sparse-intern-71089
02/13/2021, 5:08 PMbrave-angle-33257
02/13/2021, 5:08 PM➜ api git:(master) ✗ cat ~/.aws/config
[profile mycompany-sitebuilder]
sso_start_url = <https://d-12345678.awsapps.com/start>
sso_region = us-west-2
sso_account_id = 12345678
sso_role_name = AdministratorAccess
region = us-west-2
➜ api git:(master) ✗ . awsjump mycompany-sitebuilder
Jumping into AWS profile mycompany-sitebuilder..
{
"UserId": "AAAAAAAAAAAAAAAAAAAA:me@mycompany.com",
"Account": "12345678",
"Arn": "arn:aws:sts::12345678:assumed-role/AWSReservedSSO_AdministratorAccess_12345678/me@mycompany.com"
}
➜ api git:(master) ✗ aws s3 ls
2021-02-13 09:53:21 mycompany-sitebuilder-state-prod
➜ api git:(master) ✗ pulumi login --cloud-url "<s3://mycompany-sitebuilder-state-prod?region=us-west-2>"
Logged in to My-MacBook-Pro.local as me (<s3://mycompany-sitebuilder-state-prod?region=us-west-2>)
➜ api git:(master) ✗ pulumi stack ls
error: error listing stacks: could not list bucket: blob (code=Unknown): NoCredentialProviders: no valid providers in chain. Deprecated.
For verbose messaging see aws.Config.CredentialsChainVerboseErrors
➜ api git:(master) ✗ echo $AWS_PROFILE
mycompany-sitebuilder
brave-angle-33257
02/13/2021, 5:11 PMawsjump
script just sets env vars and runs aws sts get-caller-identity
➜ Development cat ~/bin/awsjump
#!/bin/zsh
export AWS_PROFILE=$1
export AWS_DEFAULT_PROFILE=$1
echo "Jumping into AWS profile $1.."
OUT=$(aws sts get-caller-identity | jq)
echo $OUT
brave-angle-33257
02/13/2021, 5:14 PM➜ Development pulumi version
v2.20.0
brave-angle-33257
02/13/2021, 5:20 PMbrave-angle-33257
02/13/2021, 5:21 PMbillowy-army-68599
billowy-army-68599
aws sso login
eval $(aws-sso-creds export)
brave-angle-33257
02/13/2021, 5:59 PMaws-sso-credential-provider
for python, but doesn't seem to be working as advertised right nowbrave-angle-33257
02/13/2021, 6:00 PMbillowy-army-68599
brave-angle-33257
02/13/2021, 6:02 PMbillowy-army-68599
brave-angle-33257
02/13/2021, 6:04 PMbrave-angle-33257
02/13/2021, 6:05 PMbrave-angle-33257
02/13/2021, 6:05 PMget_role_credentials()
aws sso get-role-credentials --role-name <SOME_ROLE_I_CANNOT_REMEMBER> --account-id <WHATS_MY_ACCOUNT_ID_AGAIN?> --access-token <I_HAVE_TO_LOOK_THIS_UP_IN_A_FILE_WHERE?>
billowy-army-68599
brave-angle-33257
02/13/2021, 6:14 PMbrave-angle-33257
02/13/2021, 6:14 PMbillowy-army-68599
aws-sso-creds get
it'll tell you when they expire!billowy-army-68599
These credentials will expire at: Sat Jun 18 01:53:20 PST 53092
brave-angle-33257
02/13/2021, 6:22 PMbrave-angle-33257
02/13/2021, 6:22 PMbrave-angle-33257
02/13/2021, 6:23 PMThese credentials will expire at: Thu Sep 3 05:50:00 MST 53091
brave-angle-33257
02/13/2021, 6:23 PMbrave-angle-33257
02/13/2021, 6:28 PM➜ ~ env | grep AWS
➜ ~ cat ~/bin/awsso
#!/bin/zsh
export AWS_PROFILE=$1
echo "Jumping into AWS profile $1.."
eval $(aws-sso-creds export --profile $1)
aws sts get-caller-identity
➜ ~ . awsso mycompany-sitebuilder
Jumping into AWS profile mycompany-sitebuilder..
{
"UserId": "AAAAAAAAAAAAAAAA:me@mycompany.com",
"Account": "11111111111",
"Arn": "arn:aws:sts::11111111111:assumed-role/AWSReservedSSO_AdministratorAccess_aaaaaaaaaaaa/me@mycompany.com"
}
➜ ~ env | grep AWS | wc -l
4
billowy-army-68599
brave-angle-33257
02/13/2021, 6:30 PMbrave-angle-33257
02/13/2021, 6:30 PMbrave-angle-33257
02/13/2021, 6:31 PMbrave-angle-33257
02/13/2021, 6:31 PMbrave-angle-33257
02/13/2021, 6:32 PMbrave-angle-33257
02/13/2021, 8:02 PM➜ ~ aws s3 ls
An error occurred (ExpiredToken) when calling the ListBuckets operation: The provided token has expired.
brave-angle-33257
02/13/2021, 9:19 PMbrave-angle-33257
02/13/2021, 9:20 PMimportant-appointment-55126
02/13/2021, 10:15 PM