Adoptable Cookbooks List

Looking for a cookbook to adopt? You can now see a list of cookbooks available for adoption!
List of Adoptable Cookbooks

Supermarket Belongs to the Community

Supermarket belongs to the community. While Chef has the responsibility to keep it running and be stewards of its functionality, what it does and how it works is driven by the community. The chef/supermarket repository will continue to be where development of the Supermarket application takes place. Come be part of shaping the direction of Supermarket by opening issues and pull requests or by joining us on the Chef Mailing List.

Select Badges

Select Supported Platforms

Select Status

The awscreds cookbook has been deprecated

Author provided reason for deprecation:

The awscreds cookbook has been deprecated and is no longer being maintained by its authors. Use of the awscreds cookbook is no longer recommended.


awscreds (4) Versions 0.1.0

Creates /root/.aws/config from chef-vault

cookbook 'awscreds', '= 0.1.0', :supermarket
cookbook 'awscreds', '= 0.1.0'
knife supermarket install awscreds
knife supermarket download awscreds
Quality 0%


Build Status
Cookbook Version

Loads credentials from chef vault and creates an aws config file (.ini
format) from the loaded credentials. Supports multiple profiles and
alternate locations for the credentials file.



  • Any platform supported by Chef


  • Chef 11+


  • none


  • node['awscreds']['filename'] - The name of the file to create that contains the credentials. Defaults to /root/.aws/config.
  • node['awscreds']['vault_name'] - The name of the data bag/vault that will contain the credentials. Defaults to 'awscreds'.
  • node['awscreds']['vault_search'] - A search query to execute that will grab the items from the vault. Defaults to '*:*' (i.e. grab every item in the vault). You can change this so only some of the credentials stored in the vault are put in the credentials file.
  • node['awscreds']['default_profile'] - The AWS credentials file contains a special profile called 'default' that is used by tools when no profile name is specified. This setting allows you to specify which profile (i.e. which vault item) becomes the default profile in the file. This defaults to a profile/vault item called 'default'.


Create a chef vault item with your credentials in:

knife vault create awscreds default -S 'role:some-role' -A 'admin1,admin2'

The content should look like the following:

  "id": "default",
  "aws_access_key_id": "AAAAAAAAAAAAAAAAAAAA",
  "aws_secret_access_key": "ABC123abc123ABC123abc123ABC123abc123ABC1"

The vault item ID will correspond to the AWS profile used in the config file.
An ID of 'default' (or the value of the 'default_profile' attribute if you
have changed it) will be the default item in the file, while other IDs will be
added as specific profiles.


Include awscreds in your node's run_list:

  "run_list": [

License & Authors

Author: Cookbook Engineering Team (
Copyright: 2009-2015, Chef Software, Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
See the License for the specific language governing permissions and
limitations under the License.

Dependent cookbooks

chef-vault >= 0.0.0

Contingent cookbooks

There are no cookbooks that are contingent upon this one.

awscreds Cookbook CHANGELOG

This file is used to list changes made in each version of the awscreds cookbook.


Initial release.

Foodcritic Metric

0.1.0 failed this metric

FC003: Check whether you are running with chef server before using server-specific features: /tmp/cook/b8f6e9f485a2bd759297e53d/awscreds/recipes/default.rb:25