cpgaws


Namecpgaws JSON
Version 2.15.19 PyPI version JSON
download
home_pageNone
SummaryUniversal Command Line Environment for AWS.
upload_time2024-02-12 21:24:56
maintainerNone
docs_urlNone
authorAmazon Web Services
requires_python>=3.8
licenseNone
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            =======
aws-cli
=======

.. image:: https://github.com/aws/aws-cli/actions/workflows/run-tests.yml/badge.svg
   :target: https://github.com/aws/aws-cli/actions/workflows/run-tests.yml
   :alt: Build Status


This package provides a unified command line interface to Amazon Web Services.

The aws-cli package works on Python versions:

* 3.8.x
* 3.9.x
* 3.10.x
* 3.11.x

.. attention::
   We recommend that all customers regularly monitor the
   `Amazon Web Services Security Bulletins website`_ for any important security bulletins related to
   aws-cli.

 Jump to:

-  `Notices <#notices>`__
-  `Installation <#installation>`__
-  `Getting Started <#getting-started>`__
-  `Getting Help <#getting-help>`__
-  `More Resources <#more-resources>`__


-------
Notices
-------
On 2024-06-20, support for macOS versions 10.14 and prior will be dropped.
To avoid disruption, customers using macOS 10.14 or prior
should upgrade to macOS 10.15 or later. For more information, please see
this `blog post <https://aws.amazon.com/blogs/developer/macos-support-policy-updates-for-the-aws-cli-v2/>`__.


------------
Installation
------------

AWS CLI v2 can easily be installed on most standard platforms:

* `MacOS pkg installer <https://awscli.amazonaws.com/AWSCLIV2.pkg>`__

* `Linux x86-64 executable installer <https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip>`__

* `Linux arm64 (aarch64) executable installer <https://awscli.amazonaws.com/awscli-exe-linux-aarch64.zip>`__

* `Windows MSI installer <https://awscli.amazonaws.com/AWSCLIV2.msi>`__

You can find more detailed installation instructions `here <https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html>`__.

If you want to run the ``v2`` development branch of the CLI, see the
"CLI Dev Version" section below.


------------
CLI Releases
------------

The release notes for the AWS CLI can be found `here <https://github.com/aws/aws-cli/blob/v2/CHANGELOG.rst>`__.


------------------
Command Completion
------------------

The aws-cli package includes a very useful command completion feature.
This feature is not automatically installed so you need to configure it manually.
To enable tab completion for bash either use the built-in command ``complete``::

    $ complete -C aws_completer aws

Or add ``bin/aws_bash_completer`` file under ``/etc/bash_completion.d``,
``/usr/local/etc/bash_completion.d`` or any other ``bash_completion.d`` location.

For tcsh::

    $ complete aws 'p/*/`aws_completer`/'

You should add this to your startup scripts to enable it for future sessions.

For zsh please refer to ``bin/aws_zsh_completer.sh``.  Source that file, e.g.
from your ``~/.zshrc``, and make sure you run ``compinit`` before::

    $ source bin/aws_zsh_completer.sh

For now the bash compatibility auto completion (``bashcompinit``) is used.
For further details please refer to the top of ``bin/aws_zsh_completer.sh``.

---------------
Getting Started
---------------

Before using aws-cli, you need to tell it about your AWS credentials.  You
can do this in several ways:

* Environment variables
* Shared credentials file
* Config file
* IAM Role

The quickest way to get started is to run the ``aws configure`` command::

    $ aws configure
    AWS Access Key ID: foo
    AWS Secret Access Key: bar
    Default region name [us-west-2]: us-west-2
    Default output format [None]: json

To use environment variables, do the following::

    $ export AWS_ACCESS_KEY_ID=<access_key>
    $ export AWS_SECRET_ACCESS_KEY=<secret_key>

To use the shared credentials file, create an INI formatted file like this::

    [default]
    aws_access_key_id=foo
    aws_secret_access_key=bar

    [testing]
    aws_access_key_id=foo
    aws_secret_access_key=bar

and place it in ``~/.aws/credentials`` (or in
``%UserProfile%\.aws/credentials`` on Windows). If you wish to place the
shared credentials file in a different location than the one specified above,
you need to tell aws-cli where to find it.  Do this by setting
the appropriate environment variable::

    $ export AWS_SHARED_CREDENTIALS_FILE=/path/to/shared_credentials_file

To use a config file, create a configuration file like this::

    [default]
    aws_access_key_id=<default access key>
    aws_secret_access_key=<default secret key>
    # Optional, to define default region for this profile.
    region=us-west-1

    [profile testing]
    aws_access_key_id=<testing access key>
    aws_secret_access_key=<testing secret key>
    region=us-west-2

and place it in ``~/.aws/config`` (or in ``%UserProfile%\.aws\config`` on Windows). If you wish to place the config file in a different location than the one
specified above, you need to tell aws-cli where to find it.  Do this by setting
the appropriate environment variable::

    $ export AWS_CONFIG_FILE=/path/to/config_file

As you can see, you can have multiple ``profiles`` defined in both the shared
credentials file and the  configuration file. You can then specify which
profile to use by using the ``--profile`` option. If no profile is specified
the ``default`` profile is used.

In the config file, except for the default profile, you
**must** prefix each config section of a profile group with ``profile``.
For example, if you have a profile named "testing" the section header would
be ``[profile testing]``.

The final option for credentials is highly recommended if you are
using aws-cli on an EC2 instance.  IAM Roles are
a great way to have credentials installed automatically on your
instance.  If you are using IAM Roles, aws-cli will find them and use
them automatically.

----------------------------
Other Configurable Variables
----------------------------

In addition to credentials, a number of other variables can be
configured either with environment variables, configuration file
entries or both.  The following table documents these.

============================= =========== ============================= ================================= ==================================
Variable                      Option      Config Entry                  Environment Variable              Description
============================= =========== ============================= ================================= ==================================
profile                       --profile   profile                       AWS_PROFILE                       Default profile name
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
region                        --region    region                        AWS_DEFAULT_REGION                Default AWS Region
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
config_file                                                             AWS_CONFIG_FILE                   Alternate location of config
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
credentials_file                                                        AWS_SHARED_CREDENTIALS_FILE       Alternate location of credentials
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
output                        --output    output                        AWS_DEFAULT_OUTPUT                Default output style
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
ca_bundle                     --ca-bundle ca_bundle                     AWS_CA_BUNDLE                     CA Certificate Bundle
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
access_key                                aws_access_key_id             AWS_ACCESS_KEY_ID                 AWS Access Key
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
secret_key                                aws_secret_access_key         AWS_SECRET_ACCESS_KEY             AWS Secret Key
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
token                                     aws_session_token             AWS_SESSION_TOKEN                 AWS Token (temp credentials)
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
cli_timestamp_format                      cli_timestamp_format                                            Output format of timestamps
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
metadata_service_timeout                  metadata_service_timeout      AWS_METADATA_SERVICE_TIMEOUT      EC2 metadata timeout
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
metadata_service_num_attempts             metadata_service_num_attempts AWS_METADATA_SERVICE_NUM_ATTEMPTS EC2 metadata retry count
----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------
parameter_validation                      parameter_validation                                            Toggles local parameter validation
============================= =========== ============================= ================================= ==================================

^^^^^^^^
Examples
^^^^^^^^

If you get tired of specifying a ``--region`` option on the command line
all of the time, you can specify a default region to use whenever no
explicit ``--region`` option is included using the ``region`` variable.
To specify this using an environment variable::

    $ export AWS_DEFAULT_REGION=us-west-2

To include it in your config file::

    [default]
    aws_access_key_id=<default access key>
    aws_secret_access_key=<default secret key>
    region=us-west-1

Similarly, the ``profile`` variable can be used to specify which profile to use
if one is not explicitly specified on the command line via the
``--profile`` option.  To set this via environment variable::

    $ export AWS_PROFILE=testing

The ``profile`` variable can not be specified in the configuration file
since it would have to be associated with a profile and would defeat the
purpose.

^^^^^^^^^^^^^^^^^^^
Further Information
^^^^^^^^^^^^^^^^^^^

For more information about configuration options, please refer the
`AWS CLI Configuration Variables topic <http://docs.aws.amazon.com/cli/latest/topic/config-vars.html#cli-aws-help-config-vars>`_. You can access this topic
from the CLI as well by running ``aws help config-vars``.


----------------------------------------
Accessing Services With Global Endpoints
----------------------------------------

Some services, such as *AWS Identity and Access Management* (IAM)
have a single, global endpoint rather than different endpoints for
each region.

To make access to these services simpler, aws-cli will automatically
use the global endpoint unless you explicitly supply a region (using
the ``--region`` option) or a profile (using the ``--profile`` option).
Therefore, the following::

    $ aws iam list-users

will automatically use the global endpoint for the IAM service
regardless of the value of the ``AWS_DEFAULT_REGION`` environment
variable or the ``region`` variable specified in your profile.

--------------------
JSON Parameter Input
--------------------

Many options that need to be provided are simple string or numeric
values.  However, some operations require JSON data structures
as input parameters either on the command line or in files.

For example, consider the command to authorize access to an EC2
security group.  In this case, we will add ingress access to port 22
for all IP addresses::

    $ aws ec2 authorize-security-group-ingress --group-name MySecurityGroup \
      --ip-permissions '{"FromPort":22,"ToPort":22,"IpProtocol":"tcp","IpRanges":[{"CidrIp": "0.0.0.0/0"}]}'

--------------------------
File-based Parameter Input
--------------------------

Some parameter values are so large or so complex that it would be easier
to place the parameter value in a file and refer to that file rather than
entering the value directly on the command line.

Let's use the ``authorize-security-group-ingress`` command shown above.
Rather than provide the value of the ``--ip-permissions`` parameter directly
in the command, you could first store the values in a file.  Let's call
the file ``ip_perms.json``::

    {"FromPort":22,
     "ToPort":22,
     "IpProtocol":"tcp",
     "IpRanges":[{"CidrIp":"0.0.0.0/0"}]}

Then, we could make the same call as above like this::

    $ aws ec2 authorize-security-group-ingress --group-name MySecurityGroup \
        --ip-permissions file://ip_perms.json

The ``file://`` prefix on the parameter value signals that the parameter value
is actually a reference to a file that contains the actual parameter value.
aws-cli will open the file, read the value and use that value as the
parameter value.

This is also useful when the parameter is really referring to file-based
data.  For example, the ``--user-data`` option of the ``aws ec2 run-instances``
command or the ``--public-key-material`` parameter of the
``aws ec2 import-key-pair`` command.

--------------
Command Output
--------------

The default output for commands is currently JSON.  You can use the
``--query`` option to extract the output elements from this JSON document.
For more information on the expression language used for the ``--query``
argument, you can read the
`JMESPath Tutorial <http://jmespath.org/tutorial.html>`__.

^^^^^^^^
Examples
^^^^^^^^

Get a list of IAM user names::

    $ aws iam list-users --query Users[].UserName

Get a list of key names and their sizes in an S3 bucket::

    $ aws s3api list-objects --bucket b --query Contents[].[Key,Size]

Get a list of all EC2 instances and include their Instance ID, State Name,
and their Name (if they've been tagged with a Name)::

    $ aws ec2 describe-instances --query \
      'Reservations[].Instances[].[InstanceId,State.Name,Tags[?Key==`Name`] | [0].Value]'


You may also find the `jq <http://stedolan.github.com/jq/>`_ tool useful in
processing the JSON output for other uses.

There is also an ASCII table format available.  You can select this style with
the ``--output table`` option or you can make this style your default output
style via environment variable or config file entry as described above.
Try adding ``--output table`` to the above commands.


---------------
CLI Dev Version
---------------

If you are just interested in using the latest released version of the AWS CLI,
please see the Installation_ section above.  This section is for anyone who
wants to install the development version of the CLI.  You normally would not
need to do this unless:

* You are developing a feature for the CLI and plan on submitting a Pull
  Request.
* You want to test the latest changes of the CLI before they make it into an
  official release.

The latest changes to the CLI are in the ``v2`` branch on github.  This is
**NOT** the default branch when you clone the git repository, so you'll need
to make sure you ``git checkout v2``.

If you just want to install a snapshot of the latest development version of
the CLI, you can use the ``requirements.txt`` file included in this repo.
This file points to the development version of our dependencies::

    $ cd <path_to_awscli> && git checkout v2
    $ pip install -r requirements.txt
    $ pip install -e .

Verify that the AWS CLI is correctly installed. Note that the word ``source`` should appear in the output::

    $ aws --version
    aws-cli/2.2.30 Python/3.8.11 Darwin/20.4.0 source/x86_64 prompt/off

Generate the autocompletion index::

    $ ./scripts/gen-ac-index --include-builtin-index

Verify the autocompletion index is generated by entering auto-prompt mode::

    $ aws --cli-auto-prompt

------------
Getting Help
------------
The best way to interact with our team is through GitHub. You can `open
an issue <https://github.com/aws/aws-cli/issues/new/choose>`__ and
choose from one of our templates for guidance, bug reports, or feature
requests.

You may find help from the community on `Stack
Overflow <https://stackoverflow.com/>`__ with the tag
`aws-cli <https://stackoverflow.com/questions/tagged/aws-cli>`__ or on
the `AWS Discussion Forum for
CLI <https://forums.aws.amazon.com/forum.jspa?forumID=150>`__. If you
have a support plan with `AWS Premium
Support <https://aws.amazon.com/premiumsupport>`__, you can also create
a new support case.

Please check for open similar
`issues <https://github.com/aws/aws-cli/issues/>`__ before opening
another one.

The AWS CLI implements AWS service APIs. For general issues regarding
the services or their limitations, you may find the `Amazon Web Services
Discussion Forums <https://forums.aws.amazon.com/>`__ helpful.


--------------
More Resources
--------------

-  `Changelog <https://github.com/aws/aws-cli/blob/v2/CHANGELOG.rst>`__
-  `AWS CLI
   Documentation <https://docs.aws.amazon.com/cli/index.html>`__
-  `AWS CLI User
   Guide <https://docs.aws.amazon.com/cli/latest/userguide/>`__
-  `AWS CLI Command
   Reference <https://awscli.amazonaws.com/v2/documentation/api/latest/reference/index.html>`__
-  `Amazon Web Services Discussion
   Forums <https://forums.aws.amazon.com/>`__
-  `AWS Support <https://console.aws.amazon.com/support/home#/>`__


.. _`Amazon Web Services Security Bulletins website`: https://aws.amazon.com/security/security-bulletins
.. _`download the tarball`: https://pypi.org/project/awscli/

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "cpgaws",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": null,
    "author": "Amazon Web Services",
    "author_email": null,
    "download_url": "https://files.pythonhosted.org/packages/ca/b9/1a3dd14189bee57cccbc8526f7d24c9040ed047d4f537996baf39e72d3ff/cpgaws-2.15.19.tar.gz",
    "platform": null,
    "description": "=======\naws-cli\n=======\n\n.. image:: https://github.com/aws/aws-cli/actions/workflows/run-tests.yml/badge.svg\n   :target: https://github.com/aws/aws-cli/actions/workflows/run-tests.yml\n   :alt: Build Status\n\n\nThis package provides a unified command line interface to Amazon Web Services.\n\nThe aws-cli package works on Python versions:\n\n* 3.8.x\n* 3.9.x\n* 3.10.x\n* 3.11.x\n\n.. attention::\n   We recommend that all customers regularly monitor the\n   `Amazon Web Services Security Bulletins website`_ for any important security bulletins related to\n   aws-cli.\n\n Jump to:\n\n-  `Notices <#notices>`__\n-  `Installation <#installation>`__\n-  `Getting Started <#getting-started>`__\n-  `Getting Help <#getting-help>`__\n-  `More Resources <#more-resources>`__\n\n\n-------\nNotices\n-------\nOn 2024-06-20, support for macOS versions 10.14 and prior will be dropped.\nTo avoid disruption, customers using macOS 10.14 or prior\nshould upgrade to macOS 10.15 or later. For more information, please see\nthis `blog post <https://aws.amazon.com/blogs/developer/macos-support-policy-updates-for-the-aws-cli-v2/>`__.\n\n\n------------\nInstallation\n------------\n\nAWS CLI v2 can easily be installed on most standard platforms:\n\n* `MacOS pkg installer <https://awscli.amazonaws.com/AWSCLIV2.pkg>`__\n\n* `Linux x86-64 executable installer <https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip>`__\n\n* `Linux arm64 (aarch64) executable installer <https://awscli.amazonaws.com/awscli-exe-linux-aarch64.zip>`__\n\n* `Windows MSI installer <https://awscli.amazonaws.com/AWSCLIV2.msi>`__\n\nYou can find more detailed installation instructions `here <https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html>`__.\n\nIf you want to run the ``v2`` development branch of the CLI, see the\n\"CLI Dev Version\" section below.\n\n\n------------\nCLI Releases\n------------\n\nThe release notes for the AWS CLI can be found `here <https://github.com/aws/aws-cli/blob/v2/CHANGELOG.rst>`__.\n\n\n------------------\nCommand Completion\n------------------\n\nThe aws-cli package includes a very useful command completion feature.\nThis feature is not automatically installed so you need to configure it manually.\nTo enable tab completion for bash either use the built-in command ``complete``::\n\n    $ complete -C aws_completer aws\n\nOr add ``bin/aws_bash_completer`` file under ``/etc/bash_completion.d``,\n``/usr/local/etc/bash_completion.d`` or any other ``bash_completion.d`` location.\n\nFor tcsh::\n\n    $ complete aws 'p/*/`aws_completer`/'\n\nYou should add this to your startup scripts to enable it for future sessions.\n\nFor zsh please refer to ``bin/aws_zsh_completer.sh``.  Source that file, e.g.\nfrom your ``~/.zshrc``, and make sure you run ``compinit`` before::\n\n    $ source bin/aws_zsh_completer.sh\n\nFor now the bash compatibility auto completion (``bashcompinit``) is used.\nFor further details please refer to the top of ``bin/aws_zsh_completer.sh``.\n\n---------------\nGetting Started\n---------------\n\nBefore using aws-cli, you need to tell it about your AWS credentials.  You\ncan do this in several ways:\n\n* Environment variables\n* Shared credentials file\n* Config file\n* IAM Role\n\nThe quickest way to get started is to run the ``aws configure`` command::\n\n    $ aws configure\n    AWS Access Key ID: foo\n    AWS Secret Access Key: bar\n    Default region name [us-west-2]: us-west-2\n    Default output format [None]: json\n\nTo use environment variables, do the following::\n\n    $ export AWS_ACCESS_KEY_ID=<access_key>\n    $ export AWS_SECRET_ACCESS_KEY=<secret_key>\n\nTo use the shared credentials file, create an INI formatted file like this::\n\n    [default]\n    aws_access_key_id=foo\n    aws_secret_access_key=bar\n\n    [testing]\n    aws_access_key_id=foo\n    aws_secret_access_key=bar\n\nand place it in ``~/.aws/credentials`` (or in\n``%UserProfile%\\.aws/credentials`` on Windows). If you wish to place the\nshared credentials file in a different location than the one specified above,\nyou need to tell aws-cli where to find it.  Do this by setting\nthe appropriate environment variable::\n\n    $ export AWS_SHARED_CREDENTIALS_FILE=/path/to/shared_credentials_file\n\nTo use a config file, create a configuration file like this::\n\n    [default]\n    aws_access_key_id=<default access key>\n    aws_secret_access_key=<default secret key>\n    # Optional, to define default region for this profile.\n    region=us-west-1\n\n    [profile testing]\n    aws_access_key_id=<testing access key>\n    aws_secret_access_key=<testing secret key>\n    region=us-west-2\n\nand place it in ``~/.aws/config`` (or in ``%UserProfile%\\.aws\\config`` on Windows). If you wish to place the config file in a different location than the one\nspecified above, you need to tell aws-cli where to find it.  Do this by setting\nthe appropriate environment variable::\n\n    $ export AWS_CONFIG_FILE=/path/to/config_file\n\nAs you can see, you can have multiple ``profiles`` defined in both the shared\ncredentials file and the  configuration file. You can then specify which\nprofile to use by using the ``--profile`` option. If no profile is specified\nthe ``default`` profile is used.\n\nIn the config file, except for the default profile, you\n**must** prefix each config section of a profile group with ``profile``.\nFor example, if you have a profile named \"testing\" the section header would\nbe ``[profile testing]``.\n\nThe final option for credentials is highly recommended if you are\nusing aws-cli on an EC2 instance.  IAM Roles are\na great way to have credentials installed automatically on your\ninstance.  If you are using IAM Roles, aws-cli will find them and use\nthem automatically.\n\n----------------------------\nOther Configurable Variables\n----------------------------\n\nIn addition to credentials, a number of other variables can be\nconfigured either with environment variables, configuration file\nentries or both.  The following table documents these.\n\n============================= =========== ============================= ================================= ==================================\nVariable                      Option      Config Entry                  Environment Variable              Description\n============================= =========== ============================= ================================= ==================================\nprofile                       --profile   profile                       AWS_PROFILE                       Default profile name\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\nregion                        --region    region                        AWS_DEFAULT_REGION                Default AWS Region\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\nconfig_file                                                             AWS_CONFIG_FILE                   Alternate location of config\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\ncredentials_file                                                        AWS_SHARED_CREDENTIALS_FILE       Alternate location of credentials\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\noutput                        --output    output                        AWS_DEFAULT_OUTPUT                Default output style\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\nca_bundle                     --ca-bundle ca_bundle                     AWS_CA_BUNDLE                     CA Certificate Bundle\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\naccess_key                                aws_access_key_id             AWS_ACCESS_KEY_ID                 AWS Access Key\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\nsecret_key                                aws_secret_access_key         AWS_SECRET_ACCESS_KEY             AWS Secret Key\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\ntoken                                     aws_session_token             AWS_SESSION_TOKEN                 AWS Token (temp credentials)\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\ncli_timestamp_format                      cli_timestamp_format                                            Output format of timestamps\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\nmetadata_service_timeout                  metadata_service_timeout      AWS_METADATA_SERVICE_TIMEOUT      EC2 metadata timeout\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\nmetadata_service_num_attempts             metadata_service_num_attempts AWS_METADATA_SERVICE_NUM_ATTEMPTS EC2 metadata retry count\n----------------------------- ----------- ----------------------------- --------------------------------- ----------------------------------\nparameter_validation                      parameter_validation                                            Toggles local parameter validation\n============================= =========== ============================= ================================= ==================================\n\n^^^^^^^^\nExamples\n^^^^^^^^\n\nIf you get tired of specifying a ``--region`` option on the command line\nall of the time, you can specify a default region to use whenever no\nexplicit ``--region`` option is included using the ``region`` variable.\nTo specify this using an environment variable::\n\n    $ export AWS_DEFAULT_REGION=us-west-2\n\nTo include it in your config file::\n\n    [default]\n    aws_access_key_id=<default access key>\n    aws_secret_access_key=<default secret key>\n    region=us-west-1\n\nSimilarly, the ``profile`` variable can be used to specify which profile to use\nif one is not explicitly specified on the command line via the\n``--profile`` option.  To set this via environment variable::\n\n    $ export AWS_PROFILE=testing\n\nThe ``profile`` variable can not be specified in the configuration file\nsince it would have to be associated with a profile and would defeat the\npurpose.\n\n^^^^^^^^^^^^^^^^^^^\nFurther Information\n^^^^^^^^^^^^^^^^^^^\n\nFor more information about configuration options, please refer the\n`AWS CLI Configuration Variables topic <http://docs.aws.amazon.com/cli/latest/topic/config-vars.html#cli-aws-help-config-vars>`_. You can access this topic\nfrom the CLI as well by running ``aws help config-vars``.\n\n\n----------------------------------------\nAccessing Services With Global Endpoints\n----------------------------------------\n\nSome services, such as *AWS Identity and Access Management* (IAM)\nhave a single, global endpoint rather than different endpoints for\neach region.\n\nTo make access to these services simpler, aws-cli will automatically\nuse the global endpoint unless you explicitly supply a region (using\nthe ``--region`` option) or a profile (using the ``--profile`` option).\nTherefore, the following::\n\n    $ aws iam list-users\n\nwill automatically use the global endpoint for the IAM service\nregardless of the value of the ``AWS_DEFAULT_REGION`` environment\nvariable or the ``region`` variable specified in your profile.\n\n--------------------\nJSON Parameter Input\n--------------------\n\nMany options that need to be provided are simple string or numeric\nvalues.  However, some operations require JSON data structures\nas input parameters either on the command line or in files.\n\nFor example, consider the command to authorize access to an EC2\nsecurity group.  In this case, we will add ingress access to port 22\nfor all IP addresses::\n\n    $ aws ec2 authorize-security-group-ingress --group-name MySecurityGroup \\\n      --ip-permissions '{\"FromPort\":22,\"ToPort\":22,\"IpProtocol\":\"tcp\",\"IpRanges\":[{\"CidrIp\": \"0.0.0.0/0\"}]}'\n\n--------------------------\nFile-based Parameter Input\n--------------------------\n\nSome parameter values are so large or so complex that it would be easier\nto place the parameter value in a file and refer to that file rather than\nentering the value directly on the command line.\n\nLet's use the ``authorize-security-group-ingress`` command shown above.\nRather than provide the value of the ``--ip-permissions`` parameter directly\nin the command, you could first store the values in a file.  Let's call\nthe file ``ip_perms.json``::\n\n    {\"FromPort\":22,\n     \"ToPort\":22,\n     \"IpProtocol\":\"tcp\",\n     \"IpRanges\":[{\"CidrIp\":\"0.0.0.0/0\"}]}\n\nThen, we could make the same call as above like this::\n\n    $ aws ec2 authorize-security-group-ingress --group-name MySecurityGroup \\\n        --ip-permissions file://ip_perms.json\n\nThe ``file://`` prefix on the parameter value signals that the parameter value\nis actually a reference to a file that contains the actual parameter value.\naws-cli will open the file, read the value and use that value as the\nparameter value.\n\nThis is also useful when the parameter is really referring to file-based\ndata.  For example, the ``--user-data`` option of the ``aws ec2 run-instances``\ncommand or the ``--public-key-material`` parameter of the\n``aws ec2 import-key-pair`` command.\n\n--------------\nCommand Output\n--------------\n\nThe default output for commands is currently JSON.  You can use the\n``--query`` option to extract the output elements from this JSON document.\nFor more information on the expression language used for the ``--query``\nargument, you can read the\n`JMESPath Tutorial <http://jmespath.org/tutorial.html>`__.\n\n^^^^^^^^\nExamples\n^^^^^^^^\n\nGet a list of IAM user names::\n\n    $ aws iam list-users --query Users[].UserName\n\nGet a list of key names and their sizes in an S3 bucket::\n\n    $ aws s3api list-objects --bucket b --query Contents[].[Key,Size]\n\nGet a list of all EC2 instances and include their Instance ID, State Name,\nand their Name (if they've been tagged with a Name)::\n\n    $ aws ec2 describe-instances --query \\\n      'Reservations[].Instances[].[InstanceId,State.Name,Tags[?Key==`Name`] | [0].Value]'\n\n\nYou may also find the `jq <http://stedolan.github.com/jq/>`_ tool useful in\nprocessing the JSON output for other uses.\n\nThere is also an ASCII table format available.  You can select this style with\nthe ``--output table`` option or you can make this style your default output\nstyle via environment variable or config file entry as described above.\nTry adding ``--output table`` to the above commands.\n\n\n---------------\nCLI Dev Version\n---------------\n\nIf you are just interested in using the latest released version of the AWS CLI,\nplease see the Installation_ section above.  This section is for anyone who\nwants to install the development version of the CLI.  You normally would not\nneed to do this unless:\n\n* You are developing a feature for the CLI and plan on submitting a Pull\n  Request.\n* You want to test the latest changes of the CLI before they make it into an\n  official release.\n\nThe latest changes to the CLI are in the ``v2`` branch on github.  This is\n**NOT** the default branch when you clone the git repository, so you'll need\nto make sure you ``git checkout v2``.\n\nIf you just want to install a snapshot of the latest development version of\nthe CLI, you can use the ``requirements.txt`` file included in this repo.\nThis file points to the development version of our dependencies::\n\n    $ cd <path_to_awscli> && git checkout v2\n    $ pip install -r requirements.txt\n    $ pip install -e .\n\nVerify that the AWS CLI is correctly installed. Note that the word ``source`` should appear in the output::\n\n    $ aws --version\n    aws-cli/2.2.30 Python/3.8.11 Darwin/20.4.0 source/x86_64 prompt/off\n\nGenerate the autocompletion index::\n\n    $ ./scripts/gen-ac-index --include-builtin-index\n\nVerify the autocompletion index is generated by entering auto-prompt mode::\n\n    $ aws --cli-auto-prompt\n\n------------\nGetting Help\n------------\nThe best way to interact with our team is through GitHub. You can `open\nan issue <https://github.com/aws/aws-cli/issues/new/choose>`__ and\nchoose from one of our templates for guidance, bug reports, or feature\nrequests.\n\nYou may find help from the community on `Stack\nOverflow <https://stackoverflow.com/>`__ with the tag\n`aws-cli <https://stackoverflow.com/questions/tagged/aws-cli>`__ or on\nthe `AWS Discussion Forum for\nCLI <https://forums.aws.amazon.com/forum.jspa?forumID=150>`__. If you\nhave a support plan with `AWS Premium\nSupport <https://aws.amazon.com/premiumsupport>`__, you can also create\na new support case.\n\nPlease check for open similar\n`issues <https://github.com/aws/aws-cli/issues/>`__ before opening\nanother one.\n\nThe AWS CLI implements AWS service APIs. For general issues regarding\nthe services or their limitations, you may find the `Amazon Web Services\nDiscussion Forums <https://forums.aws.amazon.com/>`__ helpful.\n\n\n--------------\nMore Resources\n--------------\n\n-  `Changelog <https://github.com/aws/aws-cli/blob/v2/CHANGELOG.rst>`__\n-  `AWS CLI\n   Documentation <https://docs.aws.amazon.com/cli/index.html>`__\n-  `AWS CLI User\n   Guide <https://docs.aws.amazon.com/cli/latest/userguide/>`__\n-  `AWS CLI Command\n   Reference <https://awscli.amazonaws.com/v2/documentation/api/latest/reference/index.html>`__\n-  `Amazon Web Services Discussion\n   Forums <https://forums.aws.amazon.com/>`__\n-  `AWS Support <https://console.aws.amazon.com/support/home#/>`__\n\n\n.. _`Amazon Web Services Security Bulletins website`: https://aws.amazon.com/security/security-bulletins\n.. _`download the tarball`: https://pypi.org/project/awscli/\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Universal Command Line Environment for AWS.",
    "version": "2.15.19",
    "project_urls": {
        "homepage": "http://aws.amazon.com/cli/"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "c78e6ebabeb91ea6d29d437d8a6ce8ac0775b94d3633aadce5332f1f9ad7da66",
                "md5": "f31dd279369e211e92921fb9eb808a0f",
                "sha256": "28ee5954f995d8370c4abd1c5a1710d45809a7ae71e4c5ad4c2023959b7e0680"
            },
            "downloads": -1,
            "filename": "cpgaws-2.15.19-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "f31dd279369e211e92921fb9eb808a0f",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.8",
            "size": 15049083,
            "upload_time": "2024-02-12T21:24:51",
            "upload_time_iso_8601": "2024-02-12T21:24:51.112175Z",
            "url": "https://files.pythonhosted.org/packages/c7/8e/6ebabeb91ea6d29d437d8a6ce8ac0775b94d3633aadce5332f1f9ad7da66/cpgaws-2.15.19-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "cab91a3dd14189bee57cccbc8526f7d24c9040ed047d4f537996baf39e72d3ff",
                "md5": "9b8b0fbcc9571b16661d06585fe2437c",
                "sha256": "6957e5d1cb32a0bfe340f7dfb0bb44bc89de76759aafeea5337c46aab56896f8"
            },
            "downloads": -1,
            "filename": "cpgaws-2.15.19.tar.gz",
            "has_sig": false,
            "md5_digest": "9b8b0fbcc9571b16661d06585fe2437c",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 14817833,
            "upload_time": "2024-02-12T21:24:56",
            "upload_time_iso_8601": "2024-02-12T21:24:56.035932Z",
            "url": "https://files.pythonhosted.org/packages/ca/b9/1a3dd14189bee57cccbc8526f7d24c9040ed047d4f537996baf39e72d3ff/cpgaws-2.15.19.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-02-12 21:24:56",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "cpgaws"
}
        
Elapsed time: 0.20902s