No project description provided
Project description
Idem-Aws-Auto
aws_auto Cloud Provider for Idem
DEVELOPMENT
Clone the idem-aws-auto repository and install with pip.
git clone git@gitlab.com:my-user/idem-aws-auto.git
pip install -e idem-aws-auto
ACCT
After installation aws_auto Idem Provider execution and state modules will be accessible to the pop hub. In order to use them we need to set up our credentials.
Create a new file called credentials.yaml and populate it with profiles. The default profile will be used automatically by idem unless you specify one with –acct-profile=profile_name on the cli.
acct backends provide alternate methods for storing profiles.
The aws_auto provider uses the aws_auto acct plugin for authentication. A profile needs to specify the authentication parameters for aws_auto.
credentials.yaml
aws_auto:
default:
username: my_user
password: my_good_password
endpoint_url: https://console.aws_auto.com/api
Now encrypt the credentials file and add the encryption key and encrypted file path to the ENVIRONMENT.
The acct command should be available as it is a requisite of idem and idem_aws_auto. Encrypt the the credential file.
acct encrypt credentials.yaml
output:
-A9ZkiCSOjWYG_lbGmmkVh4jKLFDyOFH4e4S1HNtNwI=
Add these to your environment:
export ACCT_KEY="-A9ZkiCSOjWYG_lbGmmkVh4jKLFDyOFH4e4S1HNtNwI="
export ACCT_FILE=$PWD/credentials.yaml.fernet
USAGE
A profile can be specified for use with a specific state. If no profile is specified, the profile called “default”, if one exists, will be used:
ensure_user_exists:
aws_auto.user.present:
- acct_profile: my-staging-env
- name: a_user_name
- kwarg1: val1
It can also be specified from the command line when executing states.
idem state --acct-profile my-staging-env my_state.sls
It can also be specified from the command line when calling an exec module directly.
idem exec --acct-profile my-staging-env aws_auto.user.list
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file idem-aws-auto-0.1.0.tar.gz
.
File metadata
- Download URL: idem-aws-auto-0.1.0.tar.gz
- Upload date:
- Size: 2.7 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.2 importlib_metadata/4.6.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | fb655663ad03598e11c408289e0b0f0cf922c07989c6dc395f2332106b84f0a6 |
|
MD5 | be5a5ecb4a8ff182f78b3d4bcaf0ada6 |
|
BLAKE2b-256 | 69aafe7ec8a6885d36be7e027fcf714400b270ec8025e0c74444f2e316bf8c0d |
File details
Details for the file idem_aws_auto-0.1.0-py3-none-any.whl
.
File metadata
- Download URL: idem_aws_auto-0.1.0-py3-none-any.whl
- Upload date:
- Size: 6.2 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.2 importlib_metadata/4.6.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 655693ae555621d789db6d127b92ddbad98ad82d874dd6c314808736f6974d1f |
|
MD5 | 64d8f2c2bcd63c82da2f4d99314049f0 |
|
BLAKE2b-256 | 452c38bb5f575793fc4adb51517dd641be052813d3babd008877ddee93d56d54 |