CLI for AWS CloudShell
Project description
csi: CloudShell Interface
csi is a command-line interface for AWS CloudShell which brings CloudShell to your terminal where it belongs.
It allows you to manage and connect to VPC and non-VPC CloudShell sessions directly from your command line.
Key features
- List and manage CloudShell environments
- Create VPC environments with specific VPC, subnets, and security groups
- Connect to CloudShell environments via SSM in the terminal
- Download and upload files between your machine and CloudShell environments
- Execute commands remotely on CloudShell environments
- Genie - magically creates a CloudShell environment with the right network access to reach:
- ENIs/hostnames/IP addresses on specific ports and IP protocols
- EC2 instances
- RDS databases
Each command and flag has tab completion (where needed).
Click here to see demo
Why use csi?
Unfortunately, CloudShell is only available on the AWS console. There's no official support in the AWS CLI or any AWS SDK.
The only way to use CloudShell outside of the console is by making sigv4 signed requests to the correct endpoints.
csi handles all these requests for you and provides a sleek interface with custom commands to make CloudShell easier to use.
Why care about CloudShell?
In June 2024, Amazon announced the ability to spin up CloudShell environments in a VPC, subnets, and security groups of your choice.
This is extremely useful for troubleshooting issues:
- boot time is about half a minute, much faster than spinning up an ec2
- environments are ephemeral, which can be useful for testing and quick tasks
- you only pay for data transfer, no additional fees
Setup
- Install dependencies using
uvorpip - If you wish to use
csi ssm,csi execute, orcsi genie, you must have the AWS Session Manager somewhere in yourPATH - Set your the AWS profile, e.g. via
AWS_PROFILE - Run
bin/csi - Symlink
bin/csion yourPATH, or add/path/to/repo/bin/to yourPATHto runcsiglobally
If you want tab completion, completion files are in completions/:
- For
bash, putcsi.bashin$XDG_DATA_HOME/bash-completion/or~/.local/share/bash-completion/if$XDG_DATA_HOMEis not set- e.g.
ln -srf completions/csi.bash ~/.local/share/bash-completion/
- e.g.
- For
zsh, putcsi.zshsomewhere in yourfpathas_csi- e.g.
ln -srf completions/csi.zsh /path/to/fpath/_csi
- e.g.
- NOTE to complete certain flags, tab completion depends on
python3,boto3,csi, andawk
Warnings
- This tool is not an official tool by Amazon/AWS
- Beware of the service quotas for CloudShell, specifically the adjustable 200 monthly hour limit applied across all IAM principals within an account.
- This tool is GPLv3 licensed - there is no warranty. If you reach service limits in your account, contact AWS support.
- CloudShell environments exist per IAM principal. When assuming a role, make sure to do so with a unique role session name for yourself.
Example usage
- NOTE: Each command and option has tab completion (where needed)
- You can use the identifier or name to refer to a CloudShell environment
Listing CloudShell environments
$ csi ls
90356db8-8797-4d97-b776-2fb3696e0132 default RUNNING
d29340e9-d1a5-4509-964a-df67271410cf csi-i-0441309a8e1338cd1-443 SUSPENDED vpc-00235e1cd5f421ea3 subnet-09109a275b488cb8b
e8278021-e179-4e44-9e7d-6fedd64960f1 csi-rds SUSPENDED vpc-00235e1cd5f421ea3 subnet-09109a275b488cb8b,subnet-0c8fb515762607bcc
Creating a CloudShell environment
# Create a default CloudShell environment (no VPC)
$ csi create
# Create a VPC CloudShell environment in a specific subnet, using the default security group
$ csi create --name my-vpc-shell --subnets subnet-01234567890abcdef
# Create a VPC CloudShell environment in a specific subnet, specifying a security group
$ csi create --name my-vpc-shell --subnets subnet-01234567890abcdef --security-groups sg-01234567890abcdef
Managing CloudShell environments
# Start an environment
$ csi start default
$ csi start 90356db8-8797-4d97-b776-2fb3696e0132
# Stop an environment
$ csi stop default
# Delete an environment
$ csi delete default
Connecting to a CloudShell environment via Systems Manager (SSM)
$ csi ssm default
Starting session with SessionId: 1743751285551588149-un38ksdoyu7u7suz6li3vx53r4
~ $ whoami
cloudshell-user
Executing commands on a CloudShell environment
$ csi execute default -c 'aws s3 ls'
Uploading and Downloading files
$ csi upload default /tmp/data.sql /tmp/
$ csi upload default /tmp/data.sql /tmp/data.sql
$ csi download default /tmp/data.sql /tmp/
Magic Genie
Genie magically creates and connects to a CloudShell environment with the correct network access to reach the resource you specify.
Under the hood, the genie command will:
- look up your resource
- find the associated ENI, and capture the VPC and subnets the resource lives in
- attempt to find any security groups allowed to access the resource for the specified port and protocol
- if none are found, it will check whether the CIDR range for any of the subnets captured earlier overlap in any whitelisted IP CIDR range rules for the specified port and protocol
- if 3) and 4) fail - then the command will exit with an error
- otherwise, genie will stand up a CloudShell in the appropriate subnet(s) and security groups, and attempt to add the default security group (if it exists)
Temporary genie environments can be created with --tmp
# Connect to an EC2 instance on port 22
$ csi genie --ec2 i-01234567890abcdef --port 22
# Connect to an RDS instance
$ csi genie --rds my-database-instance
# Connect to a specific IP and port
$ csi genie --ip 10.0.0.123 --port 3306
# Connect to a hostname and port (note this hostname must be externally resolvable)
$ csi genie --host internal-service.example.com --port 8080
# Create a temporary environment that will be deleted after use with --tmp
$ csi genie --ec2 i-01234567890abcdef --port 22 --tmp
# Create a CloudShell and output the ID to stdout
$ csi genie --ec2 i-01234567890abcdef --port 22 --output-id
Roadmap
- Use name of environment instead of IDs when issuing commands
- Inject credentials
- Upload files
- Download files
- genie: re-use existing environments if the VPC configuration is compatible
- Genie mode for IP/EC2/RDS access
- Temporary environments
- Tab completion
- pub to pypi
- Better tab completion (complete opts)
- Port tunneling (hard)
- Output genie ID (do not connect)
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cloudshell_interface-0.1.1.tar.gz.
File metadata
- Download URL: cloudshell_interface-0.1.1.tar.gz
- Upload date:
- Size: 36.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
33c1f02e16317df25a16e9c1fb3bdc22a5bb993df0fd274381aadf59929ccc41
|
|
| MD5 |
2e8151eb7aa1379aa20a178277028040
|
|
| BLAKE2b-256 |
333e859cfa320eef223f74f22dbe4a7ad53fa204f89e38684653a7d07b209efe
|
File details
Details for the file cloudshell_interface-0.1.1-py3-none-any.whl.
File metadata
- Download URL: cloudshell_interface-0.1.1-py3-none-any.whl
- Upload date:
- Size: 25.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3b2fec4fd818af02c3f98b5c7de661fb541907354efcbdf64ebd486c992f0349
|
|
| MD5 |
ff9adc3a0ee2f14c3a797e60650a77de
|
|
| BLAKE2b-256 |
7d44f3bceaa3dce3bd6ab6f81603388998b0cb53507cbac13dc748bf534728aa
|