A vault for securely storing and accessing AWS credentials in development environments

Edit Package aws-vault

AWS Vault is a tool to securely store and access AWS credentials in a development environment.

AWS Vault stores IAM credentials in your operating system's secure keystore and then generates temporary credentials from those to expose to your shell and applications. It's designed to be complementary to the AWS CLI tools, and is aware of your profiles and configuration in ~/.aws/config.

Refresh
Refresh
Source Files
Filename Size Changed
_service 0000000718 718 Bytes
_servicedata 0000000240 240 Bytes
aws-vault-7.2.0.tar.gz 0000065001 63.5 KB
aws-vault.changes 0000017879 17.5 KB
aws-vault.spec 0000002809 2.74 KB
vendor.tar.gz 0002041905 1.95 MB
Latest Revision
Jeff Kowalczyk's avatar Jeff Kowalczyk (jfkw) accepted request 1077574 from Duarte Pousa's avatar Duarte Pousa (xenonpk) (revision 5)
- Update to version 7.2.0:
  * Fix ini output to match credentials file
  * Add a few more tests for TempCredentialsProvider
  * Prioritise source_profile over sso config
  * Update golangci-lint
  * Check session identity when creds are static
- Update to version 7.1.2:
  * Update help message
  * Add explicit removal notice + instructions for --prompt=pass
  * Remove reference to pointer
  * Update USAGE.md
  * Add typical use-cases to USAGE
  * Fix go linter complaint of unnecessary conversion
  * Fix hang on invisible tty when using 2FA where prompt=terminal in some edge cases
- Update to version 7.0.2:
  * Elevate stored credentials above source_profile
  * Remove config validtion. Debug logs show which credential source is used
  * Check if profile has stored credentials before calling credential_process
  * Bump kingpin dep
  * Clarify that server is local
  * Fix DI for cache disable
  * Fix export help message
  * Web identity profiles with role ARNs are valid
  * Use DI for useSessionCache
  * Refactor for clarity
  * Refactor for clarity
  * Use DI for UseSession
  * Return error when browser can't be opened
- Update to version 7.0.0-rc7:
  * Fix config validation
  * Fix config validation
  * Validate that configs don't have more than one source
  * Don't require master credentials for federation token
  * Fix typo
  * Shut down ec2 proxy automatically
  * Support execve syscall on all architectures that can
  * Add an env var to disable subshell help messages
  * Bump deps
  * Remove dependabot, its annoying
  * Use go 1.20
- Update to version 7.0.0-rc1:
  * Improve subshell error message
  * Bump deps
  * Don't attempt to load sso-session sections without a name
  * Check for a session token
  * Allow login with master creds in environment
  * Fix prompts required in non-tty processes
- Update to version 7.0.0-beta2:
  * Revert removal of AWS_DEFAULT_REGION. boto3 uses it
  * Fix stale in CI
  * Add region to export output
  * Use ini lib to create ini output
  * Fix export ini format
  * Update USAGE.md
- Update to version 7.0.0-beta1:
  * Continue to refine help message to improve devex
  * Remove use of old env vars
  * Update docs to reflect current metadata server behaviour
  * Fix default shell on windows
  * Make help output more consistent
  * Update docs
  * Automatically select the best prompt driver
  * Make --ecs-server the default server implementation
  * Add aws-vault export command to output creds in a variety of formats
  * Bump deps
  * Provide feedback to user when prudent
  * Remove support for parent_profile, deprecated in v5
- Update to version 7.0.0-alpha1:
  * Add new expiration env var
  * Add usage instructions
  * Only show available prompt commands
  * Remove passotp
  * Add support for mfa_process
  * Don't use sessions or roles with credentials_process
  * Add support for consuming credential_process in 'aws-vault exec'.
  * Make linting happy
  * Remove superfluous changes
  * Don't create default sso-session section
  * Handle [sso-session] section
  * Bump deps
  * Update module to v7
  * Bump golangci/golangci-lint-action from 3.3.1 to 3.4.0
  * Simplify tempCredsCreator
  * Remove specification for v4 from mfa_serial source profile setting
  * Correct `MFA_NAME` -> `MFA_DEVICE_NAME`
  * Flag Yubikey Create/Resync scripts requiring `$MFA_DEVICE_NAME` == `$IAM_USERNAME`
  * Update USAGE with new Yubikey instructions
  * Update USAGE with new multiple MFA instructions
Comments 1

John Vandenberg's avatar

Can this be submitted to openSUSE:Factory ?

openSUSE Build Service is sponsored by