A vault for securely storing and accessing AWS credentials in development environments
AWS Vault is a tool to securely store and access AWS credentials in a development environment.
AWS Vault stores IAM credentials in your operating system's secure keystore and then generates temporary credentials from those to expose to your shell and applications. It's designed to be complementary to the AWS CLI tools, and is aware of your profiles and configuration in ~/.aws/config.
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout devel:languages:go/aws-vault && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000000718 718 Bytes | |
_servicedata | 0000000240 240 Bytes | |
aws-vault-7.2.0.tar.gz | 0000065001 63.5 KB | |
aws-vault.changes | 0000017879 17.5 KB | |
aws-vault.spec | 0000002809 2.74 KB | |
vendor.tar.gz | 0002041905 1.95 MB |
Latest Revision
Jeff Kowalczyk (jfkw)
accepted
request 1077574
from
Duarte Pousa (xenonpk)
(revision 5)
- Update to version 7.2.0: * Fix ini output to match credentials file * Add a few more tests for TempCredentialsProvider * Prioritise source_profile over sso config * Update golangci-lint * Check session identity when creds are static - Update to version 7.1.2: * Update help message * Add explicit removal notice + instructions for --prompt=pass * Remove reference to pointer * Update USAGE.md * Add typical use-cases to USAGE * Fix go linter complaint of unnecessary conversion * Fix hang on invisible tty when using 2FA where prompt=terminal in some edge cases - Update to version 7.0.2: * Elevate stored credentials above source_profile * Remove config validtion. Debug logs show which credential source is used * Check if profile has stored credentials before calling credential_process * Bump kingpin dep * Clarify that server is local * Fix DI for cache disable * Fix export help message * Web identity profiles with role ARNs are valid * Use DI for useSessionCache * Refactor for clarity * Refactor for clarity * Use DI for UseSession * Return error when browser can't be opened - Update to version 7.0.0-rc7: * Fix config validation * Fix config validation * Validate that configs don't have more than one source * Don't require master credentials for federation token * Fix typo * Shut down ec2 proxy automatically * Support execve syscall on all architectures that can * Add an env var to disable subshell help messages * Bump deps * Remove dependabot, its annoying * Use go 1.20 - Update to version 7.0.0-rc1: * Improve subshell error message * Bump deps * Don't attempt to load sso-session sections without a name * Check for a session token * Allow login with master creds in environment * Fix prompts required in non-tty processes - Update to version 7.0.0-beta2: * Revert removal of AWS_DEFAULT_REGION. boto3 uses it * Fix stale in CI * Add region to export output * Use ini lib to create ini output * Fix export ini format * Update USAGE.md - Update to version 7.0.0-beta1: * Continue to refine help message to improve devex * Remove use of old env vars * Update docs to reflect current metadata server behaviour * Fix default shell on windows * Make help output more consistent * Update docs * Automatically select the best prompt driver * Make --ecs-server the default server implementation * Add aws-vault export command to output creds in a variety of formats * Bump deps * Provide feedback to user when prudent * Remove support for parent_profile, deprecated in v5 - Update to version 7.0.0-alpha1: * Add new expiration env var * Add usage instructions * Only show available prompt commands * Remove passotp * Add support for mfa_process * Don't use sessions or roles with credentials_process * Add support for consuming credential_process in 'aws-vault exec'. * Make linting happy * Remove superfluous changes * Don't create default sso-session section * Handle [sso-session] section * Bump deps * Update module to v7 * Bump golangci/golangci-lint-action from 3.3.1 to 3.4.0 * Simplify tempCredsCreator * Remove specification for v4 from mfa_serial source profile setting * Correct `MFA_NAME` -> `MFA_DEVICE_NAME` * Flag Yubikey Create/Resync scripts requiring `$MFA_DEVICE_NAME` == `$IAM_USERNAME` * Update USAGE with new Yubikey instructions * Update USAGE with new multiple MFA instructions
Comments 1
Can this be submitted to openSUSE:Factory ?