Skip to main content

No project description provided

Project description

Idem-Aws-Auto

aws_auto Cloud Provider for Idem

DEVELOPMENT

Clone the idem-aws-auto repository and install with pip.

git clone git@gitlab.com:my-user/idem-aws-auto.git
pip install -e idem-aws-auto

ACCT

After installation aws_auto Idem Provider execution and state modules will be accessible to the pop hub. In order to use them we need to set up our credentials.

Create a new file called credentials.yaml and populate it with profiles. The default profile will be used automatically by idem unless you specify one with –acct-profile=profile_name on the cli.

acct backends provide alternate methods for storing profiles.

The aws_auto provider uses the aws_auto acct plugin for authentication. A profile needs to specify the authentication parameters for aws_auto.

credentials.yaml

aws_auto:
  default:
    username: my_user
    password: my_good_password
    endpoint_url: https://console.aws_auto.com/api

Now encrypt the credentials file and add the encryption key and encrypted file path to the ENVIRONMENT.

The acct command should be available as it is a requisite of idem and idem_aws_auto. Encrypt the the credential file.

acct encrypt credentials.yaml

output:

-A9ZkiCSOjWYG_lbGmmkVh4jKLFDyOFH4e4S1HNtNwI=

Add these to your environment:

export ACCT_KEY="-A9ZkiCSOjWYG_lbGmmkVh4jKLFDyOFH4e4S1HNtNwI="
export ACCT_FILE=$PWD/credentials.yaml.fernet

USAGE

A profile can be specified for use with a specific state. If no profile is specified, the profile called “default”, if one exists, will be used:

ensure_user_exists:
  aws_auto.user.present:
    - acct_profile: my-staging-env
    - name: a_user_name
    - kwarg1: val1

It can also be specified from the command line when executing states.

idem state --acct-profile my-staging-env my_state.sls

It can also be specified from the command line when calling an exec module directly.

idem exec --acct-profile my-staging-env aws_auto.user.list

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

idem-aws-auto-0.1.0.tar.gz (2.7 MB view details)

Uploaded Source

Built Distribution

idem_aws_auto-0.1.0-py3-none-any.whl (6.2 MB view details)

Uploaded Python 3

File details

Details for the file idem-aws-auto-0.1.0.tar.gz.

File metadata

  • Download URL: idem-aws-auto-0.1.0.tar.gz
  • Upload date:
  • Size: 2.7 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.6.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.6

File hashes

Hashes for idem-aws-auto-0.1.0.tar.gz
Algorithm Hash digest
SHA256 fb655663ad03598e11c408289e0b0f0cf922c07989c6dc395f2332106b84f0a6
MD5 be5a5ecb4a8ff182f78b3d4bcaf0ada6
BLAKE2b-256 69aafe7ec8a6885d36be7e027fcf714400b270ec8025e0c74444f2e316bf8c0d

See more details on using hashes here.

File details

Details for the file idem_aws_auto-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: idem_aws_auto-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 6.2 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.6.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.6

File hashes

Hashes for idem_aws_auto-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 655693ae555621d789db6d127b92ddbad98ad82d874dd6c314808736f6974d1f
MD5 64d8f2c2bcd63c82da2f4d99314049f0
BLAKE2b-256 452c38bb5f575793fc4adb51517dd641be052813d3babd008877ddee93d56d54

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page