each line with export.

$ aws keyring show
AWS_ACCESS_KEY_ID="..."
AWS_SECRET_ACCESS_KEY="..."

$ eval "$(aws keyring show --export)"

$ env | grep AWS
AWS_ACCESS_KEY_ID="..."
AWS_SECRET_ACCESS_KEY="..."

# now do whatever... then close your shell.

About

AWS CLI Keyring

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 100.0%