Python package that interfaces with AWS System Manager
Project description
python-aws-ssm
Python package that interfaces with AWS System Manager.
Why to use python-aws-ssm and not the boto3 SSM client?
This package is wrapping boto3 SSM client and hides the complexity dealing with the not so Python friendly AWS SDK. Perfect use case for this package is when secure parameters for an application are stored to AWS Parameter Store using a path hierarchy. During application startup you can use this package to fetch them and use them in your application.
Warning
The SSM service is rate-limited by default. We strongly suggest using
retrieving SSM keys by path, e.g. via ParameterStore.get_parameters_by_path()
.
This requires grouping keys by a useful path but reduces the chance of
your own services being rate-limited in turn.
Install
pip install python-aws-ssm
Examples
Basic Usage
from python_aws_ssm.parameters import ParameterStore
# Assuming you have the parameters in the following format:
# my-service/dev/param-1 -> with value `a`
# my-service/dev/param-2 -> with value `b`
parameter_store = ParameterStore()
# Requesting the base path
parameters = parameter_store.get_parameters_by_path("/my-service/dev/")
# And getting a specific value
value = parameters.get("param-1")
# value should be `a`
Required parameters on path
Requesting parameters by path is efficient but comes with an additional
burden of validation: clients typically expect a number of keys to be
present, e.g. the path /service/foo/db/
might be used to retrieve the
database credentials including the host name at /service/foo/db/hostname
.
The onus of verifying that this key is present is by default on the client.
To assert the presence of these keys automatically, pass a set of required
parameters via the parameters
keyword argument:
from python_aws_ssm.parameters import ParameterStore, MissingParameterError
# Assuming you have the following keys:
# * /service/foo/db/hostname
# * /service/foo/db/username
# * /service/foo/db/password
# * /service/foo/db/port
# * /service/foo/db/description
parameter_store = ParameterStore()
# Requesting the base path but asserting presence of required parameters
try:
parameters = parameter_store.get_parameters_by_path(
"/service/foo/db/",
required_parameters={"hostname", "username", "password", "port"}
)
except MissingParameterError as e:
# Report on the missing parameters.
print(e.msg)
else:
# Use the parameters, knowing that they exist.
print(parameters['hostname']) # guaranteed to exist.
Recursive and nested options
from python_aws_ssm.parameters import ParameterStore
# Assuming you have the parameters in the following format:
# my-service/dev/param-1 -> with value `a`
# my-service/dev/param-2 -> with value `b`
parameter_store = ParameterStore()
# Requesting the base path
parameters = parameter_store.get_parameters_by_path(
"/my-service/", recursive=True, nested=True
)
# And getting a specific value
dev_parameters = parameters.get("dev")
# value should be {"param-1": "a", "param-2": "b"}
Get parameters by name
from python_aws_ssm.parameters import ParameterStore
# Assuming you have the parameters in the following format:
# my-service/dev/param-1 -> with value `a`
# common/dev/param-2 -> with value `b`
parameter_store = ParameterStore()
# Requesting the base path
parameters = parameter_store.get_parameters(
["/my-service/dev/param-1", "/common/dev/param-2"]
)
# And getting a specific value
dev_parameters = parameters.get("/common/dev/param-2")
# value should be `b`
With custom client
from python_aws_ssm.parameters import ParameterStore
import boto3
# Initialise an SSM client to specify the source of the credentials.
# e.g. locally a profile would be more likely; an AWS Lambda would most
# likely not override the credentials source.
ssm_client = boto3.Session(profile_name='dev').client('ssm')
parameter_store = ParameterStore(ssm_client)
parameters = parameter_store.get_parameters(["/service/path/"])
Development
If you are missing any features or have found a bug, please open a PR or a new Github issue.
Setup
This project uses Poetry to manage the dependencies and the virtual environment. Follow the instructions from Poetry website (https://poetry.eustace.io/docs/#installation) to configure your local environment.
After completing the Poetry setup, the virtual environment can be created running:
make setup
Tests
Tests are run by Pytest
make test
Code style
- Mypy is used for type annotations (https://github.com/python/mypy)
- Black formatter (https://github.com/psf/black) is used to keep the coding style consistent.
- Isort (https://github.com/timothycrosley/isort) is used to sort the imports. To format the codebase just run:
make format
and to check it before pushing:
make lint
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file python-aws-ssm-1.0.0.tar.gz
.
File metadata
- Download URL: python-aws-ssm-1.0.0.tar.gz
- Upload date:
- Size: 9.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/0.12.17 CPython/3.7.1 Darwin/19.0.0
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 212641ef7354469b568fec277ee0c8855755dde5ee687f61d7c057a1b9b83c5c |
|
MD5 | f781c200f489d3378aedd557320d29e8 |
|
BLAKE2b-256 | 9e3d24a027516375267a3a7b52ed176f03b90226f7739eede6dd7044e9d0040b |
File details
Details for the file python_aws_ssm-1.0.0-py3-none-any.whl
.
File metadata
- Download URL: python_aws_ssm-1.0.0-py3-none-any.whl
- Upload date:
- Size: 13.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/0.12.17 CPython/3.7.1 Darwin/19.0.0
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | eecb69412b852d24131d3750936e3d171dce0e70a8d70120b5fed6250e096446 |
|
MD5 | 96646568d484eddfbcd47177ba17735f |
|
BLAKE2b-256 | b925555603eae755356ca670898714ba861b7eb900be40a139b68c1029e4bd67 |