awsenv alternatives and similar packages
Based on the "DevOps Tools" category.
Alternatively, view awsenv alternatives based on common mentions on social networks and blogs.
-
Moby
The Moby Project - a collaborative project for the container ecosystem to assemble container-based systems -
Gitea
Git with a cup of tea! Painless self-hosted all-in-one software development service, including Git hosting, code review, team collaboration, package registry and CI/CD -
Packer
Packer is a tool for creating identical machine images for multiple platforms from a single source configuration. -
Flynn
[UNMAINTAINED] A next generation open source platform as a service (PaaS) -
Flannel
flannel is a network fabric for containers, designed for Kubernetes -
webhook
webhook is a lightweight incoming webhook server to run shell commands -
kubeshark
The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clusters. Inspired by Wireshark, purposely built for Kubernetes -
Ddosify
Effortless Kubernetes Monitoring and Performance Testing. Available on CLI, Self-Hosted, and Cloud -
Mizu
The API traffic viewer for Kubernetes providing deep visibility into all API traffic and payloads going in, out and across containers and pods inside a Kubernetes cluster. Think TCPDump and Wireshark re-invented for Kubernetes [Moved to: https://github.com/kubeshark/kubeshark] -
dasel
Select, put and delete data from JSON, TOML, YAML, XML and CSV files with a single tool. Supports conversion between formats and can be used as a Go package. -
Pomerium
Pomerium is an identity and context-aware reverse proxy for zero-trust access to web applications and services. -
Fleet device management
Open-source platform for IT, security, and infrastructure teams. (Linux, macOS, Chrome, Windows, cloud, data center) -
goxc
a build tool for Go, with a focus on cross-compiling, packaging and deployment -
StatusOK
Monitor your Website and APIs from your Computer. Get Notified through Slack, E-mail when your server is down or response time is more than expected. -
s3gof3r
Fast, concurrent, streaming access to Amazon S3, including gof3r, a CLI. http://godoc.org/github.com/rlmcpherson/s3gof3r -
uTask
µTask is an automation engine that models and executes business processes declared in yaml. ✏️📋 -
kwatch
:eyes: monitor & detect crashes in your Kubernetes(K8s) cluster instantly -
cassowary
:rocket: Modern cross-platform HTTP load-testing tool written in Go -
kool
From local development to the cloud: web apps development with containers made easy.
WorkOS - The modern identity platform for B2B SaaS
Do you think we are missing an alternative of awsenv or a related project?
Popular Comparisons
README
awsenv
AWS environment config loader.
awsenv is a small binary that loads AWS environment variables for an
AWS profile from ~/.aws/credentials - useful if you're regularly
switching credentials and using tools like
Vagrant. In addition to
aws_access_key_id
and aws_secret_access_key
, it will also
optionally load settings for aws_keyname
and aws_keypath
.
Installation
# install Go from https://golang.org/dl/
export GOPATH=$HOME/go
go get -u github.com/soniah/awsenv
This will automatically download, compile and install the awsenv
executable
to $GOPATH/bin
.
Usage
Import variables into your environment by eval-ing a backticked call to awsenv.
eval `awsenv profile-name`
For example, if you had the following credential files:
% cat ~/.aws/credentials
[example1]
aws_access_key_id = DEADBEEFDEADBEEF
aws_secret_access_key = DEADBEEFDEADBEEF1vzfgefDEADBEEFDEADBEEF
% cat /var/tmp/credentials
[example2]
aws_access_key_id = DEADBEEFDEADBEEF
aws_secret_access_key = DEADBEEFDEADBEEF1vzfgefDEADBEEFDEADBEEF
aws_keyname = 'example2_key'
aws_keypath = "~/.ssh/example2.pem"
The following shell commands would import AWS variables into your environment:
% eval `awsenv example1`
% env | grep AWS
AWS_ACCESS_KEY_ID=DEADBEEFDEADBEEF
AWS_SECRET_ACCESS_KEY=DEADBEEFDEADBEEF1vzfgefDEADBEEFDEADBEEF
% eval `awsenv example2 -f /var/tmp/credentials -v`
AWS_ACCESS_KEY_ID=DEADBEEFDEADBEEF
AWS_SECRET_ACCESS_KEY=DEADBEEFDEADBEEF1vzfgefDEADBEEFDEADBEEF
AWS_KEYNAME=example2_key
AWS_KEYPATH=/Users/sonia/.ssh/example2.pem
Vagrant Example
In a Vagrantfile you could do:
override.ssh.username = "ubuntu"
aws.keypair_name = ENV['AWS_KEYNAME']
override.ssh.private_key_path = ENV['AWS_KEYPATH']
Flags
The accepted flags can be displayed using -h
:
% awsenv -h
Usage:
awsenv [OPTIONS] Profile
Application Options:
-v, --verbose Verbose output
-f, --filename= Credentials file (~/.aws/credentials)
Help Options:
-h, --help Show this help message
Arguments:
Profile
Contributions
Contributions are welcome; here is an example workflow using hub.
go get github.com/soniah/awsenv
cd $GOPATH/src/github.com/soniah/awsenv
hub fork
git co -b dev
(and write some code)git push -u <your-github-username> dev
hub pull-request