Skip to content

Commit 3d194cc

Browse files
committed
Auto-generate docs for release v0.8.1 [ci skip]
1 parent ab684cc commit 3d194cc

File tree

2 files changed

+6
-1
lines changed

2 files changed

+6
-1
lines changed
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
# **Note**: This public repo contains the documentation for the private GitHub repo <https://github.com/gruntwork-io/module-security>.
22
# We publish the documentation publicly so it turns up in online searches, but to see the source code, you must be a Gruntwork customer.
3-
# If you're already a Gruntwork customer, the original source for this file is at: <https://github.com/gruntwork-io/module-security/blob/master/circle.yml>.
3+
# If you're already a Gruntwork customer, the original source for this file is at: <https://github.com/gruntwork-io/module-security/blob/master/.circleci/config.yml>.
44
# If you're not a customer, contact us at <[email protected]> or <http://www.gruntwork.io> for info on how to get access!

modules/aws-auth/README.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ Next, you have to copy and paste each part of that JSON output into the proper e
4545
export AWS_ACCESS_KEY_ID='AAA'
4646
export AWS_SECRET_ACCESS_KEY='BBB'
4747
export AWS_SESSION_TOKEN='CCC'
48+
export AWS_SESSION_EXPIRATION='DDD'
4849
```
4950

5051
If you want to assume an IAM role, you have to make another API call:
@@ -72,6 +73,7 @@ Which you again have to copy into the proper environment variable:
7273
export AWS_ACCESS_KEY_ID='EEE'
7374
export AWS_SECRET_ACCESS_KEY='FFF'
7475
export AWS_SESSION_TOKEN='GGG'
76+
export AWS_SESSION_EXPIRATION='HHH'
7577
```
7678

7779
With this script, all of this can be done in a single command!
@@ -129,8 +131,11 @@ aws-auth --serial-number arn:aws:iam::123456789011:mfa/jondoe --token-code 12345
129131
export AWS_ACCESS_KEY_ID='AAA'
130132
export AWS_SECRET_ACCESS_KEY='BBB'
131133
export AWS_SESSION_TOKEN='CCC'
134+
export AWS_SESSION_EXPIRATION='DDD'
132135
```
133136

137+
**NOTE**: `AWS_SESSION_EXPIRATION` environment variable is not used by any official libraries (i.e. aws cli, boto, etc.). It's only exported for your convenience, for example a wrapper that renews once expired.
138+
134139
To setup your AWS environment variables in one command, all you have to do is eval the result!
135140

136141
```bash

0 commit comments

Comments
 (0)