sceptre
gimme-aws-creds
Our great sponsors
sceptre | gimme-aws-creds | |
---|---|---|
6 | 5 | |
1,452 | 907 | |
0.2% | 1.0% | |
8.6 | 7.6 | |
6 days ago | 10 days ago | |
Python | Python | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
sceptre
-
Script or software that automatically populate specific profile in ~/.aws/credentials
See: * https://github.com/hashicorp/terraform-provider-aws/issues/10491 * https://github.com/Sceptre/sceptre/issues/674
-
Who's using AWS Proton?
our AWS SAs tried to sell us on it. but it seems worse than my current sceptre pipeline that I also run in CodePipeline 🤷♂️
-
New to AWS, looking for tips and maybe automation ideas
Cloud formation or AWS cdk. If you're leaning towards cloud formation check out some management tools like sceptre if you like the cdk idea you could also check out terraform.
-
Stackset organization from multiple yaml files
Also have a look at Cloudreach's Sceptre.
-
What is the best tool for managing CloudFormation stacks with CLI?
On the tool side you have sceptre: https://github.com/Sceptre/sceptre
-
Working in finance...
https://github.com/Sceptre/sceptre - here's a good example. Terra form knockoff written and managed by a consultancy. As part of their "services", they can code themselves into your organization for a small monthly consulting fee! Yay!
gimme-aws-creds
- Script or software that automatically populate specific profile in ~/.aws/credentials
-
Getting AWS CLI credentials through Okta SSO?
I got gimme-aws-creds (https://github.com/Nike-Inc/gimme-aws-creds) to authenticate via Okta - but no AWS roles are found in the SAML response. It works fine through the AWS console.
- How do you get CLI credentials for a federated role?
-
How to use AWS CLI with Okta?
Gimme creds works nicely: https://github.com/Nike-Inc/gimme-aws-creds
-
Securing AWS API credentials and access to AWS API
AWS has always lagged behind is offering reasonable native authentication options to its console and CLI. In order to support something like "yubikey" you need to go with another authentication and authorization provider such as Okta which provides support for a wide variety of MFA options. Then you can also use open source tooling such as https://github.com/Nike-Inc/gimme-aws-creds to grab temporary credentials. Okta is the one I'm most familiar but there are others out there as well.
What are some alternatives?
terraform - Terraform enables you to safely and predictably create, change, and improve infrastructure. It is a source-available tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
saml2aws - CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP
cloud-custodian - Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources
aws-runas - aws-runas rewritten in Go
nixops - NixOps is a tool for deploying to NixOS machines in a network or cloud.
okta-aws-cli-assume-role - Okta AWS CLI Assume Role Tool
awesome-aws - A curated list of awesome Amazon Web Services (AWS) libraries, open source repos, guides, blogs, and other resources. Featuring the Fiery Meter of AWSome.
awsume - A utility for easily assuming AWS IAM roles from the command line.
cdk-magento-webshop - This is a CDK app to provision the required resources to run a flexible, scalable, and cost-effective Magento webshop on top of AWS.
terraform-provider-aws - The AWS Provider enables Terraform to manage AWS resources.
aws-sso-util - Smooth out the rough edges of AWS SSO (temporarily, until AWS makes it better).
aws-mfa - Manage AWS MFA Security Credentials