README.md in aws_assume_role-0.1.1 vs README.md in aws_assume_role-0.1.2
- old
+ new
@@ -1,7 +1,12 @@
aws-assume-role
---------------
+[![Build Status](https://travis-ci.org/scalefactory/aws-assume-role.svg?branch=master)](https://travis-ci.org/scalefactory/aws-assume-role)
+[![Coverage Status](https://coveralls.io/repos/github/scalefactory/aws-assume-role/badge.svg?branch=master)](https://coveralls.io/github/scalefactory/aws-assume-role?branch=master)
+[![Code Climate](https://codeclimate.com/github/scalefactory/aws-assume-role/badges/gpa.svg)](https://codeclimate.com/github/scalefactory/aws-assume-role)
+[![Dependencies](https://img.shields.io/librariesio/github/scalefactory/aws-assume-role.svg)](https://libraries.io/rubygems/aws_assume_role)
+[![Gem Version](https://badge.fury.io/rb/aws_assume_role.svg)](https://badge.fury.io/rb/aws_assume_role)
aws-assume-role is a utility intended for developer and operator environments
who need to use 2FA and role assumption to access AWS services.
aws-assume-role can store both AWS access keys and ephemeral session tokens in
@@ -15,15 +20,15 @@
This helps prevent credential leaking and theft, and means they aren't stored on
disk as unencrypted files.
It allows easy credential management and role assumption with a 2FA/MFA device.
-For more information on role assumption, see the AWS documentation.
+For more information on role assumption, see the [AWS documentation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html).
Requirements
------------
-* Ruby ≥ 2.2
+* Ruby ≥ 2.1
* OS X KeyChain or GNOME Keyring
Install
-------
@@ -177,17 +182,17 @@
* `region`
`aws_assume_role` resolves credentials in almost the same way as the AWS SDK, i.e.:
```no-highlight
-static credentials ⟶ environment variables ⟶ configured profiles
+static credentials ⟶ environment variables ⟶ configured profiles role ⟶ assumption (look up source profile and check for 2FA)
```
Any of the above may get chained to do MFA or role assumption, or both,
in the following order:
```no-highlight
-second factor ⟶ role assumption (look up source profile and check for 2FA) ⟶ ecs/instance profile
+second factor ⟶ ecs/instance profile
```
These are the same as the AWS SDK equivalents whereever possible. The command line help will give an explanation of the rest.
### Monkeypatching the AWS SDK