<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Aws on Shawn Sorichetti</title>
    <link>/tags/aws/</link>
    <description>Recent content in Aws on Shawn Sorichetti</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>me@ssoriche.com (Shawn Sorichetti)</managingEditor>
    <webMaster>me@ssoriche.com (Shawn Sorichetti)</webMaster>
    <copyright>© 2026 Shawn Sorichetti</copyright>
    <lastBuildDate>Fri, 17 Apr 2026 19:22:14 -0400</lastBuildDate><atom:link href="/tags/aws/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>AWS S3 Files: S3 Buckets as NFS Filesystems</title>
      <link>/til/s3-files-s3-as-a-filesystem/</link>
      <pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate>
      <author>me@ssoriche.com (Shawn Sorichetti)</author>
      <guid>/til/s3-files-s3-as-a-filesystem/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve hit this problem twice now. At &lt;a href=&#34;https://metacpan.org&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;MetaCPAN&lt;/a&gt;, we were looking at using S3 as a sync target for rsync from upstream CPAN — conceptually simple, except rsync wants a filesystem and S3 very much isn&amp;rsquo;t one. More recently, I wanted to mount an S3 bucket as an image cache for &lt;a href=&#34;https://buildah.io&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Buildah&lt;/a&gt;. Same wall. You end up writing glue code, or reaching for a FUSE driver that may or may not be production-ready, or just redesigning around the limitation.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Logging Into Multiple AWS SSO Sessions at Once</title>
      <link>/til/aws-cli-multiple-sso-sessions/</link>
      <pubDate>Sun, 05 Apr 2026 00:00:00 +0000</pubDate>
      <author>me@ssoriche.com (Shawn Sorichetti)</author>
      <guid>/til/aws-cli-multiple-sso-sessions/</guid>
      <description>&lt;p&gt;I use &lt;a href=&#34;https://docs.commonfate.io/granted/overview&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Granted&lt;/a&gt; for per-terminal AWS credential assumptions — it&amp;rsquo;s great for switching between the multiple work accounts I juggle throughout the day. But I have SSO configured across more than one organization, and every morning I was logging into each one manually, one at a time, like a chump.&lt;/p&gt;&#xA;&lt;p&gt;Turns out &lt;code&gt;aws sso login&lt;/code&gt; has a &lt;code&gt;--sso-session&lt;/code&gt; flag that targets a named session block from &lt;code&gt;~/.aws/config&lt;/code&gt;. So logging into multiple orgs is just two commands:&lt;/p&gt;</description>
      
    </item>
    
  </channel>
</rss>
