Skip to main content

Automatically retrieve credentials for AWS CodeArtifact.

Project description

AWS CodeArtifact Keyring Backend

The keyrings.codeartifact package provides authentication for publishing and consuming packages within a private PyPi repository hosted on AWS CodeArtifact; it contains an extension to the keyring library that will automatically inject a time-limited access token.

Installation

To install this package, install the "keyrings.codeartifact" package using pip:

pip install keyrings.codeartifact

Usage

The keyring library has been integrated with recent versions of pip and twine. Once installed, this library will automatically supply credentials whenever pip/twine (or other keyring-enabled package) attempts to use a repository hosted within CodeArtifact. It will use any appropriate AWS credentials provided in ~/.aws/credentials by default.

--index-url https://${DOMAIN}-${ACCOUNT}.d.codeartifact.${REGION}.amazonaws.com/pypi/${REPOSITORY}/simple/

Config

This backend provides a number of configuration options to modify the behaviour of the AWS client.

The configuration options can be specified within [codeartifact] sections of the keyringrc.cfg.

Run keyring diagnose to find its as the location; it varies between different platforms.

Available options:

  • profile_name: Use a specific AWS profile to authenticate with AWS.
  • token_duration: Validity period (in seconds) for retieved authorization tokens.
  • aws_access_key_id: Use a specific AWS access key to authenticate with AWS.
  • aws_secret_access_key: Use a specific AWS secret access key to authenticate with AWS.

For more explanation of these options see the AWS CLI documentation.

Single Section Configuration

A trivial example keyringrc.cfg section for a single account:

[codeartifact]
# Tokens should only be valid for 30 minutes.
token_duration=1800

# Use the 'default' profile name.
profile_name=default

# Use the following access keys.
aws_access_key_id=xxxxxxxxx
aws_secret_access_key=xxxxxxxxx

Multiple Section Configuration (EXPERIMENTAL)

This backend can use multiple sections to select different configuration values.

Each section may also have any of the following "qualifiers" in any order:

  • domain: Matches on the repository domain.
  • account: Matches on the repository account.
  • region: Matches on the repository region.
  • name: Matches on the repository name.

When looking up a CodeArtifact URL, each matching qualifier ranks that section higher.

The section with highest score (ie: the most specific match) will be selected for that URL.

When configured in this manner, the codeartifact section will specify default values.

An example of a more advanced configuration for using multiple sections:

# These are the defaults for other sections.
[codeartifact]
token_duration=1800

# Use for any repositories in account 000000000000.
[codeartifact account="000000000000"]
profile_name=special_profile

# Use for account 999999999999 with a repository named "staging".
[codeartifact account="999999999999" name="staging"]
profile_name=staging_profile

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

keyrings_codeartifact-1.3.4.tar.gz (9.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

keyrings.codeartifact-1.3.4-py3-none-any.whl (7.3 kB view details)

Uploaded Python 3

File details

Details for the file keyrings_codeartifact-1.3.4.tar.gz.

File metadata

  • Download URL: keyrings_codeartifact-1.3.4.tar.gz
  • Upload date:
  • Size: 9.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.0.0 CPython/3.12.9

File hashes

Hashes for keyrings_codeartifact-1.3.4.tar.gz
Algorithm Hash digest
SHA256 21683aa1136eae447f8d51cd4dcbaeee292caca15ebfe4c6b2f08ce743191d62
MD5 f7f0c923748bf1a82c49854e4b19494b
BLAKE2b-256 a7748f649eacd17af6b522f3d02a35d0f9796aa1772192e29152af9c24dd404f

See more details on using hashes here.

File details

Details for the file keyrings.codeartifact-1.3.4-py3-none-any.whl.

File metadata

File hashes

Hashes for keyrings.codeartifact-1.3.4-py3-none-any.whl
Algorithm Hash digest
SHA256 46a163c76b56d3ea7c9db351ba7e6d4a13cd340e922aac2cb845e99805498be7
MD5 ec7200a93006ef70fd2332a7c0dbbfb8
BLAKE2b-256 5cb731ac7833a32225ff6e2ae94aaeddf630b3901b77c321b71b32d6762fde62

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page