aws-sudo
Advanced tools
Comparing version 1.0.3 to 1.2.0
32
index.js
@@ -35,4 +35,3 @@ #!/usr/bin/env node | ||
async function run(argv) { | ||
const { token: TokenCode, profile } = argv | ||
function run({ token: TokenCode, profile }) { | ||
const sessionProfile = argv.sessionProfile || `${profile}-session` | ||
@@ -44,18 +43,19 @@ | ||
const { User: { UserName } } = await IAM.getUser().promise() | ||
const { MFADevices: [ { SerialNumber } ] } = await IAM.listMFADevices({ UserName }).promise() | ||
const { Credentials: { AccessKeyId, SecretAccessKey, SessionToken } } = await STS.getSessionToken({ SerialNumber, TokenCode }).promise() | ||
return IAM.getUser().promise() | ||
.then(({ User: { UserName } }) => IAM.listMFADevices({ UserName }).promise()) | ||
.then(({ MFADevices: [ { SerialNumber } ] }) => STS.getSessionToken({ SerialNumber, TokenCode }).promise()) | ||
.then(({ Credentials: { AccessKeyId, SecretAccessKey, SessionToken } }) => { | ||
creds[sessionProfile] = Object.create(null) | ||
creds[sessionProfile]['aws_access_key_id'] = AccessKeyId | ||
creds[sessionProfile]['aws_secret_access_key'] = SecretAccessKey | ||
creds[sessionProfile]['aws_session_token'] = SessionToken | ||
creds[sessionProfile] = Object.create(null) | ||
creds[sessionProfile]['aws_access_key_id'] = AccessKeyId | ||
creds[sessionProfile]['aws_secret_access_key'] = SecretAccessKey | ||
creds[sessionProfile]['aws_session_token'] = SessionToken | ||
writeCredentialsFile(creds) | ||
writeCredentialsFile(creds) | ||
console.log(`AWS_ACCESS_KEY_ID=${AccessKeyId}`) | ||
console.log(`AWS_SECRET_ACCESS_KEY=${SecretAccessKey}`) | ||
console.log(`AWS_SESSION_TOKEN=${SessionToken}`) | ||
console.log(`Session credentials written to ${sessionProfile}`) | ||
console.log(`Run "export AWS_PROFILE=${sessionProfile}" to set the default profile for this terminal`) | ||
console.log(`AWS_ACCESS_KEY_ID=${AccessKeyId}`) | ||
console.log(`AWS_SECRET_ACCESS_KEY=${SecretAccessKey}`) | ||
console.log(`AWS_SESSION_TOKEN=${SessionToken}`) | ||
console.log(`Session credentials written to ${sessionProfile}`) | ||
console.log(`Run "export AWS_PROFILE=${sessionProfile}" to set the default profile for this terminal`) | ||
}) | ||
} | ||
@@ -62,0 +62,0 @@ |
{ | ||
"name": "aws-sudo", | ||
"version": "1.0.3", | ||
"version": "1.2.0", | ||
"description": "A CLI tool for loading temporary MFA associated keys from AWS", | ||
@@ -16,2 +16,3 @@ "main": "index.js", | ||
}, | ||
"repository": "bustle/aws-sudo", | ||
"bin": { | ||
@@ -18,0 +19,0 @@ "aws-sudo": "index.js" |
No repository
Supply chain riskPackage does not have a linked source code repository. Without this field, a package will have no reference to the location of the source code use to generate the package.
Found 1 instance in 1 package
4105
76