All Projects → hamstah → awstools

hamstah / awstools

Licence: MIT license
No description or website provided.

Programming Languages

go
31211 projects - #10 most used programming language
javascript
184084 projects - #8 most used programming language
HCL
1544 projects
python
139335 projects - #7 most used programming language
Jinja
831 projects
HTML
75241 projects

Projects that are alternatives of or similar to awstools

Complete Aws Iam Reference
Complete AWS IAM Reference
Stars: ✭ 236 (+972.73%)
Mutual labels:  iam, amazon-web-services
terraform-aws-iam-user
A Terraform module to create and manage Identity and Access Management (IAM) Users on Amazon Web Services (AWS). https://aws.amazon.com/iam
Stars: ✭ 17 (-22.73%)
Mutual labels:  iam, amazon-web-services
Terraform Aws Cross Account Role
A Terraform module to create an IAM Role for Cross Account delegation.
Stars: ✭ 30 (+36.36%)
Mutual labels:  iam, amazon-web-services
Iam Floyd
AWS IAM policy statement generator with fluent interface
Stars: ✭ 165 (+650%)
Mutual labels:  iam
Home
Welcome to Janssen: the world's fastest cloud native identity and access management platform
Stars: ✭ 176 (+700%)
Mutual labels:  iam
Theidserver
OpenID/Connect server based on IdentityServer4
Stars: ✭ 170 (+672.73%)
Mutual labels:  iam
aws-lambda-chaos-injection
Chaos Injection library for AWS Lambda
Stars: ✭ 82 (+272.73%)
Mutual labels:  amazon-web-services
Syncope
Apache Syncope
Stars: ✭ 134 (+509.09%)
Mutual labels:  iam
aws-o11y-recipes
recipes for observability solutions at AWS
Stars: ✭ 110 (+400%)
Mutual labels:  amazon-web-services
Aaia
AWS Identity and Access Management Visualizer and Anomaly Finder
Stars: ✭ 218 (+890.91%)
Mutual labels:  iam
Pomerium
Pomerium is an identity-aware access proxy.
Stars: ✭ 2,860 (+12900%)
Mutual labels:  iam
Awesome Iam
👤 Identity and Access Management Knowledge for Cloud Platforms
Stars: ✭ 186 (+745.45%)
Mutual labels:  iam
Authing
🔥Authing - IDaaS/IAM solution that can Auth to web and mobile applications.
Stars: ✭ 247 (+1022.73%)
Mutual labels:  iam
iam-manager
AWS IAM role management for K8s cluster using kube builder "Operator" framework
Stars: ✭ 41 (+86.36%)
Mutual labels:  iam
scim
Golang Implementation of the SCIM v2 Specification
Stars: ✭ 108 (+390.91%)
Mutual labels:  iam
Osiam
MIT licensed Open Source Identity and Access Management implementing OAuth 2.0 and SCIMv2.
Stars: ✭ 205 (+831.82%)
Mutual labels:  iam
Kube Aws Iam Controller
Distribute different AWS IAM credentials to different pods in Kubernetes via secrets.
Stars: ✭ 137 (+522.73%)
Mutual labels:  iam
Drf Access Policy
Declarative access policies/permissions modeled after AWS' IAM policies.
Stars: ✭ 200 (+809.09%)
Mutual labels:  iam
Keymaker
Lightweight SSH key management on AWS EC2
Stars: ✭ 221 (+904.55%)
Mutual labels:  iam
terraform-aws-s3-bucket
Terraform module that creates an S3 bucket with an optional IAM user for external CI/CD systems
Stars: ✭ 138 (+527.27%)
Mutual labels:  iam

AWS tools

Collection of tools to make working with AWS a bit easier without having to depend on awscli and python.

List of tools

Tool Overview
aws-dump Dumps (a subset of) AWS resources metadata to JSON and optionally check if they are in terraform state.
iam-session Creates new IAM session with role assumption and MFA support.
iam-public-keys Returns the public SSH keys of an IAM user.
iam-sync-users Create Linux users from IAM
iam-request-ssh-key-signature Request SSH key signature from a CA managed by lambda-sign-ssh-key.
lambda-sign-ssh-key Sign SSH keys from a CA using the caller's identity to set the principals.
iam-auth-proxy Use IAM as identity provider for services.
cloudwatch-put-metric-data Basic sending a metric value to cloudwatch
ec2-describe-instances Describe EC2 instances by id or filter
ec2-ip-from-name Given an EC2 name, list up to -max-results IPs associated with instances with that name
ecr-get-login Prints out the command to run to auth with docker ECR. Check output flag for other options
ecs-dashboard Shows ECS services and their version across multiple AWS accounts.
ecs-locate Returns ip:port for containers of an ECS service
ecs-deploy Update the container images of a task and update services to use it
ecs-run-task Runs a task definition
elb-resolve-elb-external-url ELB classic only (no ALB). Given a name returns the zone53 record associated with the ELB, including scheme (https returned if both available) and port.
elb-resolve-alb-external-url Both ELB classic and ALB. Given a name, returns route53 record associated with the ELB. Does not include scheme or port as it doesn't check listeners.
lambda-ping Pings a URL with lambda and publish a custom cloudwatch metric with the result.
s3-download Download a single file from s3.
kms-env Decrypts environment variables from SSM, KMS or Secret Manager and runs a command.

Authentication

Every tool supports the standard AWS authentication as well as sts sessions with the following options

  • --region: Choose the aws-region to use
  • --assume-role-arn: Assume the role before running. This is useful for cross account access.
  • --assume-role-policy: Policy to use when assuming the role, can be used to drop permissions from the role.
  • --mfa-serial-number: The new session will have its 2FA flag set.
  • --mfa-token-code: The token code to use when using --mfa-serial-number. If not provided the tool will prompt for it.
  • --session-duration: The length of the session, for example --session-duration=1h

Releases

All tools are available under different formats on the release page.

  • Linux binaries (All tools)
  • MacOS binaries (Most tools)
  • .deb package
  • .rpm package

Check the release tab for the latest release.

Checking release signatures

Download the signature from the release and use GPG to verify it

#!/usr/bin/env bash
version=7.4.0
os=linux
arch=amd64
wget https://github.com/hamstah/awstools/releases/download/v${version}/aws-dump_${version}_${os}_${arch} -O aws-dump
wget https://github.com/hamstah/awstools/releases/download/v${version}/aws-dump_${version}_${os}_${arch}.asc -O aws-dump.asc
gpg --verify aws-dump.asc aws-dump

The signing key is

Primary key fingerprint: 5FC5 40A9 A2F2 B87B 9C49  3D9E 7D40 F516 7D5C 7058

Checking the sha256 of binaries

  • Get the SHA256SUMS files
    #!/usr/bin/env bash
    version=7.4.0
    
    wget https://github.com/hamstah/awstools/releases/download/v${version}/SHA256SUMS
    wget https://github.com/hamstah/awstools/releases/download/v${version}/SHA256SUMS.asc
    gpg --verify SHA256SUMS.asc SHA256SUMS
    
  • Check the sha256 of downloaded binaries
    find . -type f ! -name "*.asc" ! -name SHA256SUMS | xargs -Ifile grep file SHA256SUMS | sha256sum --check
    
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].