#aws-credentials #credentials #aws #sts #token #user-profile #command-line-tool

bin+lib aws-mfa-session

A command line utility to generate temporary AWS credentials with virtual MFA device. Credentials could be exported into new shell or inserted into aws credentials file.

5 releases

0.2.4 Aug 4, 2020
0.2.3 Jun 7, 2020
0.2.2 May 23, 2020
0.2.1 May 11, 2020
0.2.0 Apr 18, 2020

#5 in #user-profile

35 downloads per month

MIT license

28KB
624 lines

aws-mfa-session

build status codecov crates.io

A command line utility to generate temporary AWS credentials with virtual MFA device. Credentials could be exported into new shell or inserted into aws credentials file.

Features

  • support only virtual MFA devices (current limitation of API)
  • select any profile from credential file
  • detect MFA device from user profile
  • generate temporary credentials (using sts)
  • update profile in the credential file with generated credentials

Release page distributions

Github Release page provides binaries for:

  • Windows
  • Linux
  • macOS

Examples

Generate session credentials with default profile, and print the credentials as exported environment variables

aws-mfa-session --code 123456 -e

Could be used to inject variables into the current shell

eval $(aws-mfa-session -c 464899 -e)

Generate session credentials with default profile and MFA arn:

aws-mfa-session --arn arn:aws:iam::012345678910:mfa/username --code 123456 -e

Generate session credentials with default profile and non-default region:

aws-mfa-session --region us-east2 --code 123456 -e

Generate session credentials with default profile, and run a new shell with new shell with exported environment variables

aws-mfa-session --code 123456 -s

Generate session credentials with default profile, and create or update a new profile:

aws-mfa-session --update-profile mfa-session --code 123456

Generate session credentials with defined profile, and create or update a new profile:

aws-mfa-session --profile dev --update-profile mfa-session --code 123456

Generate session credentials with defined profile and non-default credential file, and create or update a new profile:

aws-mfa-session --credentials-file .aws/credentials2 --profile dev --update-profile mfa-session --code 123456

How to build and install

Requirements: rust and cargo

# Build
cargo build --release

# Install from local source
cargo install

# Install latest from git
cargo install --git https://github.com/AnderEnder/aws-mfa-session

# Install from crate package
cargo install aws-mfa-session

Dependencies

~27–42MB
~768K SLoC