Amazon web services 是否有任何shell命令用于在特定配置文件下设置aws凭据

Amazon web services 是否有任何shell命令用于在特定配置文件下设置aws凭据,amazon-web-services,shell,amazon-iam,aws-cli,Amazon Web Services,Shell,Amazon Iam,Aws Cli,我想在~/.aws/credentials文件中设置我的MFA配置文件credentialsi.e acessKeyId、SecrectAccessKey、SessionToken。是否有任何shell命令来执行此操作? 例如:如果我执行aws configure set default.aws\u secret\u access\u key“myaccesskey”,则凭证文件将使用此给定的访问密钥进行更新。但是,如果我使用aws configure set mfa.aws_secret_ac

我想在~/.aws/credentials文件中设置我的MFA配置文件credentialsi.e acessKeyId、SecrectAccessKey、SessionToken。是否有任何shell命令来执行此操作? 例如:如果我执行aws configure set default.aws\u secret\u access\u key“myaccesskey”,则凭证文件将使用此给定的访问密钥进行更新。但是,如果我使用aws configure set mfa.aws_secret_access_key“myaccesskey”键入相同的命令,它不会在凭证文件中更新,而是~/.aws/config文件将以如下所示的格式更新

我的目标是,~/.aws/凭证文件应该在MFA配置文件下更新。像

[default]
aws_secret_access_key = ****
****** = ******
[mfa]
aws_secret_access_key = myaccesskey
aws_accesskeyid = *****
aws_sessionToken = ****
region = ****
我使用aws mfa项目。 这是一个非常简单的python项目

用法示例:

使用命令行参数:

aws-mfa --duration 1800 --device arn:aws:iam::123456788990:mfa/dudeman
INFO - Using profile: default
INFO - Your credentials have expired, renewing.
Enter AWS MFA code for device [arn:aws:iam::123456788990:mfa/dudeman] (renewing for 1800 seconds):123456
INFO - Success! Your credentials will expire in 1800 seconds at: 2015-12-21 23:07:09+00:00
使用配置文件:配置文件允许您引用不同的凭据集,可能是针对不同的用户或不同的区域:

aws-mfa --duration 1800 --device arn:aws:iam::123456788990:mfa/dudeman --profile development
INFO - Using profile: development
Enter AWS MFA code for device [arn:aws:iam::123456788990:mfa/dudeman] (renewing for 1800 seconds):666666
INFO - Success! Your credentials will expire in 1800 seconds at: 2015-12-21 23:09:04+00:00
担任职务:

aws-mfa --duration 1800 --device arn:aws:iam::123456788990:mfa/dudeman --assume-role arn:aws:iam::123456788990:role/some-role --role-session-name some-role-session
INFO - Validating credentials for profile: default  with assumed role arn:aws:iam::123456788990:role/some-role
INFO - Obtaining credentials for a new role or profile.
Enter AWS MFA code for device [arn:aws:iam::123456788990:mfa/dudeman] (renewing for 1800 seconds):123456
INFO - Success! Your credentials will expire in 1800 seconds at: 2016-10-24 18:58:17+00:00
我使用aws mfa项目。 这是一个非常简单的python项目

用法示例:

使用命令行参数:

aws-mfa --duration 1800 --device arn:aws:iam::123456788990:mfa/dudeman
INFO - Using profile: default
INFO - Your credentials have expired, renewing.
Enter AWS MFA code for device [arn:aws:iam::123456788990:mfa/dudeman] (renewing for 1800 seconds):123456
INFO - Success! Your credentials will expire in 1800 seconds at: 2015-12-21 23:07:09+00:00
使用配置文件:配置文件允许您引用不同的凭据集,可能是针对不同的用户或不同的区域:

aws-mfa --duration 1800 --device arn:aws:iam::123456788990:mfa/dudeman --profile development
INFO - Using profile: development
Enter AWS MFA code for device [arn:aws:iam::123456788990:mfa/dudeman] (renewing for 1800 seconds):666666
INFO - Success! Your credentials will expire in 1800 seconds at: 2015-12-21 23:09:04+00:00
担任职务:

aws-mfa --duration 1800 --device arn:aws:iam::123456788990:mfa/dudeman --assume-role arn:aws:iam::123456788990:role/some-role --role-session-name some-role-session
INFO - Validating credentials for profile: default  with assumed role arn:aws:iam::123456788990:role/some-role
INFO - Obtaining credentials for a new role or profile.
Enter AWS MFA code for device [arn:aws:iam::123456788990:mfa/dudeman] (renewing for 1800 seconds):123456
INFO - Success! Your credentials will expire in 1800 seconds at: 2016-10-24 18:58:17+00:00

可以使用-profile参数将配置文件传递给aws配置命令

aws configure set aws_secret_access_key 'myaccesskey' --profile mfa
参考:


可以使用-profile参数将配置文件传递给aws配置命令

aws configure set aws_secret_access_key 'myaccesskey' --profile mfa
参考:


这太完美了。正是我需要的。我很好奇在哪里可以找到这方面的原始文档。更新了参考资料,查看了设置区域的行。这很完美。正是我需要的。我很好奇在哪里可以找到这方面的原始文档。更新了参考资料,请参阅设置区域的行