Files
labs/utilities/setup_aws/use-s3.sh

44 lines
1.3 KiB
Bash
Raw Normal View History

2025-06-12 15:09:24 -07:00
#!/bin/bash
MFA_TOKEN=$1
2025-06-12 15:09:24 -07:00
<<<<<<< HEAD
=======
# Capture everything from second argument onward as a command
shift
COMMAND=("$@")
>>>>>>> 1437cee (Add resume pdf & html)
2025-06-12 15:09:24 -07:00
if [ -z "$1" ]; then
echo "Error: Run with MFA token!"
exit 1
fi
if [ -z $BW_AWS_ACCOUNT_SECRET_ID ]; then
echo "env var BW_AWS_ACCOUNT_SECRET_ID must be set!"
exit 1
fi
AWS_SECRETS=$(bw get item $BW_AWS_ACCOUNT_SECRET_ID)
export AWS_ACCESS_KEY_ID=$(echo "$AWS_SECRETS" | jq -r '.fields[0].value')
export AWS_SECRET_ACCESS_KEY=$(echo "$AWS_SECRETS" | jq '.fields[1].value' | tr -d '"')
SESSION_OUTPUT=$(aws sts assume-role --role-arn $S3_ROLE --role-session-name $SESSION_TYPE --serial-number $MFA_IDENTIFIER --token-code $MFA_TOKEN)
#echo $SESSION_OUTPUT
export AWS_SESSION_TOKEN=$(echo "$SESSION_OUTPUT" | jq '.Credentials.SessionToken' | tr -d '"')
export AWS_ACCESS_KEY_ID=$(echo "$SESSION_OUTPUT" | jq '.Credentials.AccessKeyId' | tr -d '"')
export AWS_SECRET_ACCESS_KEY=$(echo "$SESSION_OUTPUT" | jq '.Credentials.SecretAccessKey' | tr -d '"')
#echo $AWS_SESSION_TOKEN
#echo $AWS_ACCESS_KEY_ID
#echo $AWS_SECRET_ACCESS_KEY
2025-06-12 15:09:24 -07:00
<<<<<<< HEAD
2025-06-12 15:09:24 -07:00
aws s3 ls s3://witch-lab-3
2025-06-12 15:09:24 -07:00
echo "finished!"
=======
# aws s3 ls s3://witch-lab-3
if command -v "$COMMAND" >/dev/null 2>&1; then
"${COMMAND[@]}"
fi
>>>>>>> 1437cee (Add resume pdf & html)