Adoptable Cookbooks List

Looking for a cookbook to adopt? You can now see a list of cookbooks available for adoption!
List of Adoptable Cookbooks

Supermarket Belongs to the Community

Supermarket belongs to the community. While Chef has the responsibility to keep it running and be stewards of its functionality, what it does and how it works is driven by the community. The chef/supermarket repository will continue to be where development of the Supermarket application takes place. Come be part of shaping the direction of Supermarket by opening issues and pull requests or by joining us on the Chef Mailing List.

Select Badges

Select Supported Platforms

The awscreds cookbook has been deprecated

The awscreds cookbook has been deprecated and is no longer being maintained by its authors. Use of the awscreds cookbook is no longer recommended.


awscreds (4) Versions 0.1.0

Creates /root/.aws/config from chef-vault

cookbook 'awscreds', '= 0.1.0'
cookbook 'awscreds', '= 0.1.0', :supermarket
knife supermarket install awscreds
knife supermarket download awscreds
Quality 0%


Build Status Cookbook Version

Loads credentials from chef vault and creates an aws config file (.ini format) from the loaded credentials. Supports multiple profiles and alternate locations for the credentials file.



  • Any platform supported by Chef


  • Chef 11+


  • none


  • node['awscreds']['filename'] - The name of the file to create that contains the credentials. Defaults to /root/.aws/config.
  • node['awscreds']['vault_name'] - The name of the data bag/vault that will contain the credentials. Defaults to 'awscreds'.
  • node['awscreds']['vault_search'] - A search query to execute that will grab the items from the vault. Defaults to '*:*' (i.e. grab every item in the vault). You can change this so only some of the credentials stored in the vault are put in the credentials file.
  • node['awscreds']['default_profile'] - The AWS credentials file contains a special profile called 'default' that is used by tools when no profile name is specified. This setting allows you to specify which profile (i.e. which vault item) becomes the default profile in the file. This defaults to a profile/vault item called 'default'.


Create a chef vault item with your credentials in:

knife vault create awscreds default -S 'role:some-role' -A 'admin1,admin2'

The content should look like the following:

  "id": "default",
  "aws_access_key_id": "AAAAAAAAAAAAAAAAAAAA",
  "aws_secret_access_key": "ABC123abc123ABC123abc123ABC123abc123ABC1"

The vault item ID will correspond to the AWS profile used in the config file. An ID of 'default' (or the value of the 'default_profile' attribute if you have changed it) will be the default item in the file, while other IDs will be added as specific profiles.


Include awscreds in your node's run_list:

  "run_list": [

License & Authors

Author: Cookbook Engineering Team ( Copyright: 2009-2015, Chef Software, Inc. ``` Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. ```

Dependent cookbooks

chef-vault >= 0.0.0

Contingent cookbooks

There are no cookbooks that are contingent upon this one.

awscreds Cookbook CHANGELOG

This file is used to list changes made in each version of the awscreds cookbook.


Initial release.

Foodcritic Metric

0.1.0 failed this metric

FC003: Check whether you are running with chef server before using server-specific features: /tmp/cook/b8f6e9f485a2bd759297e53d/awscreds/recipes/default.rb:25