Wraps the Alibaba Cloud SDK to make complicated tasks a lot simpler.
Project description
Ali CLI
Wraps the Alibaba Cloud SDK to make complicated tasks a lot simpler.
Installation
Installation is easy, run the following command to install the CLI through Pip:
pip install ali-cli
Then run the CLI using the command ali
. You should see the default help output with the supported commands.
Configuration
To connect the CLI to your Alibaba Cloud account, you will either need to use the official Aliyun CLI to
configure your credentials or create the configuration manually. To use the CLI, run aliyun configure
and follow the prompts. If you don't want
to install the official CLI, you can manually create the file ~/.aliyun/config.json
with the following contents:
{
"current": "",
"profiles": [
{
"name": "",
"mode": "AK",
"access_key_id": "ACCESS_KEY_ID",
"access_key_secret": "ACCESS_KEY_SECRET",
"sts_token": "",
"ram_role_name": "",
"ram_role_arn": "",
"ram_session_name": "",
"private_key": "",
"key_pair_name": "",
"expired_seconds": 0,
"verified": "",
"region_id": "eu-central-1",
"output_format": "json",
"language": "zh",
"site": "",
"retry_timeout": 0,
"retry_count": 0
}
]
}
Replace ACCESS_KEY_ID
with your access key ID and ACCESS_KEY_SECRET
with your access key secret. Optionally, you can change the region to the region you like (eu-central-1
is Frankfurt).
Supported services
- Key Management Service (KMS) - documentation
- Message Notification Service (MNS) - documentation
- Resource Orchestration Service (ROS) - documentation
Supported workflows
Key Management Service (KMS)
Supports listing of Customer Master Keys (CMK), encryption and decryption with and without data key.
To see a list of supported commands, use ali kms
.
Message Notification Service (MNS)
As the official Alibaba Cloud CLI has no support for Message Notification Service, we decided that it would be nice to have support for it in Ali CLI. We currently support the following operations on queues and messages.
Queue operations
Creating a queue - ali mns queue create --name NAME
Listing queues - ali mns queue list
Getting queue attributes - ali mns queue get --name NAME
Deleting a queue - ali mns queue delete --name NAME
Message operations
Sending a message - echo '{"success": true}' | ali mns queue send-message --name NAME --message-body -
Receiving a single message - ali mns queue receive-message --name NAME
Receiving a batch of messages - ali mns queue receive-messages --name NAME --num-of-messages 10
Peeking at a message - ali mns queue peek-message --name NAME
Peeking at a batch of messages - ali mns queue peek-messages --name NAME --num-of-messages 10
Deleting a message from a queue - ali mns queue delete-message --name NAME --handle RECEIPT_HANDLE
Topics and subscriptions will be supported at a later point in time.
Resource Orchestration Service (ROS)
Ali CLI supports most of the ROS functions. This allows you to deploy JSON templates as stacks, so you can use code to define your whole infrastructure.
To deploy an example bucket, run the following command:
ali ros create-stack --name ali-ros-test --template examples/ros/bucket.json --parameters BucketName=my-fancy-bucket
This will create the stack ali-ros-test
, using the template in the examples/ros/bucket.json
file and specifies the values to use for the
template parameters. You can specify multiple parameters if necessary by repeating the --parameters <key>=<val>
option as many times as you need.
Feel free to modify the stack name and templates if you like. You can also specify -
for the template, which means that it
will be read from stdin. Type or paste the template in the prompt and press Ctrl-D to send it into the CLI.
To list stacks, run ali ros describe-stacks
. This will output all the stacks in the current region.
To delete a stack, run ali ros delete-stack --name ali-ros-test
. This will remove the stack you created above, including the provisioned resources.
Although the Alibaba ROS API's only support JSON templates, Ali CLI can also deploy YAML templates. We do this by converting your YAML into JSON
before creating the stack. Examples of both JSON and YAML templates can be found in the examples/ros
directory.
Client-side cryptography with Object Storage Service (OSS)
When you store your data in the cloud, it sometimes feels a bit weird to use services like Key Management Service (KMS). With KMS, the keys that are used for encryption are generated by the cloud provider, and you have to trust them to not misuse the keys and decrypt your data. If you cannot or do not want to trust your provider, client-side encryption can be a solution for your most valuable data. Ali CLI has some basic features for automating client-side encryption, so you don't have to do it yourself. The following features are supported:
Prequisite: Generating a key
To encrypt or decrypt data, we first need a key:
ali crypto generate-key -k KEYFILE
The generated secret key will be put in the KEYFILE
path. This file is extremely important and should be kept somewhere safe. If the key file is lost,
you will lose access to all the data that has been encrypted with the key. There is no way to resolve this.
The encryption mechanism uses a Fernet symmetric key for encryption and decryption. The key's contents are
written to KEYFILE
directly. This means that anyone with access to that file is also able to decrypt your data. Be careful with handing out the keyfile
to others. Keep a copy of the key offline in a safe (on a USB stick or write the key out on paper) and remove the key from your computer as soon as you
are done with it. For convenience, you could decide to store a copy of the key online. I would suggest you to store the key separated from the data,
preferrably in the online storage solution of a different cloud provider. Be sure to enable encryption on the bucket.
Encrypting / decrypting locally
The keyfile can be used to encrypt / decrypt strings and files locally. Here are a few examples:
ali crypto encrypt -k KEYFILE -s PLAIN_TEXT # Encrypt string
ali crypto decrypt -k KEYFILE -s ENCRYPTED_STRING # Decrypt string
ali crypto encrypt -k KEYFILE -f FILE_TO_ENCRYPT # Encrypt file at path
ali crypto decrypt -k KEYFILE -f FILE_TO_DECRYPT # Decrypt file at path
As an example, let's say you want to encrypt your very secure password MyPassword1234
. To do this, follow these steps:
[leon@home ~] ali crypto generate-key -k my-key
> Successfully created secret key in my-key
[leon@home ~] ali crypto encrypt -k my-key -s MyPassword1234
> gAAAAABdhyODhPOc9UdcRQ1lTXOTZC2q-bsuhcQqhfoG4Jf... # trimmed for readability
[leon@home ~] ali crypto decrypt -k my-key -s gAAAAABdhyODhPOc9UdcRQ1lTXOTZC2q-bsuhcQqhfoG4Jf...
> MyPassword1234
File encryption only supports files, not directories.
Automatic upload / download of encrypted files to OSS
To solve the problems outlined in the introduction of this workflow, it can be very handy to employ client-side encryption when uploading sensitive files to a cloud provider's storage solution. Using Ali CLI, you can conveniently upload files and directories to a bucket, automatically encrypting them with a keyfile on your computer. When you download them again, the files will be downloaded and decrypted locally again. Only encrypted data will be transferred over the wire and stored in the OSS bucket.
The CLI commands are very simple and largely mirror the commands of the official CLI:
# Copy from local directory / file to bucket
ali crypto oss cp LOCAL_PATH oss://BUCKET/PATH -k KEYFILE
# Copy from bucket to local file / directory
ali crypto oss cp oss://BUCKET/PATH LOCAL_PATH -k KEYFILE
As the files are encrypted and decrypted locally, the keyfile is very important. If you lose it, the online data also becomes useless.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file ali-cli-0.7.3.tar.gz
.
File metadata
- Download URL: ali-cli-0.7.3.tar.gz
- Upload date:
- Size: 19.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/45.2.0 requests-toolbelt/0.9.1 tqdm/4.45.0 CPython/3.7.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6383111ef7e4ccd7c8f4d3e422af418ea524a143be59793da6fbed8421e53438 |
|
MD5 | 45f68afce6a111bc3a6886f6148b9aa2 |
|
BLAKE2b-256 | b6a77fa470b72f3178ff4deffe5d0bb77ec22fdc63f6ba682cda301821b7a475 |
File details
Details for the file ali_cli-0.7.3-py3-none-any.whl
.
File metadata
- Download URL: ali_cli-0.7.3-py3-none-any.whl
- Upload date:
- Size: 21.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/45.2.0 requests-toolbelt/0.9.1 tqdm/4.45.0 CPython/3.7.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | aa57666b4f75a404a515e21097feaf05270e48e9b02a123c96a02d0c56002ad8 |
|
MD5 | a0d2276608a8d4d4406d0b470488765b |
|
BLAKE2b-256 | 786286e9433c269adb7c476dfb6dd6e31d93a11c832a1ed5c0e60672ea58786b |