forked from FuriKuri/dotfiles
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathfunctions.common
More file actions
92 lines (81 loc) · 2.3 KB
/
functions.common
File metadata and controls
92 lines (81 loc) · 2.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
#!/bin/bash
function utc() {
date -u
}
cut-10() {
echo "$1" | cut -c1-10
}
unlock() {
gpg --output /tmp/credentials -d $HOME/.aws/credentials.gpg
}
azproject() {
if [[ -z $1 ]]; then
echo "missing subscription"
else
az account set --subscription "$1"
export AZ_SUBSCRIPTION=$1
fi
}
gcpproject() {
if [[ -z $1 ]]; then
echo "missing project name"
else
gcloud config set project $1
export GCP_PROJECT_NAME=$1
export PROJECT_ID=$1
fi
}
awsregion() {
if [[ -z $1 ]]; then
echo "missing region name"
else
export AWS_DEFAULT_REGION=$1
fi
}
awsprofile() {
if [[ -z $1 ]]; then
echo "missing profile name"
else
export AWS_DEFAULT_PROFILE=$1
export AWS_PROFILE=$1
fi
}
awstoken-saml() {
#~/bin/aws.py
if [ "$1" = "unset" ]; then
unset AWS_ACCESS_KEY_ID
unset AWS_SECRET_ACCESS_KEY
unset AWS_SESSION_TOKEN
else
result=$(aws --profile saml sts assume-role --role-arn $(aws configure get role_arn) --role-session-name "dev-token")
access_id=$(echo $result | jq -r '.Credentials.AccessKeyId')
access_key=$(echo $result | jq -r '.Credentials.SecretAccessKey')
access_token=$(echo $result | jq -r '.Credentials.SessionToken')
if [ "$1" = "export" ]; then
export AWS_ACCESS_KEY_ID=$access_id
export AWS_SECRET_ACCESS_KEY=$access_key
export AWS_SESSION_TOKEN=$access_token
else
printf "export AWS_ACCESS_KEY_ID=%s\nexport AWS_SECRET_ACCESS_KEY=%s\nexport AWS_SESSION_TOKEN=%s\n" $access_id $access_key $access_token
fi
fi
}
awstoken() {
if [ "$1" = "unset" ]; then
unset AWS_ACCESS_KEY_ID
unset AWS_SECRET_ACCESS_KEY
unset AWS_SESSION_TOKEN
else
result=$(aws sts assume-role --role-arn $(aws configure get role_arn) --role-session-name "dev-token")
access_id=$(echo $result | jq -r '.Credentials.AccessKeyId')
access_key=$(echo $result | jq -r '.Credentials.SecretAccessKey')
access_token=$(echo $result | jq -r '.Credentials.SessionToken')
if [ "$1" = "export" ]; then
export AWS_ACCESS_KEY_ID=$access_id
export AWS_SECRET_ACCESS_KEY=$access_key
export AWS_SESSION_TOKEN=$access_token
else
printf "export AWS_ACCESS_KEY_ID=%s\nexport AWS_SECRET_ACCESS_KEY=%s\nexport AWS_SESSION_TOKEN=%s\n" $access_id $access_key $access_token
fi
fi
}