CLI tool for managing AWS Organization accounts with Control Tower
Project description
aillc-org โ Control Tower + Direct StackSets Landing Zone ๐
Enterprise-ready AWS Organization management with automated account provisioning, Control Tower integration, and comprehensive CI/CD.
Automated AWS multi-account landing zone. Set it up once, never touch it again. New accounts auto-provision based on their OU placement.
๐ Documentation
| Document | Description |
|---|---|
| Getting Started | Quick setup guide and first steps |
| Configuration | Environment variables and settings |
| Architecture | System design and components |
| Development | Development setup and guidelines |
| API Reference | Auto-generated API documentation |
๐ Live Dashboards
| ๐ Documentation | ๐งช Unit Tests | ๐ฌ Integration Tests | ๐ Coverage | ๐ Security | โ๏ธ Compliance |
|---|
๐ Key Development Characteristics
| Characteristic | Details |
|---|---|
| Package Manager | uv (10-100x faster than pip/poetry) |
| Deployment Model | Tag-based releases to PyPI |
| Infrastructure | AWS StackSets + Service Control Policies |
| Environments | Dev โ Staging โ Production |
| Pipeline Features | Conditional deployments, Semantic release, Auto-publish |
| Quality Gates | 80% coverage, Type checking, Security scanning |
| Special Features | Control Tower integration, Auto-account provisioning |
๐ Quick Start (2 minutes)
# Prerequisites: Control Tower active, AWS SSO configured
aws sso login --profile org
# Option 1: One command setup (includes GitHub Actions role)
make quickstart
# Option 2: Step by step
make bootstrap # Create OUs and enable Control Tower baselines (idempotent)
make setup # Create GitHub Actions role (shows ARN for GitHub secrets)
make deploy # Deploy everything
make status # Verify deployment
๐ Note about Control Tower Baselines: The bootstrap command now automatically enables Control Tower baselines for all OUs under Workloads. This allows Account Factory to place accounts directly into Production/Staging OUs. This process takes ~2-3 minutes per OU.
๐ IMPORTANT: The first run creates a GitHub Actions role (OrgPipelineRole).
- Copy the ARN from
make setupoutput - Add to GitHub:
gh secret set AWS_ROLE_ARN --body 'arn:...' - This enables automated deployments via GitHub Actions
That's it! New accounts will auto-provision. Place them in:
- Production OU: Gets everything (pipelines, backups, monitoring, logging)
- Staging OU: Gets essentials (pipelines, basic monitoring)
- Sandbox OU: Gets nothing (unrestricted)
TL;DR โ What happens automatically
Production Account Creation:
- Place in Workloads/Production OU
- Gets everything: Pipeline resources, monitoring, backups, log aggregation
- Email notification with .env-ready configuration
Staging Account Creation:
- Place in Workloads/Staging OU
- Gets essentials: Pipeline resources, basic monitoring
- No backups or log aggregation (cost savings)
Sandbox Account Creation:
- Place in Sandbox OU
- Gets nothing: Complete freedom, no restrictions
Within ~5 minutes, accounts are ready for sam deploy
Architecture (Simple + Automated)
- Control Tower manages: Security OU, Sandbox OU, Log Archive, Audit, CloudTrail, Config, SSO
- You manage: Workloads OU with Production/Staging nested underneath
- StackSets auto-deploy based on OU placement:
- Workloads level: Pipeline resources, monitoring, cost management
- Production only: Backup vaults, log aggregation
- Management only: Account creation notifications
- Per product: Two accounts (
product-staging,product-prod) - DNS pattern: Prod owns apex (
example.com), staging owns subdomain (staging.example.com)
Prerequisites
โ Before you start, ensure:
- AWS Control Tower is activated
- You have Management account access via SSO
- AWS CLI v2 installed with SSO configured
- Python 3.9+ installed
.envfile created withNOTIFICATIONS_EMAIL=your-email@example.com
How It Works
The make quickstart command:
- Creates the OU structure (Workloads โ Production/Staging)
- Deploys 7 StackSets with auto-deployment enabled
- Attaches SCPs to Workloads OU
- Sets up email notifications for new accounts
After this, every new account automatically gets resources based on its OU:
| Resource | Production | Staging | Sandbox |
|---|---|---|---|
| S3 Pipeline Bucket | โ | โ | โ |
| GitHub OIDC Roles | โ | โ | โ |
| CloudWatch Monitoring | โ | โ | โ |
| Budget Alerts | โ | โ | โ |
| Automated Backups | โ | โ | โ |
| Centralized Logging | โ | โ | โ |
| Security Policies | โ | โ | โ |
Manual Deployment (Advanced)
If you prefer to understand each step or need to customize:
Step 1: Create OU Structure
# Create parent Workloads OU
WORKLOADS_OU=$(aws organizations create-organizational-unit \
--parent-id $(aws organizations list-roots --query 'Roots[0].Id' --output text --profile org) \
--name Workloads \
--query 'OrganizationalUnit.Id' \
--output text \
--profile org)
# Create Production OU under Workloads
PROD_OU=$(aws organizations create-organizational-unit \
--parent-id $WORKLOADS_OU \
--name Production \
--query 'OrganizationalUnit.Id' \
--output text \
--profile org)
# Create Staging OU under Workloads
STAGING_OU=$(aws organizations create-organizational-unit \
--parent-id $WORKLOADS_OU \
--name Staging \
--query 'OrganizationalUnit.Id' \
--output text \
--profile org)
echo "Workloads OU: $WORKLOADS_OU"
echo "Production OU: $PROD_OU"
echo "Staging OU: $STAGING_OU"
Step 2: Deploy Management Account Resources
Account Notifications (Management Account Only)
# Deploy notification system for new account creation
aws cloudformation create-stack-set \
--stack-set-name account-notifications \
--template-body file://stacksets/05-account-notifications/template.yaml \
--parameters ParameterKey=NotificationEmail,ParameterValue=your-email@example.com \
--capabilities CAPABILITY_IAM CAPABILITY_NAMED_IAM \
--profile org
# Deploy to Management account only
aws cloudformation create-stack-instances \
--stack-set-name account-notifications \
--accounts $(aws sts get-caller-identity --query 'Account' --output text --profile org) \
--regions us-east-1 \
--profile org
Step 3: Deploy StackSets to Workloads OU
A) Pipeline Bootstrap Resources
# Create the StackSet with auto-deployment enabled
aws cloudformation create-stack-set \
--stack-set-name pipeline-bootstrap \
--template-body file://stacksets/01-pipeline-bootstrap/template.yaml \
--capabilities CAPABILITY_NAMED_IAM \
--auto-deployment Enabled=true,RetainStacksOnAccountRemoval=false \
--profile org
# Deploy to Workloads OU (auto-deploys to both Production and Staging!)
aws cloudformation create-stack-instances \
--stack-set-name pipeline-bootstrap \
--deployment-targets OrganizationalUnitIds=$WORKLOADS_OU \
--regions us-east-1 \
--profile org
B) GitHub OIDC + Deploy Role
# Create StackSet
aws cloudformation create-stack-set \
--stack-set-name github-oidc \
--template-body file://stacksets/02-github-oidc/template.yaml \
--parameters ParameterKey=GitHubOrg,ParameterValue=svange \
--capabilities CAPABILITY_NAMED_IAM \
--auto-deployment Enabled=true,RetainStacksOnAccountRemoval=false \
--profile org
# Deploy to Workloads OU
aws cloudformation create-stack-instances \
--stack-set-name github-oidc \
--deployment-targets OrganizationalUnitIds=$WORKLOADS_OU \
--regions us-east-1 \
--profile org
C) Monitoring
# Create StackSet
aws cloudformation create-stack-set \
--stack-set-name monitoring-baseline \
--template-body file://stacksets/03-monitoring/template.yaml \
--parameters ParameterKey=AlarmEmail,ParameterValue=your-email@example.com \
--capabilities CAPABILITY_NAMED_IAM \
--auto-deployment Enabled=true,RetainStacksOnAccountRemoval=false \
--profile org
# Deploy to Workloads OU
aws cloudformation create-stack-instances \
--stack-set-name monitoring-baseline \
--deployment-targets OrganizationalUnitIds=$WORKLOADS_OU \
--regions us-east-1 \
--profile org
D) Cost Management
# Create StackSet
aws cloudformation create-stack-set \
--stack-set-name cost-management \
--template-body file://stacksets/04-cost-management/template.yaml \
--parameters \
ParameterKey=BudgetEmail,ParameterValue=your-email@example.com \
ParameterKey=MonthlyBudget,ParameterValue=1000 \
--capabilities CAPABILITY_NAMED_IAM \
--auto-deployment Enabled=true,RetainStacksOnAccountRemoval=false \
--profile org
# Deploy to Workloads OU
aws cloudformation create-stack-instances \
--stack-set-name cost-management \
--deployment-targets OrganizationalUnitIds=$WORKLOADS_OU \
--regions us-east-1 \
--profile org
Step 4: Deploy Production-Only StackSets
A) Log Aggregation
# Create StackSet
aws cloudformation create-stack-set \
--stack-set-name log-aggregation \
--template-body file://stacksets/06-log-aggregation/template.yaml \
--parameters ParameterKey=LogArchiveAccountId,ParameterValue=405826043153 \
--capabilities CAPABILITY_IAM \
--auto-deployment Enabled=true,RetainStacksOnAccountRemoval=false \
--profile org
# Deploy to Production OU only
aws cloudformation create-stack-instances \
--stack-set-name log-aggregation \
--deployment-targets OrganizationalUnitIds=$PROD_OU \
--regions us-east-1 \
--profile org
B) Backup Strategy
# Create StackSet
aws cloudformation create-stack-set \
--stack-set-name backup-strategy \
--template-body file://stacksets/07-backup-strategy/template.yaml \
--capabilities CAPABILITY_IAM CAPABILITY_NAMED_IAM \
--auto-deployment Enabled=true,RetainStacksOnAccountRemoval=false \
--profile org
# Deploy to Production OU only
aws cloudformation create-stack-instances \
--stack-set-name backup-strategy \
--deployment-targets OrganizationalUnitIds=$PROD_OU \
--regions us-east-1 \
--profile org
Step 5: Apply Service Control Policies
# Create the SCP
aws organizations create-policy \
--name workloads-baseline \
--description "Baseline security for workload accounts" \
--type SERVICE_CONTROL_POLICY \
--content file://stacksets/scps/workloads-baseline.json \
--profile org
# Attach to Workloads OU (inherited by Production and Staging)
aws organizations attach-policy \
--policy-id p-xxxxxxxx \
--target-id $WORKLOADS_OU \
--profile org
Step 6: Create Workload Accounts
Use Control Tower Account Factory (console) or CLI:
# Example: Create staging account for project
aws organizations create-account \
--email project-staging@yourcompany.com \
--account-name "project-staging" \
--profile org
# Example: Create production account
aws organizations create-account \
--email project-prod@yourcompany.com \
--account-name "project-prod" \
--profile org
# Move to appropriate OU based on environment
# For production:
aws organizations move-account \
--account-id 123456789012 \
--source-parent-id r-xxxx \
--destination-parent-id $PROD_OU \
--profile org
# For staging:
aws organizations move-account \
--account-id 123456789013 \
--source-parent-id r-xxxx \
--destination-parent-id $STAGING_OU \
--profile org
StackSets automatically deploy to new accounts!
Step 7: Verify Automation
# Check StackSet instances deployed
aws cloudformation list-stack-instances \
--stack-set-name pipeline-bootstrap \
--profile org
# Switch to new account and verify resources
aws sts assume-role \
--role-arn arn:aws:iam::NEW-ACCOUNT-ID:role/OrganizationAccountAccessRole \
--role-session-name verify \
--profile org
# List resources (should see bucket, roles, etc.)
aws s3 ls
aws iam list-roles | grep -E "(SAMDeployRole|cfn-exec-role)"
GitHub Actions Deployment
In your project's .github/workflows/deploy.yml:
name: Deploy to AWS
on:
push:
branches: [main]
jobs:
deploy:
runs-on: ubuntu-latest
permissions:
id-token: write
contents: read
steps:
- uses: actions/checkout@v3
- uses: aws-actions/configure-aws-credentials@v2
with:
role-to-assume: arn:aws:iam::ACCOUNT-ID:role/SAMDeployRole
aws-region: us-east-1
- run: sam deploy --no-confirm-changeset --no-fail-on-empty-changeset
DNS Setup (Per Project)
For each project with a domain:
Production account:
# Create hosted zone for apex domain
aws route53 create-hosted-zone --name example.com --caller-reference $(date +%s)
Staging account:
# Create hosted zone for subdomain
aws route53 create-hosted-zone --name staging.example.com --caller-reference $(date +%s)
In production account, delegate to staging:
# Get staging nameservers and create NS record
# (See stacksets/dns/ for helper templates)
What's Automated
Production Accounts Get:
- โ
S3 artifacts bucket (
aws-sam-cli-managed-*) - โ CloudFormation execution role
- โ GitHub OIDC provider + SAMDeployRole
- โ CloudWatch alarms for serverless
- โ Budget alerts + anomaly detection
- โ Automated daily backups
- โ Centralized log aggregation
- โ Email notification on creation
- โ Security baseline via SCPs
Staging Accounts Get:
- โ S3 artifacts bucket
- โ CloudFormation execution role
- โ GitHub OIDC provider + SAMDeployRole
- โ CloudWatch alarms
- โ Budget alerts
- โ Security baseline via SCPs
- โ No backups (cost savings)
- โ No log aggregation (noise reduction)
Sandbox Accounts Get:
- โ Nothing (complete freedom)
Verification Checklist
After creating a new account:
- StackSet instances show
SUCCEEDEDstatus - S3 bucket
aws-sam-cli-managed-{account}-{region}exists - IAM role
SAMDeployRoleexists - IAM role
aws-sam-cli-cfn-exec-roleexists - GitHub Actions can assume role and deploy
- Budget alerts are configured
- Cost anomaly detector is active
Naming Conventions
- Accounts:
{project}-staging,{project}-prod - OU Structure:
Workloads/ โโโ Production/ ({project}-prod accounts) โโโ Staging/ ({project}-staging accounts) - StackSets: Numbered prefixes for clarity
01-pipeline-bootstrap02-github-oidc03-monitoring04-cost-management05-account-notifications06-log-aggregation07-backup-strategy
- Staging subdomain:
staging.{domain}.com
๐ Setting Up a New Project (Staging + Production)
This guide walks through creating AWS accounts for a new project with both staging and production environments. Accounts are automatically provisioned with all necessary resources based on their OU placement.
Prerequisites
- Access to AWS Control Tower console (Management account)
- AWS CLI configured with
orgprofile - This infrastructure deployed (
make quickstartcompleted)
Method 1: Using AWS Console (Recommended)
Step 1: Create Staging Account
-
Navigate to Control Tower Account Factory
- AWS Console โ Control Tower โ Account factory โ Create account
-
Fill in account details:
- Account name:
projectname-staging(e.g.,myapp-staging) - Account email:
projectname-staging@yourcompany.com - AWS SSO email: Your admin email
- AWS SSO first/last name: Your name
- Organizational unit: Workloads/Staging (or just Workloads if nested OUs don't appear)
- Click "Create account"
Note: If Production/Staging OUs don't appear in the dropdown, place in Workloads and move later using the CLI commands below.
- Account name:
-
Wait for provisioning (~5 minutes)
- Control Tower creates the account
- StackSets auto-deploy pipeline resources
- You'll receive email notification with .env config
Step 2: Create Production Account
-
Return to Account Factory
- Create another account
-
Fill in account details:
- Account name:
projectname-prod(e.g.,myapp-prod) - Account email:
projectname-prod@yourcompany.com - AWS SSO email: Your admin email
- AWS SSO first/last name: Your name
- Organizational unit: Workloads/Production
- Click "Create account"
- Account name:
-
Wait for provisioning (~5 minutes)
- Production account gets full suite (backups, logging, etc.)
- Email notification with .env config
Method 2: Using AWS CLI
Quick Setup Script
# Set your project name
PROJECT="myapp"
COMPANY_EMAIL_DOMAIN="yourcompany.com"
# Create staging account
aws organizations create-account \
--email "${PROJECT}-staging@${COMPANY_EMAIL_DOMAIN}" \
--account-name "${PROJECT}-staging" \
--profile org
# Create production account
aws organizations create-account \
--email "${PROJECT}-prod@${COMPANY_EMAIL_DOMAIN}" \
--account-name "${PROJECT}-prod" \
--profile org
# Get account IDs (after ~5 minutes)
STAGING_ID=$(aws organizations list-accounts \
--query "Accounts[?Name=='${PROJECT}-staging'].Id" \
--output text --profile org)
PROD_ID=$(aws organizations list-accounts \
--query "Accounts[?Name=='${PROJECT}-prod'].Id" \
--output text --profile org)
echo "Staging Account: ${STAGING_ID}"
echo "Production Account: ${PROD_ID}"
# Get OU IDs (cached from initial setup)
STAGING_OU=$(aws organizations list-organizational-units-for-parent \
--parent-id $(aws organizations list-roots --query 'Roots[0].Id' --output text --profile org) \
--query "OrganizationalUnits[?Name=='Staging'].Id" \
--output text --profile org)
PROD_OU=$(aws organizations list-organizational-units-for-parent \
--parent-id $(aws organizations list-roots --query 'Roots[0].Id' --output text --profile org) \
--query "OrganizationalUnits[?Name=='Production'].Id" \
--output text --profile org)
# Move accounts to correct OUs
aws organizations move-account \
--account-id "${STAGING_ID}" \
--source-parent-id $(aws organizations list-roots --query 'Roots[0].Id' --output text --profile org) \
--destination-parent-id "${STAGING_OU}" \
--profile org
aws organizations move-account \
--account-id "${PROD_ID}" \
--source-parent-id $(aws organizations list-roots --query 'Roots[0].Id' --output text --profile org) \
--destination-parent-id "${PROD_OU}" \
--profile org
echo "โ
Accounts created and moved to correct OUs"
echo "โณ StackSets will auto-deploy in ~5 minutes"
echo "๐ง Check email for .env configurations"
Post-Creation Setup
1. Configure AWS CLI Profiles
# Add to ~/.aws/config
PROJECT="myapp" # Your project name
cat >> ~/.aws/config << EOF
[profile ${PROJECT}-staging]
role_arn = arn:aws:iam::${STAGING_ID}:role/OrganizationAccountAccessRole
source_profile = org
region = us-east-1
[profile ${PROJECT}-prod]
role_arn = arn:aws:iam::${PROD_ID}:role/OrganizationAccountAccessRole
source_profile = org
region = us-east-1
EOF
# Test access
aws sts get-caller-identity --profile ${PROJECT}-staging
aws sts get-caller-identity --profile ${PROJECT}-prod
2. Set Up Your Project Repository
Create .env.staging and .env.prod files in your project using configs from email notifications:
# .env.staging
AWS_ACCOUNT_ID=<staging-account-id>
AWS_REGION=us-east-1
AWS_PROFILE=myapp-staging
AWS_ROLE_ARN=arn:aws:iam::<staging-account-id>:role/SAMDeployRole
SAM_CLI_TELEMETRY=false
ARTIFACTS_BUCKET=aws-sam-cli-managed-<staging-account-id>-us-east-1
STACK_NAME=myapp-staging
# .env.prod
AWS_ACCOUNT_ID=<prod-account-id>
AWS_REGION=us-east-1
AWS_PROFILE=myapp-prod
AWS_ROLE_ARN=arn:aws:iam::<prod-account-id>:role/SAMDeployRole
SAM_CLI_TELEMETRY=false
ARTIFACTS_BUCKET=aws-sam-cli-managed-<prod-account-id>-us-east-1
STACK_NAME=myapp-prod
3. Configure GitHub Actions
# .github/workflows/deploy.yml
name: Deploy Application
on:
push:
branches: [main, staging]
jobs:
deploy-staging:
if: github.ref == 'refs/heads/staging'
runs-on: ubuntu-latest
permissions:
id-token: write
contents: read
steps:
- uses: actions/checkout@v4
- uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: arn:aws:iam::STAGING_ID:role/SAMDeployRole
aws-region: us-east-1
- run: sam deploy --config-env staging
deploy-production:
if: github.ref == 'refs/heads/main'
runs-on: ubuntu-latest
permissions:
id-token: write
contents: read
steps:
- uses: actions/checkout@v4
- uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: arn:aws:iam::PROD_ID:role/SAMDeployRole
aws-region: us-east-1
- run: sam deploy --config-env prod
4. Deploy Your First Application
# Deploy to staging
sam deploy --guided --profile myapp-staging
# Deploy to production
sam deploy --guided --profile myapp-prod
What Gets Auto-Provisioned
| Resource | Staging | Production | Purpose |
|---|---|---|---|
| S3 Artifacts Bucket | โ | โ | SAM/CFN deployments |
| GitHub OIDC + Roles | โ | โ | CI/CD authentication |
| CloudWatch Alarms | โ | โ | API/Lambda monitoring |
| Budget Alerts | โ | โ | Cost control |
| Backup Vaults | โ | โ | Automated backups |
| Log Aggregation | โ | โ | Centralized logging |
| Email Notifications | Auto | Auto | Account ready email |
Verification Checklist
- Both accounts show in
aws organizations list-accounts --profile org - Accounts are in correct OUs (check AWS Console โ Organizations)
- StackSet instances deployed:
make status - Received email notifications with .env configs
- Can assume roles:
aws sts get-caller-identity --profile PROJECT-staging - S3 buckets created:
aws s3 ls --profile PROJECT-staging - GitHub Actions can deploy (create a test PR)
Troubleshooting
Account creation stuck:
- Check CloudFormation in management account for Control Tower stacks
- Account creation typically takes 5-20 minutes
Production/Staging OUs don't appear in Account Factory:
- Run
make bootstrapto enable Control Tower baselines for nested OUs - Wait 2-3 minutes for baseline enablement to complete
- Refresh Account Factory page
- If still not appearing, create in Workloads OU and move with CLI
StackSets not deploying:
- Verify account is in correct OU
- Run
make statusto check StackSet health - Check CloudFormation StackSet operations for errors
Can't assume role:
- Ensure Control Tower provisioning completed
- Verify AWS SSO is configured for the account
- Check role exists:
aws iam get-role --role-name OrganizationAccountAccessRole --profile PROJECT-staging
Common Operations
Check Status
make status # Shows OUs, StackSets, and deployment health
Create a New Account
- Use Control Tower Account Factory (or AWS Organizations)
- Choose the appropriate OU:
- Production for production workloads
- Staging for development/testing
- Sandbox for experiments
- Wait ~5 minutes for auto-provisioning
- Check email for account details and .env configuration
Update StackSets
make deploy # Re-deploys with latest templates (idempotent)
Clean Up
make destroy # Removes all StackSets (requires confirmation)
Troubleshooting
StackSet instance failed:
aws cloudformation describe-stack-set-operation \
--stack-set-name pipeline-bootstrap \
--operation-id xxxxx-xxxx-xxxx \
--profile org
Resources not appearing:
- Wait 5-10 minutes (StackSets are eventually consistent)
- Check account is in correct OU
- Verify StackSet has auto-deployment enabled
GitHub Actions can't assume role:
- Verify GitHub org/repo in OIDC trust policy
- Check OIDC provider thumbprint is current
- Ensure workflow has
id-token: writepermission
Next Steps
- Migrate existing workloads - Create accounts via Account Factory
- Set up domains - Use DNS helper templates
- Configure monitoring - Customize CloudWatch alarms
- Tune budgets - Adjust thresholds per account
- Add team members - Grant SSO access to specific accounts
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file augint_org-0.2.1.tar.gz.
File metadata
- Download URL: augint_org-0.2.1.tar.gz
- Upload date:
- Size: 240.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
59752006ba134c672f647e557f235290451f3687841560364bb985c7d74629e0
|
|
| MD5 |
ab34d73d04afe0025e190ab72863d923
|
|
| BLAKE2b-256 |
ff63e8b952c8aac05a82ef9a64bd74c501b84473f62cb324e8ace9b5d3fb1e1e
|
Provenance
The following attestation bundles were made for augint_org-0.2.1.tar.gz:
Publisher:
publish.yaml on Augmenting-Integrations/aillc-org
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
augint_org-0.2.1.tar.gz -
Subject digest:
59752006ba134c672f647e557f235290451f3687841560364bb985c7d74629e0 - Sigstore transparency entry: 542270396
- Sigstore integration time:
-
Permalink:
Augmenting-Integrations/aillc-org@833fc67b1eb3dd6e5bdd60beafcc4928fdf53bc7 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/Augmenting-Integrations
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yaml@833fc67b1eb3dd6e5bdd60beafcc4928fdf53bc7 -
Trigger Event:
push
-
Statement type:
File details
Details for the file augint_org-0.2.1-py3-none-any.whl.
File metadata
- Download URL: augint_org-0.2.1-py3-none-any.whl
- Upload date:
- Size: 57.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
06a1fe9b9aa451150cfe0728811ffce73f86c855f6cc659d57565fc31dd7b2ab
|
|
| MD5 |
5f817b11ec967b586201e81cb791f397
|
|
| BLAKE2b-256 |
65e89583c69a918fa954084cb910462a6a5f6bfcd93293b0a16098539c7b6533
|
Provenance
The following attestation bundles were made for augint_org-0.2.1-py3-none-any.whl:
Publisher:
publish.yaml on Augmenting-Integrations/aillc-org
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
augint_org-0.2.1-py3-none-any.whl -
Subject digest:
06a1fe9b9aa451150cfe0728811ffce73f86c855f6cc659d57565fc31dd7b2ab - Sigstore transparency entry: 542270414
- Sigstore integration time:
-
Permalink:
Augmenting-Integrations/aillc-org@833fc67b1eb3dd6e5bdd60beafcc4928fdf53bc7 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/Augmenting-Integrations
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yaml@833fc67b1eb3dd6e5bdd60beafcc4928fdf53bc7 -
Trigger Event:
push
-
Statement type: