cloudx-proxy


Namecloudx-proxy JSON
Version 0.3.11 PyPI version JSON
download
home_pageNone
SummarySSH proxy command to connect VSCode with Cloud9/CloudX instance using AWS Systems Manager
upload_time2025-02-11 19:39:52
maintainerNone
docs_urlNone
authorNone
requires_python>=3.8
licenseMIT License Copyright (c) 2025 easytocloud Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
keywords aws vscode cloud9 cloudx ssm ssh proxy
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # cloudX-proxy

A cross-platform SSH proxy command for connecting VSCode to CloudX/Cloud9 EC2 instances using AWS Systems Manager Session Manager.

## Overview

cloudX-proxy enables seamless SSH connections from VSCode to EC2 instances using AWS Systems Manager Session Manager, eliminating the need for direct SSH access or public IP addresses. It handles:

- Automatic instance startup if stopped
- SSH key distribution via EC2 Instance Connect
- SSH tunneling through AWS Systems Manager
- Cross-platform support (Windows, macOS, Linux)

## Prerequisites

1. **AWS CLI v2** - Used to configure AWS profiles and credentials
   - [Installation Guide](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html)
   - Required for `aws configure` during setup
   - Handles AWS credentials and region configuration

2. **AWS Session Manager Plugin** - Enables secure tunneling through AWS Systems Manager
   - [Installation Guide](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-working-with-install-plugin.html)
   - Provides the secure connection channel
   - No need for public IP addresses or direct SSH access

3. **OpenSSH Client** - Handles SSH key management and connections
   - Windows: [Microsoft's OpenSSH Installation Guide](https://learn.microsoft.com/en-us/windows-server/administration/openssh/openssh_install_firstuse?tabs=gui)
   - macOS/Linux: Usually pre-installed
   - Manages SSH keys and configurations
   - Provides the SSH client for VSCode Remote

4. **uv** - Modern Python package installer and virtual environment manager
   ```bash
   pip install uv
   ```
   The `uvx` command from uv automatically:
   - Creates an isolated virtual environment for each package
   - Downloads and installs the package and its dependencies
   - Runs the package without explicit environment activation
   
   This means you can run cloudX-proxy directly with `uvx cloudx-proxy` without manually managing virtual environments or dependencies.

5. **VSCode with Remote SSH Extension** - Your development environment
   - Provides the integrated development environment
   - Uses the SSH configuration to connect to instances
   - Handles file synchronization and terminal sessions

## Installation

The cloudX-proxy package is available on PyPI and can run using uvx without explicit installation.

## Setup

cloudX-proxy includes a setup command that automates the entire configuration process:

```bash
# Basic setup with defaults (vscode profile and key)
uvx cloudx-proxy setup

# Setup with custom profile and key
uvx cloudx-proxy setup --profile myprofile --ssh-key mykey

# Setup with AWS environment
uvx cloudx-proxy setup --aws-env prod
```

The setup command will:

1. Configure AWS Profile:
   - Creates/validates AWS profile for IAM user in cloudX-{env}-{user} format
   - Supports AWS environment directories via --aws-env
   - Uses aws configure for credential input

2. Manage SSH Keys:
   - Creates new SSH key pair if needed
   - Offers 1Password integration options:
     * Using 1Password SSH agent
     * Storing private key as 1Password document

3. Configure SSH:
   - Creates ~/.ssh/vscode/config with proper settings
   - Sets up environment-specific configurations
   - Configures ProxyCommand with all necessary parameters
   - Ensures main ~/.ssh/config includes the configuration

4. Verify Instance Setup:
   - Checks instance setup status
   - Offers to wait for setup completion
   - Monitors setup progress

### SSH Configuration

The setup command configures SSH to use cloudX-proxy as a ProxyCommand, enabling seamless connections through AWS Systems Manager. For example, running:

```bash
uvx cloudx-proxy setup --profile myprofile --ssh-key mykey
```

Will create a configuration like this:

```
# Base environment config (created once per environment)
Host cloudx-dev-*
    User ec2-user
    IdentityFile ~/.ssh/vscode/mykey
    ProxyCommand uvx cloudx-proxy connect %h %p --profile myprofile --ssh-key mykey

# Host entry (added for specific instance)
Host cloudx-dev-myserver
    HostName i-0123456789abcdef0
```

Allowing the user to:

```bash
ssh cloudx-dev-myserver
scp cloudx-dev-myserver:/path/to/file /local/path/to/file
```
without the need to provide any further credentials.

In these examples, ssh will use cloudx-proxy to connect to AWS with the `myprofile` credentials, allowing it to check the instance state and start the instance if it's stopped. Next cloudx-proxy will use `myprofile` to push the public part of the key `mykey` to the instance using SSM. Finally a tunnel is created between the local machine and the instance, using the SSM plugin, allowing SSH to connect to the instance using the private part of the `mykey` key. 

VSCode will be able to connect to the instance using the same SSH configuration.

### SSH Configuration Details
The setup command creates:

1. A base configuration for each environment (cloudx-{env}-*) with:
   - User and key settings
   - 1Password integration if selected
   - ProxyCommand with appropriate parameters

2. Individual host entries for each instance:
   - Uses consistent naming (cloudx-{env}-hostname)
   - Maps to instance IDs automatically
   - Inherits environment-level settings

When adding new instances to an existing environment, you can choose to:
- Override the environment configuration with new settings
- Add instance-specific settings while preserving the environment config

### VSCode Configuration

1. Install the "Remote - SSH" extension in VSCode
2. Configure VSCode settings:
   ```json
   {
       "remote.SSH.configFile": "~/.ssh/vscode/config",
       "remote.SSH.connectTimeout": 90
   }
   ```
This extra long timeout is necessary to account for the time it takes to start the instance and establish the connection.
## Usage

### Command Line Options

#### Setup Command
```bash
uvx cloudx-proxy setup [OPTIONS]
```

Options:
- `--profile` (default: vscode): AWS profile to use. The profile's IAM user should follow the format cloudX-{env}-{user}. The environment part will be used as the default environment during setup.
- `--ssh-key` (default: vscode): Name of the SSH key to create/use. The key will be stored in ~/.ssh/vscode/{name}. This same name can be used in the connect command.
- `--aws-env` (optional): AWS environment directory to use. If specified, AWS configuration and credentials will be read from ~/.aws/aws-envs/{env}/.

Example usage:
```bash
# Basic setup with defaults
uvx cloudx-proxy setup

# Setup with custom profile and key
uvx cloudx-proxy setup --profile myprofile --ssh-key mykey

# Setup with AWS environment
uvx cloudx-proxy setup --profile myprofile --aws-env prod
```

#### Connect Command
```bash
uvx cloudx-proxy connect INSTANCE_ID [PORT] [OPTIONS]
```

Arguments:
- `INSTANCE_ID`: The EC2 instance ID to connect to (e.g., i-0123456789abcdef0)
- `PORT` (default: 22): The port to forward for SSH connection

Options:
- `--profile` (default: vscode): AWS profile to use. Should match the profile used in setup.
- `--ssh-key` (default: vscode): Name of the SSH key to use. Should match the key name used in setup.
- `--region` (optional): AWS region to use. If not specified, uses the region from the AWS profile.
- `--aws-env` (optional): AWS environment directory to use. Should match the environment used in setup.

Example usage:
```bash
# Connect using defaults
uvx cloudx-proxy connect i-0123456789abcdef0

# Connect with custom profile and key
uvx cloudx-proxy connect i-0123456789abcdef0 22 --profile myprofile --ssh-key mykey

# Connect with custom port and region
uvx cloudx-proxy connect i-0123456789abcdef0 2222 --region us-east-1

# Connect with AWS environment
uvx cloudx-proxy connect i-0123456789abcdef0 22 --profile myprofile --aws-env prod
```

Note: The connect command is typically used through the SSH ProxyCommand configuration set up by the setup command. You rarely need to run it directly unless testing the connection.

### VSCode

1. Click the "Remote Explorer" icon in the VSCode sidebar
2. Select "SSH Targets" from the dropdown
3. Your configured hosts will appear (e.g., cloudx-dev)
4. Click the "+" icon next to a host to connect
5. VSCode will handle the rest, using cloudX-proxy to establish the connection

## AWS Permissions
### IAM User Permissions

The AWS IAM user has to be member of the AWS IAM Group that is created as part of the cloudX environment.
The group uses ABAC (Attribute Based Access Control) to allow access to the instances based on the tags.
The ABAC tag defaults to `cloudxuser` and should have the value of the username of the user that owns the instance.

Example:
- AWS IAM User `cloudx-dev-user1` is connecting to an instance with the tag `cloudxuser=cloudx-dev-user1`

Note: This user should be created using the cloudX-user product from Service Catalog in the AWS Console. This assures proper permissions and naming conventions. The user in the example is member of the `dev` group, part as part of the `cloudx-dev` environment.

The EC2 instance should have the tag `cloudxuser` with the value of the username of the user that is connecting to the instance. This is automatically set when the instance is created using the cloudX-instance product from Service Catalog in the AWS Console.

### EC2 Instance Permissions

The EC2 instance has a profile/role that provides enough permissions to allow the AWS SSM agent to connect to the instance, as well as
- CodeArtifact read only access, to use as a source for pip
- CodeCommit read only access, to pull code from the repository for installation
- Organizations read only access, to create aws sso configuration
- EC2 basic access, to allow the instance to introspect for tags and other metadata

These permissions are required to bootstrap the instance, so that after creation the instance can perform software installation and configuration without a user being present.

## Troubleshooting

1. **Setup Issues**
   - If AWS profile validation fails, ensure your user ARN matches the cloudX-{env}-{user} format
   - For 1Password integration, ensure the CLI is installed and you're signed in
   - Check that ~/.ssh/vscode directory has proper permissions (700)
   - Verify main ~/.ssh/config is writable

2. **Connection Timeout**
   - Ensure the instance has the SSM agent installed and running
   - Check that your AWS credentials have the required permissions
   - Verify the instance ID is correct
   - Increase the VSCode SSH timeout if needed

3. **SSH Key Issues**
   - If using 1Password SSH agent, verify agent is running (~/.1password/agent.sock exists)
   - Check file permissions (600 for private key, 644 for public key)
   - Verify the public key is being successfully pushed to the instance
   - For stored keys in 1Password, ensure you can access them via the CLI

4. **AWS Configuration**
   - Confirm AWS CLI is configured with valid credentials
   - Default region is eu-west-1 if not specified in profile or command line
   - If using AWS profile organizer, ensure your environment directory exists at `~/.aws/aws-envs/<environment>/`
   - Verify the Session Manager plugin is installed correctly
   - Check that the instance has the required IAM role for SSM

5. **Instance Setup Status**
   - If setup appears stuck, check /home/ec2-user/.install-running exists
   - Verify /home/ec2-user/.install-done is created upon completion
   - Check instance system logs for setup script errors

## License

MIT License - see LICENSE file for details

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "cloudx-proxy",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": "aws, vscode, cloud9, cloudX, ssm, ssh, proxy",
    "author": null,
    "author_email": "easytocloud <info@easytocloud.com>",
    "download_url": "https://files.pythonhosted.org/packages/db/75/935c714182c74fcd4b7af493f223e6f325be3c136b44a54b5c2bdde154b9/cloudx_proxy-0.3.11.tar.gz",
    "platform": null,
    "description": "# cloudX-proxy\n\nA cross-platform SSH proxy command for connecting VSCode to CloudX/Cloud9 EC2 instances using AWS Systems Manager Session Manager.\n\n## Overview\n\ncloudX-proxy enables seamless SSH connections from VSCode to EC2 instances using AWS Systems Manager Session Manager, eliminating the need for direct SSH access or public IP addresses. It handles:\n\n- Automatic instance startup if stopped\n- SSH key distribution via EC2 Instance Connect\n- SSH tunneling through AWS Systems Manager\n- Cross-platform support (Windows, macOS, Linux)\n\n## Prerequisites\n\n1. **AWS CLI v2** - Used to configure AWS profiles and credentials\n   - [Installation Guide](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html)\n   - Required for `aws configure` during setup\n   - Handles AWS credentials and region configuration\n\n2. **AWS Session Manager Plugin** - Enables secure tunneling through AWS Systems Manager\n   - [Installation Guide](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-working-with-install-plugin.html)\n   - Provides the secure connection channel\n   - No need for public IP addresses or direct SSH access\n\n3. **OpenSSH Client** - Handles SSH key management and connections\n   - Windows: [Microsoft's OpenSSH Installation Guide](https://learn.microsoft.com/en-us/windows-server/administration/openssh/openssh_install_firstuse?tabs=gui)\n   - macOS/Linux: Usually pre-installed\n   - Manages SSH keys and configurations\n   - Provides the SSH client for VSCode Remote\n\n4. **uv** - Modern Python package installer and virtual environment manager\n   ```bash\n   pip install uv\n   ```\n   The `uvx` command from uv automatically:\n   - Creates an isolated virtual environment for each package\n   - Downloads and installs the package and its dependencies\n   - Runs the package without explicit environment activation\n   \n   This means you can run cloudX-proxy directly with `uvx cloudx-proxy` without manually managing virtual environments or dependencies.\n\n5. **VSCode with Remote SSH Extension** - Your development environment\n   - Provides the integrated development environment\n   - Uses the SSH configuration to connect to instances\n   - Handles file synchronization and terminal sessions\n\n## Installation\n\nThe cloudX-proxy package is available on PyPI and can run using uvx without explicit installation.\n\n## Setup\n\ncloudX-proxy includes a setup command that automates the entire configuration process:\n\n```bash\n# Basic setup with defaults (vscode profile and key)\nuvx cloudx-proxy setup\n\n# Setup with custom profile and key\nuvx cloudx-proxy setup --profile myprofile --ssh-key mykey\n\n# Setup with AWS environment\nuvx cloudx-proxy setup --aws-env prod\n```\n\nThe setup command will:\n\n1. Configure AWS Profile:\n   - Creates/validates AWS profile for IAM user in cloudX-{env}-{user} format\n   - Supports AWS environment directories via --aws-env\n   - Uses aws configure for credential input\n\n2. Manage SSH Keys:\n   - Creates new SSH key pair if needed\n   - Offers 1Password integration options:\n     * Using 1Password SSH agent\n     * Storing private key as 1Password document\n\n3. Configure SSH:\n   - Creates ~/.ssh/vscode/config with proper settings\n   - Sets up environment-specific configurations\n   - Configures ProxyCommand with all necessary parameters\n   - Ensures main ~/.ssh/config includes the configuration\n\n4. Verify Instance Setup:\n   - Checks instance setup status\n   - Offers to wait for setup completion\n   - Monitors setup progress\n\n### SSH Configuration\n\nThe setup command configures SSH to use cloudX-proxy as a ProxyCommand, enabling seamless connections through AWS Systems Manager. For example, running:\n\n```bash\nuvx cloudx-proxy setup --profile myprofile --ssh-key mykey\n```\n\nWill create a configuration like this:\n\n```\n# Base environment config (created once per environment)\nHost cloudx-dev-*\n    User ec2-user\n    IdentityFile ~/.ssh/vscode/mykey\n    ProxyCommand uvx cloudx-proxy connect %h %p --profile myprofile --ssh-key mykey\n\n# Host entry (added for specific instance)\nHost cloudx-dev-myserver\n    HostName i-0123456789abcdef0\n```\n\nAllowing the user to:\n\n```bash\nssh cloudx-dev-myserver\nscp cloudx-dev-myserver:/path/to/file /local/path/to/file\n```\nwithout the need to provide any further credentials.\n\nIn these examples, ssh will use cloudx-proxy to connect to AWS with the `myprofile` credentials, allowing it to check the instance state and start the instance if it's stopped. Next cloudx-proxy will use `myprofile` to push the public part of the key `mykey` to the instance using SSM. Finally a tunnel is created between the local machine and the instance, using the SSM plugin, allowing SSH to connect to the instance using the private part of the `mykey` key. \n\nVSCode will be able to connect to the instance using the same SSH configuration.\n\n### SSH Configuration Details\nThe setup command creates:\n\n1. A base configuration for each environment (cloudx-{env}-*) with:\n   - User and key settings\n   - 1Password integration if selected\n   - ProxyCommand with appropriate parameters\n\n2. Individual host entries for each instance:\n   - Uses consistent naming (cloudx-{env}-hostname)\n   - Maps to instance IDs automatically\n   - Inherits environment-level settings\n\nWhen adding new instances to an existing environment, you can choose to:\n- Override the environment configuration with new settings\n- Add instance-specific settings while preserving the environment config\n\n### VSCode Configuration\n\n1. Install the \"Remote - SSH\" extension in VSCode\n2. Configure VSCode settings:\n   ```json\n   {\n       \"remote.SSH.configFile\": \"~/.ssh/vscode/config\",\n       \"remote.SSH.connectTimeout\": 90\n   }\n   ```\nThis extra long timeout is necessary to account for the time it takes to start the instance and establish the connection.\n## Usage\n\n### Command Line Options\n\n#### Setup Command\n```bash\nuvx cloudx-proxy setup [OPTIONS]\n```\n\nOptions:\n- `--profile` (default: vscode): AWS profile to use. The profile's IAM user should follow the format cloudX-{env}-{user}. The environment part will be used as the default environment during setup.\n- `--ssh-key` (default: vscode): Name of the SSH key to create/use. The key will be stored in ~/.ssh/vscode/{name}. This same name can be used in the connect command.\n- `--aws-env` (optional): AWS environment directory to use. If specified, AWS configuration and credentials will be read from ~/.aws/aws-envs/{env}/.\n\nExample usage:\n```bash\n# Basic setup with defaults\nuvx cloudx-proxy setup\n\n# Setup with custom profile and key\nuvx cloudx-proxy setup --profile myprofile --ssh-key mykey\n\n# Setup with AWS environment\nuvx cloudx-proxy setup --profile myprofile --aws-env prod\n```\n\n#### Connect Command\n```bash\nuvx cloudx-proxy connect INSTANCE_ID [PORT] [OPTIONS]\n```\n\nArguments:\n- `INSTANCE_ID`: The EC2 instance ID to connect to (e.g., i-0123456789abcdef0)\n- `PORT` (default: 22): The port to forward for SSH connection\n\nOptions:\n- `--profile` (default: vscode): AWS profile to use. Should match the profile used in setup.\n- `--ssh-key` (default: vscode): Name of the SSH key to use. Should match the key name used in setup.\n- `--region` (optional): AWS region to use. If not specified, uses the region from the AWS profile.\n- `--aws-env` (optional): AWS environment directory to use. Should match the environment used in setup.\n\nExample usage:\n```bash\n# Connect using defaults\nuvx cloudx-proxy connect i-0123456789abcdef0\n\n# Connect with custom profile and key\nuvx cloudx-proxy connect i-0123456789abcdef0 22 --profile myprofile --ssh-key mykey\n\n# Connect with custom port and region\nuvx cloudx-proxy connect i-0123456789abcdef0 2222 --region us-east-1\n\n# Connect with AWS environment\nuvx cloudx-proxy connect i-0123456789abcdef0 22 --profile myprofile --aws-env prod\n```\n\nNote: The connect command is typically used through the SSH ProxyCommand configuration set up by the setup command. You rarely need to run it directly unless testing the connection.\n\n### VSCode\n\n1. Click the \"Remote Explorer\" icon in the VSCode sidebar\n2. Select \"SSH Targets\" from the dropdown\n3. Your configured hosts will appear (e.g., cloudx-dev)\n4. Click the \"+\" icon next to a host to connect\n5. VSCode will handle the rest, using cloudX-proxy to establish the connection\n\n## AWS Permissions\n### IAM User Permissions\n\nThe AWS IAM user has to be member of the AWS IAM Group that is created as part of the cloudX environment.\nThe group uses ABAC (Attribute Based Access Control) to allow access to the instances based on the tags.\nThe ABAC tag defaults to `cloudxuser` and should have the value of the username of the user that owns the instance.\n\nExample:\n- AWS IAM User `cloudx-dev-user1` is connecting to an instance with the tag `cloudxuser=cloudx-dev-user1`\n\nNote: This user should be created using the cloudX-user product from Service Catalog in the AWS Console. This assures proper permissions and naming conventions. The user in the example is member of the `dev` group, part as part of the `cloudx-dev` environment.\n\nThe EC2 instance should have the tag `cloudxuser` with the value of the username of the user that is connecting to the instance. This is automatically set when the instance is created using the cloudX-instance product from Service Catalog in the AWS Console.\n\n### EC2 Instance Permissions\n\nThe EC2 instance has a profile/role that provides enough permissions to allow the AWS SSM agent to connect to the instance, as well as\n- CodeArtifact read only access, to use as a source for pip\n- CodeCommit read only access, to pull code from the repository for installation\n- Organizations read only access, to create aws sso configuration\n- EC2 basic access, to allow the instance to introspect for tags and other metadata\n\nThese permissions are required to bootstrap the instance, so that after creation the instance can perform software installation and configuration without a user being present.\n\n## Troubleshooting\n\n1. **Setup Issues**\n   - If AWS profile validation fails, ensure your user ARN matches the cloudX-{env}-{user} format\n   - For 1Password integration, ensure the CLI is installed and you're signed in\n   - Check that ~/.ssh/vscode directory has proper permissions (700)\n   - Verify main ~/.ssh/config is writable\n\n2. **Connection Timeout**\n   - Ensure the instance has the SSM agent installed and running\n   - Check that your AWS credentials have the required permissions\n   - Verify the instance ID is correct\n   - Increase the VSCode SSH timeout if needed\n\n3. **SSH Key Issues**\n   - If using 1Password SSH agent, verify agent is running (~/.1password/agent.sock exists)\n   - Check file permissions (600 for private key, 644 for public key)\n   - Verify the public key is being successfully pushed to the instance\n   - For stored keys in 1Password, ensure you can access them via the CLI\n\n4. **AWS Configuration**\n   - Confirm AWS CLI is configured with valid credentials\n   - Default region is eu-west-1 if not specified in profile or command line\n   - If using AWS profile organizer, ensure your environment directory exists at `~/.aws/aws-envs/<environment>/`\n   - Verify the Session Manager plugin is installed correctly\n   - Check that the instance has the required IAM role for SSM\n\n5. **Instance Setup Status**\n   - If setup appears stuck, check /home/ec2-user/.install-running exists\n   - Verify /home/ec2-user/.install-done is created upon completion\n   - Check instance system logs for setup script errors\n\n## License\n\nMIT License - see LICENSE file for details\n",
    "bugtrack_url": null,
    "license": "MIT License\n        \n        Copyright (c) 2025 easytocloud\n        \n        Permission is hereby granted, free of charge, to any person obtaining a copy\n        of this software and associated documentation files (the \"Software\"), to deal\n        in the Software without restriction, including without limitation the rights\n        to use, copy, modify, merge, publish, distribute, sublicense, and/or sell\n        copies of the Software, and to permit persons to whom the Software is\n        furnished to do so, subject to the following conditions:\n        \n        The above copyright notice and this permission notice shall be included in all\n        copies or substantial portions of the Software.\n        \n        THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n        IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n        FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n        AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n        LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n        OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\n        SOFTWARE.\n        ",
    "summary": "SSH proxy command to connect VSCode with Cloud9/CloudX instance using AWS Systems Manager",
    "version": "0.3.11",
    "project_urls": {
        "Changelog": "https://github.com/easytocloud/cloudX-proxy/blob/main/CHANGELOG.md",
        "Homepage": "https://github.com/easytocloud/cloudX-proxy",
        "Issues": "https://github.com/easytocloud/cloudX-proxy/issues",
        "Repository": "https://github.com/easytocloud/cloudX-proxy"
    },
    "split_keywords": [
        "aws",
        " vscode",
        " cloud9",
        " cloudx",
        " ssm",
        " ssh",
        " proxy"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "8a1d7efab2227f08cee5b2ff75f2191bd1517fa645cede54280d080a72384d1c",
                "md5": "2e779772eac68ff82bfd9cd129e506e6",
                "sha256": "6e5a7c42fde0c895871864d8565bd763f2632a33fb2d4612fe484bc23205a15e"
            },
            "downloads": -1,
            "filename": "cloudx_proxy-0.3.11-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "2e779772eac68ff82bfd9cd129e506e6",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.8",
            "size": 15653,
            "upload_time": "2025-02-11T19:39:51",
            "upload_time_iso_8601": "2025-02-11T19:39:51.150622Z",
            "url": "https://files.pythonhosted.org/packages/8a/1d/7efab2227f08cee5b2ff75f2191bd1517fa645cede54280d080a72384d1c/cloudx_proxy-0.3.11-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "db75935c714182c74fcd4b7af493f223e6f325be3c136b44a54b5c2bdde154b9",
                "md5": "37d6d880a7d23b8f09c84afecb797470",
                "sha256": "154ee390219cbb85180cd0b0c3ee43656574fea477f779a7e1874cd2352b3f6a"
            },
            "downloads": -1,
            "filename": "cloudx_proxy-0.3.11.tar.gz",
            "has_sig": false,
            "md5_digest": "37d6d880a7d23b8f09c84afecb797470",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 21278,
            "upload_time": "2025-02-11T19:39:52",
            "upload_time_iso_8601": "2025-02-11T19:39:52.627247Z",
            "url": "https://files.pythonhosted.org/packages/db/75/935c714182c74fcd4b7af493f223e6f325be3c136b44a54b5c2bdde154b9/cloudx_proxy-0.3.11.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-02-11 19:39:52",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "easytocloud",
    "github_project": "cloudX-proxy",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "cloudx-proxy"
}
        
Elapsed time: 1.43891s