{"id":41556491,"url":"https://github.com/runtheops/ssm-diff","last_synced_at":"2026-01-24T05:12:56.128Z","repository":{"id":56431393,"uuid":"102864452","full_name":"runtheops/ssm-diff","owner":"runtheops","description":"A human-friendly way of managing parameters in AWS SSM","archived":false,"fork":false,"pushed_at":"2024-08-16T13:04:24.000Z","size":17,"stargazers_count":47,"open_issues_count":21,"forks_count":24,"subscribers_count":3,"default_branch":"master","last_synced_at":"2025-10-01T14:55:16.937Z","etag":null,"topics":["aws","aws-ssm","parameter-store","ssm"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/runtheops.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE.md","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2017-09-08T13:29:53.000Z","updated_at":"2025-09-30T20:36:58.000Z","dependencies_parsed_at":"2022-08-15T18:31:36.473Z","dependency_job_id":null,"html_url":"https://github.com/runtheops/ssm-diff","commit_stats":null,"previous_names":[],"tags_count":5,"template":false,"template_full_name":null,"purl":"pkg:github/runtheops/ssm-diff","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/runtheops%2Fssm-diff","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/runtheops%2Fssm-diff/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/runtheops%2Fssm-diff/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/runtheops%2Fssm-diff/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/runtheops","download_url":"https://codeload.github.com/runtheops/ssm-diff/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/runtheops%2Fssm-diff/sbom","scorecard":{"id":789939,"data":{"date":"2025-08-11","repo":{"name":"github.com/runtheops/ssm-diff","commit":"4cfb11fafbdbd2ae5112054c080a0374ab78e924"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":3,"checks":[{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Dangerous-Workflow","score":-1,"reason":"no workflows found","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Token-Permissions","score":-1,"reason":"No tokens found","details":null,"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Pinned-Dependencies","score":-1,"reason":"no dependencies found","details":null,"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Code-Review","score":2,"reason":"Found 6/22 approved changesets -- score normalized to 2","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE.md:0","Info: FSF or OSI recognized license: MIT License: LICENSE.md:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Vulnerabilities","score":8,"reason":"2 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: PYSEC-2021-142 / GHSA-8q59-q68h-6hv4","Warn: Project is vulnerable to: PYSEC-2018-49 / GHSA-rprw-h62v-c2w7"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}},{"name":"Branch-Protection","score":0,"reason":"branch protection not enabled on development/release branches","details":["Warn: branch protection not enabled for branch 'master'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 7 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}}]},"last_synced_at":"2025-08-23T07:13:34.858Z","repository_id":56431393,"created_at":"2025-08-23T07:13:34.859Z","updated_at":"2025-08-23T07:13:34.859Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28712841,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-24T05:01:10.984Z","status":"ssl_error","status_checked_at":"2026-01-24T04:59:18.328Z","response_time":89,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["aws","aws-ssm","parameter-store","ssm"],"created_at":"2026-01-24T05:12:51.945Z","updated_at":"2026-01-24T05:12:56.111Z","avatar_url":"https://github.com/runtheops.png","language":"Python","readme":"# ssm-diff\n\nAWS [SSM Parameter Store](https://aws.amazon.com/ec2/systems-manager/parameter-store) is a really convenient, AWS-native, KMS-enabled storage for parameters and secrets. \n\nUnfortunately, as of now, it doesn't seem to provide any human-friendly ways of batch-managing [hierarchies of parameters](http://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-paramstore-working.html#sysman-paramstore-su-organize).\n\nThe goal of the `ssm-diff` tool is to simplify that process by unwraping path-style\n(/Dev/DBServer/MySQL/db-string13 = value) parameters into a YAML structure:\n```\nDev:\n  DBServer:\n    MySQL:\n      db-string13: value\n```\n\nThen, given that this local YAML representation of the SSM Parameter Store state was edited, `calculating and applying diffs` on the parameters. \n\n`ssm-diff` supports complex data types as values and can operate within single or multiple prefixes.\n\n## Installation\n```\npip install ssm-diff\n```\n\n## Geting Started\nThe tool relies on native AWS SDK, thus, on a way SDK [figures out](http://boto3.readthedocs.io/en/latest/guide/configuration.html) an effective AWS configuration. You might want to configure it explicitly, setting `AWS_DEFAULT_REGION`, or `AWS_PROFILE`, before doing and manipulations on parameters\n\nWhen `AWS_PROFILE` environment variable is set, local state file will have a name corresponding to the profile name.\n\nBefore we start editing the local representation of parameters state, we have to get it from SMM:\n```\n$ ssm-diff init\n```\n\nwill create a local `parameters.yml` (or `\u003cAWS_PROFILE\u003e.yml` if `AWS_PROFILE` is in use) file that stores a YAML representation of the SSM Parameter Store state.\n\nOnce you accomplish editing this file, adding, modifying or deleting parameters, run:\n```\n$ ssm-diff plan\n```\n\nWhich will show you the diff between this local representation and an SSM Parameter Store.\n\nFinally\n```\n$ ssm-diff apply\n```\nwill actually apply local changes to the Parameter Store.\n\nOperations can also be limited to a particular prefix(es):\n\n```\n$ ssm-diff -p /dev -p /qa/ci {init,plan,apply}\n```\n\nNOTE: when remote state diverges for some reason, but you still want to preserve remote changes, there's a:\n\n```\n$ ssm-diff pull\n```\ncommand, doing just that.\n\n## Examples\nLet's assume we have the following parameters set in SSM Parameter Store:\n```\n/qa/ci/api/db_schema    = foo_ci\n/qa/ci/api/db_user      = bar_ci\n/qa/ci/api/db_password  = baz_ci\n/qa/uat/api/db_schema   = foo_uat\n/qa/uat/api/db_user     = bar_uat\n/qa/uat/api/db_password = baz_uat\n\n```\n\n```\n$ ssm-diff init\n```\nwill create a `parameters.yml` file with the following content:\n\n```\nqa:\n  ci:\n    api:\n      db_schema: foo_ci\n      db_user: bar_ci\n      db_password: !secure 'baz_ci'\n  uat:\n    api:\n      db_schema: foo_uat\n      db_user: bar_uat\n      db_password: !secure 'baz_uat'\n```\n\nKMS-encrypted (SecureString) and String type values are distunguished by `!secure` YAML tag.\n\nLet's drop the `ci`-related stuff completely, and edit `uat` parameters a bit, ending up with the following `parameters.yml` file contents:\n```\nqa:\n  uat:\n    api:\n      db_schema: foo_uat\n      db_charset: utf8mb4 \n      db_user: bar_changed\n      db_password: !secure 'baz_changed'\n```\n\nRunning\n```\n$ ssm-diff plan\n```\nwill give the following output:\n\n```\n- /qa/ci/api/db_schema\n- /qa/ci/api/db_user\n- /qa/ci/api/db_password\n+ /qa/uat/api/db_charset = utf8mb4\n~ /qa/uat/api/db_user:\n  \u003c bar_uat\n  ---\n  \u003e bar_changed\n~ /qa/uat/api/db_password:\n  \u003c baz_uat\n  ---\n  \u003e baz_changed\n\n```\n\nFinally\n```\n$ ssm-diff apply\n```\nwill actually do all the necessary modifications of parameters in SSM Parameter Store itself, applying local changes\n\n## Known issues and limitations\n- There's currently no option to use different KMS keys for `SecureString` values encryption.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fruntheops%2Fssm-diff","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fruntheops%2Fssm-diff","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fruntheops%2Fssm-diff/lists"}