%global _empty_manifest_terminate_build 0 Name: python-sceptre-ssm-resolver Version: 1.2.2 Release: 1 Summary: A Sceptre resolver to retrieve data from the AWS secure store License: Apache2 URL: https://github.com/sceptre/sceptre-ssm-resolver Source0: https://mirrors.nju.edu.cn/pypi/web/packages/2f/6a/97b050b5aa9df6ba3cc3efc5b6b18087365d59e9c4265d6bd3a4b105e56d/sceptre-ssm-resolver-1.2.2.tar.gz BuildArch: noarch Requires: python3-sceptre Requires: python3-pytest %description # Overview The purpose of this resolver is to retrieve values from the AWS SSM. ## Install ```bash pip install sceptre-ssm-resolver ``` ## Available Resolvers ### ssm Fetches the value stored in AWS SSM Parameter Store. __Note:__ Sceptre must be run with a user or role that has access to the parameter store Syntax: ```yaml parameter|sceptre_user_data: : !ssm /prefix/param ``` ```yaml parameter|sceptre_user_data: : !ssm name: /prefix/param region: us-east-1 profile: OtherAccount ``` ```yaml parameter|sceptre_user_data: : !ssm {"name": "/prefix/param", "region": "us-east-1", "profile": "OtherAccount"} ``` #### Parameters * name - SSM key name, mandatory * region - SSM key region, optional, stack region by default * profile - SSM key's account profile , optional, stack profile by default #### Example: Add a secure string to the SSM parameter store ```bash aws ssm put-parameter --name /dev/DbPassword --value "mysecret" \ --key-id alias/dev/kmskey --type "SecureString" ``` Retrieve and decrypt SSM parameter from the same account that the stack is being deployed to: ```yaml parameters: database_password: !ssm /dev/DbPassword ``` Retrieve and decrypt SSM parameter from another AWS account: ```yaml parameters: database_password: !ssm name: /dev/DbPassword profile: OtherAccount ``` %package -n python3-sceptre-ssm-resolver Summary: A Sceptre resolver to retrieve data from the AWS secure store Provides: python-sceptre-ssm-resolver BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-sceptre-ssm-resolver # Overview The purpose of this resolver is to retrieve values from the AWS SSM. ## Install ```bash pip install sceptre-ssm-resolver ``` ## Available Resolvers ### ssm Fetches the value stored in AWS SSM Parameter Store. __Note:__ Sceptre must be run with a user or role that has access to the parameter store Syntax: ```yaml parameter|sceptre_user_data: : !ssm /prefix/param ``` ```yaml parameter|sceptre_user_data: : !ssm name: /prefix/param region: us-east-1 profile: OtherAccount ``` ```yaml parameter|sceptre_user_data: : !ssm {"name": "/prefix/param", "region": "us-east-1", "profile": "OtherAccount"} ``` #### Parameters * name - SSM key name, mandatory * region - SSM key region, optional, stack region by default * profile - SSM key's account profile , optional, stack profile by default #### Example: Add a secure string to the SSM parameter store ```bash aws ssm put-parameter --name /dev/DbPassword --value "mysecret" \ --key-id alias/dev/kmskey --type "SecureString" ``` Retrieve and decrypt SSM parameter from the same account that the stack is being deployed to: ```yaml parameters: database_password: !ssm /dev/DbPassword ``` Retrieve and decrypt SSM parameter from another AWS account: ```yaml parameters: database_password: !ssm name: /dev/DbPassword profile: OtherAccount ``` %package help Summary: Development documents and examples for sceptre-ssm-resolver Provides: python3-sceptre-ssm-resolver-doc %description help # Overview The purpose of this resolver is to retrieve values from the AWS SSM. ## Install ```bash pip install sceptre-ssm-resolver ``` ## Available Resolvers ### ssm Fetches the value stored in AWS SSM Parameter Store. __Note:__ Sceptre must be run with a user or role that has access to the parameter store Syntax: ```yaml parameter|sceptre_user_data: : !ssm /prefix/param ``` ```yaml parameter|sceptre_user_data: : !ssm name: /prefix/param region: us-east-1 profile: OtherAccount ``` ```yaml parameter|sceptre_user_data: : !ssm {"name": "/prefix/param", "region": "us-east-1", "profile": "OtherAccount"} ``` #### Parameters * name - SSM key name, mandatory * region - SSM key region, optional, stack region by default * profile - SSM key's account profile , optional, stack profile by default #### Example: Add a secure string to the SSM parameter store ```bash aws ssm put-parameter --name /dev/DbPassword --value "mysecret" \ --key-id alias/dev/kmskey --type "SecureString" ``` Retrieve and decrypt SSM parameter from the same account that the stack is being deployed to: ```yaml parameters: database_password: !ssm /dev/DbPassword ``` Retrieve and decrypt SSM parameter from another AWS account: ```yaml parameters: database_password: !ssm name: /dev/DbPassword profile: OtherAccount ``` %prep %autosetup -n sceptre-ssm-resolver-1.2.2 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-sceptre-ssm-resolver -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Tue May 30 2023 Python_Bot - 1.2.2-1 - Package Spec generated