You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+37-1Lines changed: 37 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
# my_aws_tools
2
2
3
3
**Author:** r3-yamauchi
4
-
**Version:** 1.0.9
4
+
**Version:** 1.0.10
5
5
**Type:** tool
6
6
7
7
English | [Japanese](https://github.com/r3-yamauchi/dify-my-aws-tools-plugin/blob/main/readme/README_ja_JP.md)
@@ -59,6 +59,8 @@ Included tools:
59
59
- Agentcore Event Manager
60
60
- Agentcore Runtime
61
61
- Agentcore Observability
62
+
- Get Credentials
63
+
- STS AssumeRole
62
64
63
65
The source code of this plugin is available in the [GitHub repository](https://github.com/r3-yamauchi/dify-my-aws-tools-plugin).
64
66
@@ -667,6 +669,40 @@ yaml_content: |
667
669
}
668
670
```
669
671
672
+
- **Get Credentials**: Retrieves AWS credentials from boto3.Session. Returns access key, secret key, and session token in JSON format using the specified profile and region. If `profile_name` or `region_name` is not specified, it uses the AWS Credential Provider Chain (environment variables, ~/.aws/credentials, IAM roles, etc.) to obtain default credentials. When running on EC2 instances or ECS tasks, it can automatically retrieve temporary credentials from instance profiles or task roles.
673
+
674
+
```json
675
+
{
676
+
"profile_name": "development",
677
+
"region_name": "ap-northeast-1"
678
+
}
679
+
```
680
+
681
+
```json
682
+
{}
683
+
```
684
+
(Retrieve default credentials without parameters)
685
+
686
+
- **STS AssumeRole**: Uses AWS STS to assume an IAM role and retrieve temporary credentials. Use this for cross-account access or privilege escalation. Supports advanced configurations such as MFA authentication, external ID, and session policies. The retrieved credentials are returned in a format compatible with the Get Credentials tool.
The plugin is designed to interact with AWS services (such as Bedrock, Lambda, S3, and DynamoDB) on your behalf. It does not collect analytics or telemetry beyond what is required to fulfill the tool invocations you issue.
0 commit comments