Skip to main content

An aws-adfs spinoff that fits BYU's needs

Project description

AWSLOGIN

Python script for CLI and SDK access to AWS via ADFS while requiring MFA access using https://duo.com/

History and Purpose

BYU used to use the great aws-adfs CLI tool to login to our AWS accounts. It worked great, especially the DUO 2FA support. Eventually, we decided to write our own similar tool but make it BYU-specific so that we could tailor it to our needs (which basically means hard-code certain BYU-specific things) and remove some of the required parameters. Since this tool will be used by BYU employees only we had that option. We then morphed it a little more for our use cases. This isn't something that you could use outside of BYU, sorry.

DUO 2FA Requirements

In order for Duo 2FA to work properly Automatic Push needs to be enabled.

Installation

  • Python 3.6+ is recommended as python2 is EOL January 2020.
  • It is highly recommended to use an application like Pipx to install and use python cli applications.
  • Follow the pipx installation documentation then simply run pipx install byu_awslogin
  • Experimental Binaries are available on the releases page. These are new and in testing Releases
  • See the installation options For additional options page for step by step instructions for installing in various environments

Upgrading

If you already have byu_awslogin install and are looking to upgrade simply run

pip3 install --upgrade byu_awslogin or pip install --upgrade byu_awslogin as appropriate for your python installation

Usage

awslogin defaults to the default profile in your ~/.aws/config and ~/.aws/credentials files. *If you already have a default profile you want to save in your ~/.aws files make sure to do that before running awslogin.*

Once you're logged in, you can execute commands using the AWS CLI or AWS SDK. Try running aws s3 ls.

Currently, AWS temporary credentials are only valid for 1 hour. We cache your ADFS session, however, so you can just re-run awslogin again to get a new set of AWS credentials without logging in again to ADFS. Your ADFS login session is valid for 8 hours, after which time you'll be required to login to ADFS again to obtain a new session.

To switch accounts after you've already authenticated to an account, just run awslogin again and select a new account/role combination.

To use it:

  • Run awslogin and it will prompt you for the AWS account and role to use.
  • Run awslogin --account <account name> --role <role name> to skip the prompting for account and name. You could specify just one of the arguments as well.
  • Run awslogin --profile <profile name> to specifiy an alternative profile
  • Run awslogin --region <region name> to specify a different region. The default region is us-west-2.
  • Run awslogin --status for the current status of the default profile
  • Run awslogin --status --profile dev for the current status of the dev profile
  • Run awslogin --status --profile all for the current status of the all profiles
  • Run awslogin --logout to logout of a cached ADFS session
  • Run awslogin --version to display the running version of awslogin
  • Run awslogin --help for full help message

Bash or ZSH Completion

Bash:

  • Run the following: _AWSLOGIN_COMPLETE=source awslogin > ~/_awslogin Then add source /path/to/_awslogin to .bashrc

ZSH:

  • Run the following: _AWSLOGIN_COMPLETE=source_zsh awslogin > ~/_awslogin Then add source /path/to/_awslogin to .zshrc

Alternatively put the _awslogin in your /etc/bash_completion.d or similiar directory (~/.zfunc) to load at shells startup

To test if it works run awslogin at least once for the account and role cache to populate. On next login awslogin -a [TAB][TAB] should output available accounts and awslogin -a {some account} -r [TAB][TAB] should output available roles for the selected account

Limitation: Accounts and Role completion at the CLI is loaded from a cache file. This file will be updated anytime awslogin is ran.

Reporting bugs or requesting features

  • Enter an issue on the github repo.
  • Or, even better if you can, fix the issue and make a pull request.

Deploying changes

  • Update the version in pyproject.toml and __version__.py
  • Commit the changes and push.
  • Build binaries
  • Create a new release (add binaries and sha256sums.txt) with the version number and Github Actions will build, test and publish

TODO

  • Write tests
    • Write more tests to increase overall coverage

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

byu_awslogin-0.15.2.tar.gz (19.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

byu_awslogin-0.15.2-py2.py3-none-any.whl (20.6 kB view details)

Uploaded Python 2Python 3

File details

Details for the file byu_awslogin-0.15.2.tar.gz.

File metadata

  • Download URL: byu_awslogin-0.15.2.tar.gz
  • Upload date:
  • Size: 19.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.1.4 CPython/3.7.7 Darwin/20.3.0

File hashes

Hashes for byu_awslogin-0.15.2.tar.gz
Algorithm Hash digest
SHA256 9a49ee74c4d8c0e014236fa8b07f511889c63d588f69d5283afab4932ccc0794
MD5 f025a5b1ccfa506fa95515c7e61929f9
BLAKE2b-256 abe6213918472fdd536156c9283eb95d1c71a14c0a3a65ee3819de40e70a0f93

See more details on using hashes here.

File details

Details for the file byu_awslogin-0.15.2-py2.py3-none-any.whl.

File metadata

  • Download URL: byu_awslogin-0.15.2-py2.py3-none-any.whl
  • Upload date:
  • Size: 20.6 kB
  • Tags: Python 2, Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.1.4 CPython/3.7.7 Darwin/20.3.0

File hashes

Hashes for byu_awslogin-0.15.2-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 7912fe3f64d1410492f9ab36fcbc9e3c847e700b89b552cfe6a8a099418025bd
MD5 629d74f63ffd1e429f4b1434b10f0a13
BLAKE2b-256 88c08921852e737be242375eb7f394f25be49a077c7a7200b667895fece21703

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page