A CLI tool that allows you to log in and retrieve AWS temporary credentials using Red Hat SAML IDP
Project description
rh-aws-saml-login
A CLI tool that allows you to log in and retrieve AWS temporary credentials using Red Hat SAML IDP.
Pre-requisites
- Python 3.11 or later
- Connected to Red Hat VPN
- A Red Hat managed computer (Kerberos must be installed and configured) and you are logged in with your Red Hat account
How it works
The rh-aws-saml-login CLI is a tool that simplifies the process of logging into an AWS account via Red Hat SSO. It retrieves a SAML token from the Red Hat SSO server, then fetches and parses the AWS SSO login page to present you with a list of all available accounts and their respective roles. You can then choose your desired account and role, and rh-aws-saml-login uses the SAML token to generate temporary AWS role credentials. Finally, it spawns a new shell with the necessary AWS_ environment variables already set up, so you can immediately use the aws CLI without any further configuration.
Installation
Prerequisites
rh-aws-saml-login needs the krb5 library to work. On most system, e.g., MacOS, this library is already installed. On CSB Fedora, you need to install the Kerberos development package:
sudo dnf install krb5-devel
You also need the python3 header files for your system in order to build this tool. On CSB Fedora these are installed with:
sudo dnf install python3-devel
Recommended Installation Method
The recommended way to install rh-aws-saml-login is to use the uv tool:
uv tool install rh-aws-saml-login
and upgrade an existing installation with:
uv tool upgrade rh-aws-saml-login
Alternative Installation Methods
You can install this library from PyPI with pip:
python3 -m pip install rh-aws-saml-login
or install it with pipx:
pipx install rh-aws-saml-login
and upgrade an existing installation with:
pipx upgrade rh-aws-saml-login
Usage
Interactive mode
Just run rh-aws-saml-login to start the interactive mode. It will list all available AWS accounts and roles, and you can choose the one you want to log in to:
$ rh-aws-saml-login
__ __ __ _
_____/ /_ ____ __ _______ _________ _____ ___ / / / /___ ____ _(_)___
/ ___/ __ \______/ __ `/ | /| / / ___/_____/ ___/ __ `/ __ `__ \/ /_____/ / __ \/ __ `/ / __ \
/ / / / / /_____/ /_/ /| |/ |/ (__ )_____(__ ) /_/ / / / / / / /_____/ / /_/ / /_/ / / / / /
/_/ /_/ /_/ \__,_/ |__/|__/____/ /____/\__,_/_/ /_/ /_/_/ /_/\____/\__, /_/_/ /_/
/____/
✅ Test for a valid Kerberos ticket ...
✅ Getting SAML token ...
✅ Getting AWS accounts ...
✅ Getting temporary AWS credentials ...
Spawning a new shell. Use exit or CTRL+d to leave it!
🤓 app-sre
🚀 1234567890-app-sre
⌛ 59 minutes from now (2024-10-07 11:16:54+02:00)
$ aws s3 ls
...
This spawns a new shell with all required AWS environment variables set. See the Environment Variables section for more information.
Non-interactive mode
Instead of running the interactive mode, you can also use rh-aws-saml-login to run any arbitrary command with the AWS environment variables set:
rh-aws-saml-login <ACCOUNT_NAME> -- <COMMAND> [ARGUMENTS]
For example:
$ rh-aws-saml-login app-sre-stage -- aws s3 ls
__ __ __ _
_____/ /_ ____ __ _______ _________ _____ ___ / / / /___ ____ _(_)___
/ ___/ __ \______/ __ `/ | /| / / ___/_____/ ___/ __ `/ __ `__ \/ /_____/ / __ \/ __ `/ / __ \
/ / / / / /_____/ /_/ /| |/ |/ (__ )_____(__ ) /_/ / / / / / / /_____/ / /_/ / /_/ / / / / /
/_/ /_/ /_/ \__,_/ |__/|__/____/ /____/\__,_/_/ /_/ /_/_/ /_/\____/\__, /_/_/ /_/
/____/
✅ Test for a valid Kerberos ticket ...
✅ Getting SAML token ...
✅ Getting AWS accounts ...
✅ Getting temporary AWS credentials ...
2022-05-17 13:48:49 bucket-name-stage
2022-12-13 13:21:02 bucket-name-tfstate-stage
Thank you for using rh-aws-saml-login. 🙇♂️ Have a great day ahead! ❤️
Environment Variables
rh-aws-saml-login sets the following environment variables:
AWS_ACCOUNT_NAME: The name/alias of the AWS accountAWS_ACCOUNT_UID: The uid of the AWS accountAWS_ROLE_NAME: The name of the roleAWS_ROLE_ARN: The ARN of the roleAWS_ACCESS_KEY_ID: The access key used by the AWS CLIAWS_SECRET_ACCESS_KEY: The secret access key used by the AWS CLIAWS_SESSION_TOKEN: The session token used by the AWS CLIAWS_REGION: The default region used by the AWS CLI
Features
rh-aws-saml-login currently provides the following features (get help with -h or --help):
-
No configuration needed
-
Uses Kerberos authentication
-
Open the AWS web console for an account with the
--consoleoption -
Assume a role with the
--assume-uidoption -
Library usage, e.g. in Jupyter notebooks
-
Shell auto-completion (bash, zsh, and fish) including AWS account names
-
Integrates nicely with the starship
[env_var.AWS_ACCOUNT_NAME] format = "$symbol$style [$env_value]($style) " style = "cyan" symbol = "🚀"
Assume Role
AWS allows to switch to another AWS account via the assume role feature. rh-aws-saml-login supports this feature with the --assume-uid and --assume-role options. This options allows you to switch to another AWS account by providing the account ID and the role name:
rh-aws-saml-login --assume-uid <TARGET_AWS_ACCOUNT_UID> --assume-role <ROLE_NAME> <PARENT_ACCOUNT>
For example:
rh-aws-saml-login --assume-uid 1234567890 rh-payer-account
Console
Instead of spawning a new shell, you can open the AWS web console for an account with the --console and --console-serice option:
rh-aws-saml-login --console --console-service <SERVICE> <ACCOUNT_NAME>
For example:
rh-aws-saml-login --console --console-service s3 app-sre
Opens the AWS web console for the s3 service in the app-sre account.
Library Usage
rh-aws-saml-login is primarily designed to be used as CLI tool. However, it can also be used as library in any Python application or script, e.g., in Jupyter notebooks:
import boto3
from rh_aws_saml_login import get_aws_credentials
# Get AWS credentials
aws_credentials = get_aws_credentials(account_name="my-shiny-aws-account-name")
# Use the credentials with boto3
s3_client = boto3.client(
"s3",
aws_access_key_id=credentials.access_key,
aws_secret_access_key=credentials.secret_key,
aws_session_token=credentials.session_token,
region_name=credentials.region,
)
s3_client.list_buckets()
Development
rh-aws-saml-login uses uv for project and dependency management. Follow the uv installation instructions to install it in on your local machine.
Setup
- Fork the repository and clone it
- Create a Python development environment with
make dev-venv - Activate the virtual environment with
source .venv/bin/activate - Happy coding!
Release
- Update CHANGELOG.md with the new version number and date
- Bump the version number in pyproject.toml
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file rh_aws_saml_login-0.8.1.tar.gz.
File metadata
- Download URL: rh_aws_saml_login-0.8.1.tar.gz
- Upload date:
- Size: 12.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.6.15
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
139ac553cd10793c44e62ee743076fbb332ea1e10c6f5f9adcb46f7505519387
|
|
| MD5 |
da78259530bcccf52baf59be2903e17c
|
|
| BLAKE2b-256 |
9dc0dfa893e729baedc5c903796bbff453153378b5dc1b05419d0f54fb94186b
|
File details
Details for the file rh_aws_saml_login-0.8.1-py3-none-any.whl.
File metadata
- Download URL: rh_aws_saml_login-0.8.1-py3-none-any.whl
- Upload date:
- Size: 15.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.6.15
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3884ded18d9cce2430dae7c48eacc832c2b6b45395ed441bce6bef119ba6ed15
|
|
| MD5 |
b51c8f14e9e16f4c31cea5acc25bae79
|
|
| BLAKE2b-256 |
0063f37f6817759fd69d51fc3ce88ba5aa5e7611a5cccbc19b94b8cfab8c9b78
|