Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
72 commits
Select commit Hold shift + click to select a range
b5fa1eb
Significant awscli-mfa.sh script improvements (preparing for CLI AWS_…
Feb 17, 2018
2557db6
Finalized the awscli-mfa changes for CLI MFA use; added a sourceabl '…
Feb 17, 2018
8c6cc9e
Formatting fixes, typo corrections, added environment clearing script.
Feb 18, 2018
d0451c5
Bug fix: awscli-mfa.sh
Feb 18, 2018
4aa8540
Documentation update. File reorganization.
Feb 18, 2018
196cd27
aws-iam-rotate-keys.sh script reformat/cleanup and minor corrections.
Feb 19, 2018
e7bc19d
Added error handling for explicit deny (restrictive policy) conditions.
Feb 19, 2018
1f532ee
Added error handling for explicit deny (restrictive policy) condition…
Feb 19, 2018
ce460af
Added all AWS ennvars to source-to-clear-AWS-envvars.sh script.
Feb 26, 2018
f7b196d
Changed awscli-mfa.sh to use 'list-mfa-devices' instead of 'list-virt…
Mar 9, 2018
bff6d55
Merge branch 'master' of github.com:605data/aws_scripts
Mar 9, 2018
34e549a
Added sample MFA enforcement policy that works with the script.
Mar 9, 2018
a7561c8
Example MFA enforcement policy updates, awscli-mfa.sh fixes and todo …
Mar 9, 2018
faab163
Profile lookup based on aws_access_key_id now working; prep pro sessi…
Mar 9, 2018
bc9441b
Completed addInitTime in awscli-mfa.sh (as there is no way to retroac…
Mar 10, 2018
c7e155a
Numerous improvements to awscli-mfa.sh; started using recorded sessio…
Mar 11, 2018
29f5843
Completed changes to awscli-mfa.sh; the script now handles MFA sessio…
Mar 12, 2018
8aa0ed5
Finalized remaining.sh status/utility script for awscli-mfa.sh
Mar 12, 2018
3272f38
Added the ability to set profile-specific session length. Plus other …
Mar 13, 2018
a410b46
awscli-mfa.sh bugfix
Mar 14, 2018
574cb0e
Changes to the awscli-mfa example policy file, example-MFA-enforcemen…
Mar 14, 2018
69de32a
Added color codes, improved UX.
Mar 18, 2018
e2a26d7
Improved UX. AWS profile names with spaces supported. Many other fixe…
Mar 19, 2018
20996ff
Various bug fixes; clarifications enhancements.
Mar 20, 2018
fbaa857
Custom profile file selection by envvar now supported; renamed remain…
Mar 21, 2018
1158dba
Various fixes and enhancements. Checkpoint before macOS+Linux outputs…
Mar 25, 2018
bac61ae
Combined macOS and Linux outputs; completed Linux and 'other' system …
Mar 25, 2018
c1ac438
Single profile (+ MFA session) - a common use-case - now handled more…
Mar 26, 2018
3aa66d3
Quoted more vars to allow spaces and to avoid errors from word splitt…
Mar 26, 2018
b3eeaf9
Updated status.sh; LOTS of updates and bug fixes. Now also supports s…
Mar 26, 2018
1232e6b
Renamed status.sh to mfastatus.sh
Mar 28, 2018
ad6c9ea
vMFAd register/deregister script 'register-virtual-mfa-device.sh' nea…
Apr 2, 2018
953ba99
Added vMFAd delete-after-disable functionality.
Apr 2, 2018
86e37bc
Debugging, code cleanup.
Apr 3, 2018
96fcae7
Code cleanup, bug & typo fixes, small feature enhancements.
Apr 3, 2018
da5f84d
UX improvements, bug fixes to vmfad registration, mfastatus, and awsc…
Apr 3, 2018
4f1c9c8
Documentation update.
Apr 4, 2018
1590f46
Small UX enhancement.
Apr 4, 2018
c6f68e7
Updates to the example MFA enforcement policy.
Apr 5, 2018
d554b23
UX enhancement to enable-disable-vmfa-device.sh
Apr 5, 2018
5dd949a
Updates to the example MFA enforcement policy.
Apr 5, 2018
8e3f10d
awscli-mfa.sh: Linux compatibility update
Apr 5, 2018
899cde5
awscli-mfa.sh documentation..
Apr 10, 2018
0c5a7a6
awscli-mfa documentation update
Apr 10, 2018
e115692
awscli-mfa documentation update (formatting)
Apr 10, 2018
11b1336
awscli-mfa documentation update
Apr 10, 2018
2e1e305
awscli-mfa documentation edits
Apr 11, 2018
033af37
Updated repository home README.md
Apr 11, 2018
9b7939e
Minor documentation edits.
Apr 11, 2018
3db6ac6
Extended debug output in awscli-mfa.sh (now displays 'aws' command ra…
Apr 12, 2018
2e1f596
Added debugging to enable-disable-vmfa-device.sh; other cleanup, mino…
Apr 15, 2018
fd01e8c
Updated documentation for awscli-mfa
Apr 15, 2018
3337730
Documentation update for awscli-mfa.sh
Apr 16, 2018
cdfaf84
awscli-mfa.sh: improved AWS error checking; fixed light colors on whi…
Apr 18, 2018
d1a36e2
Added better support for terminal with white background. Other fixes.
Apr 18, 2018
9929383
Added account reference to the output in awscli-mfa.sh and enable-dis…
Apr 18, 2018
9ebbafe
awscli-mfa scripts: various fixes; added account alias/ID to output
Apr 19, 2018
c4b060c
Documentation update; small output standardization.
vwal Apr 26, 2018
6e225ca
awscli-mfa: output verbiage updates, bug fixes, documentation updates…
vwal Apr 30, 2018
0a7f803
awscli-mfa: Documentation/guidance updates.
vwal May 1, 2018
65b6021
awscli-mfa: enable-disable-vmfa-device.sh - Added secondary MFA sessi…
vwal May 2, 2018
892f16f
awscli-mfa scripts: reflected the source-this-to-clear-AWS-envvars.sh…
vwal May 2, 2018
dd5ceb8
Typo fixes. Added bash version to debug output.
vwal May 3, 2018
39c524d
awscli-mfa: documentation updates; added support for grouped IAM user…
vwal May 5, 2018
21738a9
Started role handling. Minor bug fixes.
vwal May 14, 2018
1d8fc8c
Linux compatibility fix (xclip)
May 14, 2018
e786e42
awscli-mfa.sh: improvement for clarity; example-MFA-enforcement-polic…
vwal May 15, 2018
b6d8fd6
awscli-mfa: bug fixes; adding support for credentials in the config f…
vwal May 26, 2018
034374c
awscli-mfa: massive refactoring for roles support, clarity (WIP); eli…
vwal May 28, 2018
4e194d9
Add script to delete SageMaker Notebook instances across all regions
claude Jan 21, 2026
f4640cd
Update script to only scan enabled regions
claude Jan 21, 2026
771b186
Simplify script to assume notebooks are already stopped
claude Jan 21, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@

This repository contains non-proprietary (MIT license) utility scripts for use with AWS.

* **aws-iam-rotate-keys.sh** - rotates AWS access keys stored in the user's `~/.aws/credentials` file. If you have set the policy for a user to have maximum of two concurrent keys, this script will first make sure there is just one existing key by allowing user to delete an existing key that is not in use. It then proceeds to create the new keys, test that they work, replace the keys in the user's `~/.aws/credentials` file, and finally remove the old key that was replaced. This is an interactive script, and as such it does not take arguments. The script was written for macOS, but portability for Linux has been added. Multiple profiles are supported, as is MFA when used in conjunction with `awscli-mfa.sh` script. The script also displays the key ages, and the actual IAM user name associated with each credential profile.<br><br>For more details, read my blog post about this script [here](https://random.ac/cess/2017/10/28/aws-cli-key-rotation-script-v2/).
* **[awscli-mfa/](https://github.com/605data/aws_scripts/tree/master/awscli-mfa)** - A set of scripts that make the use MFA sessions with AWS CLI easy (or, at least feasible :-).

* **awscli-mfa.sh** - Makes it easy to use MFA sessions with AWS CLI. Multiple profiles are supported. This is an interactive script (since it prompts for the current MFA one time pass code), and as such it does not take arguments. The script was written for macOS, but portability for Linux has been added.<br><br>For more details, read my blog post about this script [here](https://random.ac/cess/2017/10/29/easy-mfa-and-profile-switching-in-aws-cli/).
* **aws-iam-rotate-keys.sh** - rotates AWS access keys stored in the user's `~/.aws/credentials` file. If you have set the policy for a user to have maximum of two concurrent keys, this script will first make sure there is just one existing key by allowing user to delete an existing key that is not in use. It then proceeds to create the new keys, test that they work, replace the keys in the user's `~/.aws/credentials` file, and finally remove the old key that was replaced. This is an interactive script, and as such it does not take arguments. The script was written for macOS, but portability for Linux has been added. Multiple profiles are supported, as is MFA when used in conjunction with `awscli-mfa.sh` script. The script also displays the key ages, and the actual IAM user name associated with each credential profile.<br><br>For more details, read my blog post about this script [here](https://random.ac/cess/2017/10/28/aws-cli-key-rotation-script-v2/).

* **get-key-ages.py** - List the ages of all AWS IAM API keys in the account (this assumes properly configured `~/.aws/config`, and obviously sufficient access level to this information. Currently the output is tab delimited, and to the standard output, from where it can be cut-and-pasted to, say, Excel. In other words a quick-and-dirty utility script for a key age report.

Expand Down
Loading