
Security News
Open Source Maintainers Demand Ability to Block Copilot-Generated Issues and PRs
Open source maintainers are urging GitHub to let them block Copilot from submitting AI-generated issues and pull requests to their repositories.
This extensive package, AWS Ops Toolkit, offers a wide range of features and enhancements designed to streamline and
Welcome to pyawsopstoolkit! This Python package is your all-in-one solution for managing Amazon Web Services (AWS) operations efficiently. Whether you're a seasoned AWS user or just getting started, this toolkit offers a comprehensive set of features and enhancements to streamline your AWS interactions.
Stay tuned as we continue to evolve this toolkit! We're constantly working on adding new features and enhancements to make your AWS-related workflows even more efficient and productive. Watch this space for updates and upcoming additions.
Ready to supercharge your AWS operations? Let's get started with pyawsopstoolkit!
Install pyawsopstoolkit via pip:
pip install pyawsopstookit
Import the package in your Python script:
import pyawsopstoolkit
Now you're all set to harness the power of pyawsopstoolkit in your AWS workflows!
The Credentials class represents a set of AWS credentials, including an access key, secret access key, token, and optional expiry datetime.
Credentials(access_key: str, secret_access_key: str, token: str, expiry: Optional[datetime] = None) -> None
:
Initializes a Credentials object with the provided access key, secret access key, token, and expiry datetime if
available.to_dict() -> dict
: Returns a dictionary representation of the Credentials object.from pyawsopstoolkit.credentials import Credentials
# Create a Credentials object
creds = Credentials(access_key='access_key', secret_access_key='secret_access_key', token='token')
# Access individual attributes
print(creds.access_key) # Output: access_key
print(creds.secret_access_key) # Output: secret_access_key
print(creds.token) # Output: token
# Print the Credentials object
print(creds)
# Output: Credentials(access_key="access_key",secret_access_key="secret_access_key",token="token",expiry=None)
# Convert Credentials object to dictionary
print(creds.to_dict())
# Output:
# {
# "access_key": "access_key",
# "secret_access_key": "secret_access_key",
# "token": "token",
# "expiry": None
# }
The Account class represents an AWS account with various attributes. This class provides basic functionality for managing an AWS account.
Account(number: str) -> None
: Initializes an Account object with the provided account number.to_dict() -> dict
: Returns a dictionary representation of the Account object.from pyawsopstoolkit.account import Account
# Create an Account object
account = Account('123456789012')
# Access the account number attribute
print(account.number) # Output: 123456789012
The Session class represents a boto3 Session with various attributes, offering functionality to manage sessions. Additionally, it provides the option to assume a session.
Session(profile_name: Optional[str] = None, credentials: Optional[ICredentials] = None, region_code: Optional[str] = 'eu-west-1', cert_path: Optional[str] = None) -> None
:
Initializes a Session object for AWS with optional parameters for profile name, credentials, and region code.get_session() -> boto3.Session
: Returns the boto3.Session object based on the specified parameters within
the class object. This method prioritizes the profile name, followed by credentials. It verifies the session validity
by performing a quick S3 list buckets action.get_config() -> botocore.config.Config
: Returns the botocore.config.Config based on the specified region
code within the class object.get_account() -> IAccount
: Returns the AWS account number based on the get_session with specified parameters
within the class object.get_credentials_for_profile() -> ICredentials
: Returns the AWS credentials (access key, secret access key, and
token) based on the get_session with specified parameters within the class object.assume_role(role_arn: str, role_session_name: Optional[str] = 'AssumeSession', policy_arns: Optional[list] = None, policy: Optional[Union[str, dict]] = None, duration_seconds: Optional[int] = 3600, tags: Optional[list] = None) -> ISession
:
Returns the ISession object for the assumed role based on the specified parameters.from pyawsopstoolkit.session import Session
# Initialize a Session object with a profile name
profile_name = 'default'
session = Session(profile_name=profile_name)
# Get boto3 Session
boto3_session = session.get_session()
print(boto3_session) # Output: Session(region_name='eu-west-1')
# Get AWS account number
account = session.get_account()
print(account.number) # Output: 123456789012
# Get botocore config
config = session.get_config()
print(config) # Output: <botocore.config.Config object at 0x0000022097630040>
# Get credentials for profile
creds = session.get_credentials_for_profile()
print(
creds) # Output: Credentials(access_key="access_key",secret_access_key="secret_access_key",token=None,expiry=None)
For detailed information and usage examples, please refer to pyawsopstoolkit_validators
Please refer to the MIT License within the project for more information.
We welcome contributions from the community! Whether you have ideas for new features, bug fixes, or enhancements, feel free to open an issue or submit a pull request on GitHub.
FAQs
This extensive package, AWS Ops Toolkit, offers a wide range of features and enhancements designed to streamline and
We found that pyawsopstoolkit demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Open source maintainers are urging GitHub to let them block Copilot from submitting AI-generated issues and pull requests to their repositories.
Research
Security News
Malicious Koishi plugin silently exfiltrates messages with hex strings to a hardcoded QQ account, exposing secrets in chatbots across platforms.
Research
Security News
Malicious PyPI checkers validate stolen emails against TikTok and Instagram APIs, enabling targeted account attacks and dark web credential sales.