Skip to content
#

iam

Here are 397 public repositories matching this topic...

ZoidBB
ZoidBB commented Dec 23, 2019

Currently if I "aws-vault foobar" and don't have a foobar profile in my aws config file, a profile section will be added and written to the file. However, if I then /remove/ the credentials, the profile section remains despite being empty. The expected behavior from me would be that if the profile were still empty (that is, never filled with extra data by the user), then it would be removed.

pomerium
travisgroth
travisgroth commented Aug 14, 2019

Is your feature request related to a problem? Please describe.

As observed during #261, users can accidentally set timeouts inconsistently. A concrete example is that one can set a User facing timeout lower than any backend timeout, such that requests may fail early.

Describe the solution you'd like

We should provide some sanity checking to prevent unintended timeout behavior.

johnmccabe
johnmccabe commented Jan 10, 2020

The flags used to configure the keepalive time and timeout imply the use of milliseconds rather than a duration.

  --grpc-keepalive-time-ms=10s   gRPC keepalive time
  --grpc-keepalive-timeout-ms=2s  
                                 gRPC keepalive timeout

Should probably have the -ms removed from the flag.

vdenotaris
vdenotaris commented Oct 2, 2019

Man-in-the-Middle
commons-httpclient:commons-httpclient is a HttpClient component of the Apache HttpComponents project.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). due to not verifing the requesting server's hostname agains existing domain names in the SSL Certificate. The AbstractVerifier does not properly verify that the server hostname matches a dom

ncc-erik-steringer
ncc-erik-steringer commented Aug 25, 2019

Gotta make sure this tool works across multiple operating systems and Python versions. The biggest concern is the graph file-storage, since that's OS-specific code and I could only test against Ubuntu 16.

Principal Mapper needs to be tested on the following operating systems and Python versions (but not all combinations of which):

Python

  • Python 3.6
  • Python 3.7

Operati

patrobinson
patrobinson commented Jan 14, 2019

#53 makes a change to completely ignore aws-service-roles. This raises an issue when you migrate to 2.3, it tries to create aws-service-roles as they are not "synced".

The fix I've implemented is to delete aws-service-role/* from our repo. I've documented this now in the releases page but we should do anything further?

cc @jacobbednarz

Note

You should remove all roles under `iam

Improve this page

Add a description, image, and links to the iam topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the iam topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.