1+ [ ![ AWS Console] [ banner-image-link ]] [ github-repo-link ]
2+
13[ ![ License] [ license-badge ]] [ license-link ]
24[ ![ Actions] [ github-actions-badge ]] [ github-actions-link ]
35[ ![ Releases] [ github-release-badge ]] [ github-release-link ]
@@ -12,7 +14,7 @@ Prebuilt binaries for several architectures can be found attached to any of the
1214
1315For Linux:
1416``` shell
15- wget https://github.com/joshdk/aws-console/releases/download/v0.2 .0/aws-console-linux-amd64.tar.gz
17+ wget https://github.com/joshdk/aws-console/releases/download/v0.3 .0/aws-console-linux-amd64.tar.gz
1618tar -xf aws-console-linux-amd64.tar.gz
1719sudo install aws-console /usr/bin/aws-console
1820```
@@ -55,75 +57,81 @@ This tool will detect and automatically federate IAM users transparently.
5557
5658Generate an AWS Console login URL for the default profile:
5759``` shell
58- aws-console
60+ $ aws-console
5961```
6062
6163Or for the named "production" profile:
6264``` shell
63- aws-console production
65+ $ aws-console production
6466```
6567
6668Or from the output of the aws cli itself:
6769``` shell
68- aws sts assume-role … | aws-console -
70+ $ aws sts assume-role … | aws-console -
6971```
7072
7173---
7274
7375Open the generated URL using the default browser:
7476``` shell
75- aws-console --browser
77+ $ aws-console --browser
7678```
7779
7880Or copy the URL to the system clipboard:
7981``` shell
80- aws-console --clipboard
82+ $ aws-console --clipboard
8183```
8284
8385---
8486
8587Display the generated URL in the terminal as a QR code:
8688``` shell
87- aws-console --qr
89+ $ aws-console --qr
8890```
8991
9092Or save it as an image to a file:
9193``` shell
92- aws-console --qr > qr.png
94+ $ aws-console --qr > qr.png
9395```
9496
9597---
9698
9799Limit session duration to half an hour:
98100``` shell
99- aws-console --duration 30m
101+ $ aws-console --duration 30m
100102```
101103
102104Redirect to the IAM service after logging in:
103105``` shell
104- aws-console --location iam
106+ $ aws-console --location iam
105107```
106108
107109---
108110
109111Federate the user and use the name "audit":
110112``` shell
111- aws-console --name audit
113+ $ aws-console --name audit
112114```
113115
114116Attach a readonly policy to the federated user:
115117``` shell
116- aws-console --policy readonly
118+ $ aws-console --policy readonly
117119```
118120
119121## License
120122
121123This code is distributed under the [ MIT License] [ license-link ] , see [ LICENSE.txt] [ license-file ] for more information.
122124
125+ <p align =" center " >
126+ Created by <a href =" https://github.com/joshdk " >Josh Komoroske</a > ☕
127+ </p >
128+
129+ [ banner-image-link ] : https://user-images.githubusercontent.com/307183/192825989-367a0b2b-7fe1-4dae-81ef-f4459c061034.png
123130[ github-actions-badge ] : https://github.com/joshdk/aws-console/workflows/Build/badge.svg
124131[ github-actions-link ] : https://github.com/joshdk/aws-console/actions
125132[ github-release-badge ] : https://img.shields.io/github/release/joshdk/aws-console/all.svg
126133[ github-release-link ] : https://github.com/joshdk/aws-console/releases
134+ [ github-repo-link ] : https://github.com/joshdk/aws-console
127135[ license-badge ] : https://img.shields.io/badge/license-MIT-green.svg
128136[ license-file ] : https://github.com/joshdk/aws-console/blob/master/LICENSE.txt
129137[ license-link ] : https://opensource.org/licenses/MIT
0 commit comments