Skip to content

Latest commit

 

History

History
71 lines (51 loc) · 1.48 KB

README.md

File metadata and controls

71 lines (51 loc) · 1.48 KB

AWS CLI Keyring

AWS command line credentials from OS X Keychain, or anything else Keyring supports.

Usage

Install with pip/setuptools:

$ pip install awscli-keyring

Turn it on and add some credentials:

$ aws configure set plugins.keyring awscli_keyring
$ aws keyring add
AWS Access Key ID [None]: ...
AWS Secret Acess Key [None]: ...
$ aws ec2 describe-instances
{ ... }

This will change your config like:

# ~/.aws/config
[plugins]
keyring = awscli_keyring

[default]
keyring = true

If you already have credentials, it will use them as defaults, but will not remove them from your configuration. We encourage you to rotate your credentials, put the new ones in keyring and remove the old ones.

You can also add keyring credentials for different profiles:

$ aws --profile work keyring add
AWS Access Key ID [None]: ...
AWS Secret Acess Key [None]: ...
$ aws --profile work ec2 describe-instances
{ ... }

Which adds the keyring flag to the profile configuration:

# ~/.aws/config
# ...

[profile work]
keyring = true

If you need to see the credentials, or use other command line tools that require credentials in your env, use show. Adding --export will prefix each line with export.

$ aws keyring show
AWS_ACCESS_KEY_ID="..."
AWS_SECRET_ACCESS_KEY="..."

$ eval "$(aws keyring show --export)"

$ env | grep AWS
AWS_ACCESS_KEY_ID="..."
AWS_SECRET_ACCESS_KEY="..."

# now do whatever... then close your shell.