A tool for creating credentials for accessing S3 buckets
s3-credentials create my-bucket --public
option for creating public buckets, which allow anyone with knowledge of a filename to download that file. This works by attaching this public bucket policy to the bucket after it is created. #42
s3-credentials put-object
now sets the Content-Type
header on the uploaded object. The type is detected based on the filename, or can be specified using the new --content-type
option. #43
s3-credentials policy my-bucket --public-bucket
outputs the public bucket policy that would be attached to a bucket of that name. #44
s3-credentials create --duration 20m
option. This creates temporary credentials that only last for the specified time, by creating a role and using STS.AssignRole()
to retrieve credentials. #27
--auth file/path.json
option to specify a JSON or INI file containing the credentials to use. #29
s3-credentials list-buckets --details
option to include ACLs, website configuration and bucket policies. #22
s3-credentials create --format ini
option for outputting INI format instead of JSON. #17
botocore.stub
in some of the tests - thanks, Niko Abeler. #16
pytest --integration
, which exercise the tool against an AWS account and delete any created resources afterwards. #30
--access-key
, --secret-key
, --session-token
, --endpoint-url
. #2--policy filename.json
option for specifying a custom JSON policy. #14s3-credentials delete-user
command for deleting a user along with all of their access keys and inline policies. #10
s3-credentials list-buckets
command. #9
s3-credentials create name-of-bucket
creates a new user with read-write access only to the specified S3 bucket, creates an access key for that user and outputs it to the console. #3
s3-credentials list-users
lists all of the users for the current AWS account. #4
s3-credentials list-user-policies
lists inline policies for the specifeid users, or all users. #5
s3-credentials whoami
shows information about the currently authenticated user.