所以我处于这样的安全协议下
aws sts assume-role $PROJECT_IAM_ROLE_ARN --role-session-name $DUMMY_SESSION_NAME --profile $DESIRED_AWS_PROFILE > temp_credentials_file.json
{
"AssumedRoleUser": {
"AssumedRoleId": "dummy_aasume_role_id:DUMMY_SESSION_NAME_VALUE",
"Arn": "PROJECT_IAM_ROLE_ARN/DUMMY_SESSION_NAME_VALUE"
},
"Credentials": {
"SecretAccessKey": "dummy_SecretAccessKey",
"SessionToken": "dummy_SessionToken",
"Expiration": "_some_time_stamp",
"AccessKeyId": "dummy_AccessKeyId"
}
}
[profile_1]
aws_access_key_id = dummy_access_key_id_profile_1
aws_secret_access_key = dummy_aws_secret_access_key_profile_1
region = dummy_region_profile_1
aws_session_token = dummy_aws_session_token_profile_1
[profile_2]
aws_access_key_id = dummy_access_key_id_profile_2
aws_secret_access_key = dummy_aws_secret_access_key_profile_2
region = dummy_region_profile_2
aws_session_token = dummy_aws_session_token_profile_2
[profile_3]
aws_access_key_id = dummy_access_key_id_profile_3
aws_secret_access_key = dummy_aws_secret_access_key_profile_3
region = dummy_region_profile_3
aws_session_token = dummy_aws_session_token_profile_3
现在,我如何读取temp_credentials.json文件,并通过cli在〜/ .aws / credentials文件中为给定配置文件设置所有3个aws键,而不会影响其他文件
我也尝试过
sudo aws configure set AccessKeyId dummy_value --profile profile_2
但这没用
命令成功执行,但〜/ .aws / credentials文件中的内容未更改
它应该是这样的:
aws configure set aws_access_key_id dummy_access_key_id_profile_1 --profile profile_1
aws configure set aws_secret_access_key dummy_aws_secret_access_key_profile_1 --profile profile_1
变量名称需要与它们匹配,配置支持。在您的示例中set AccessKeyId
尝试设置无效变量。需要更改为set aws_access_key_id
https://docs.aws.amazon.com/cli/latest/reference/configure/set.html
本文收集自互联网,转载请注明来源。
如有侵权,请联系 [email protected] 删除。
我来说两句