This gem provides a small command line utility that helps manage AWS credentials in an OS X keychain, keeping them out of your dotfiles.
This will create a keychain for you which automatically locks after 5 minutes and on sleep, for some extra security for your precious AWS secrets.
Once you've added your credentials, you can start a shell with the credentials in the environment.
To install:
gem install aws-keychain-util
To create your keychain:
$ aws-creds init
Here you can choose a name for your new keychain, or use the default 'aws'.
To add an item to your aws keychain:
$ aws-creds add
This will prompt for a friendly name, the access key id, and the secret access key. This also prompts for an optional MFA arn, which is necessary if you're going to use multifactor auth with AWS.
To list items in the keychain:
$ aws-creds ls
To show some saved credentials:
$ aws-creds cat <name>
To start a shell with AWS_ACCESS_KEY_ID
and AWS_SECRET_ACCESS_KEY
set in the environment:
$ aws-creds shell <name>
To emit the (bourne shell style) environment variable exports that you can source into your shell:
$ aws-creds env <name>
To always load the given environment in your shell, add the following to your .bashrc or .zshrc
source `aws-creds env <name>`
To automatically grab AWS credentials from your keychain when using the aws-sdk gem, add the following code:
AWS.config(:credential_provider => AwsKeychainUtil::CredentialProvider.new('<name>', 'keychain name'))
To increase AWS security, it's possible to use MFA (multi-factor) authentication with the amazon APIs. Managing temporary credentials is a serious challenge, as by definition the credentials expire after a fixed period of time.
You then need to associate a multifactor authentication device with the IAM user. Amazon Directions for MFA Setup
Configuring MFA into your IAM policies for API access is a complex process, the documentation for which is Here.
In order to do a multifactor authentication, you need to run:
$ aws-creds mfa <name> <code>
Where <code>
is the numeric code on your multifactor auth device. Then you just need to either open a
fresh shell for the <name>
key or re-source your environment.
The tool also tracks mfa expiration, and automatically removes expired tokens when you open a new shell or source your env.
Unfortunately, when Keychain whitelists either the aws-creds
script
or a ruby application that uses the CredentialProvider for aws-sdk,
it whitelists ruby
as a whole. This means any ruby script will
be able to access your AWS credentials. We recommend that you either
do not whitelist your script at all (don't click "Always Allow"), or
use a dedicated keychain with an auto-lock interval of less than five
minutes. Keychains created with aws-creds
will automatically be
configured to auto-lock at 5 minutes.
- Fork it
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Add some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create new Pull Request