-
Notifications
You must be signed in to change notification settings - Fork 176
🌱 Support for credential_process #203
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🌱 Support for credential_process #203
Conversation
- Add CredentialProcess entry-point - Move logging/console interaction to STDERR (allow 2>/dev/null) - Depends on oktadev#201 unless you only have one AWS role assigned in Okta Resolves oktadev#59
|
@mmahadevan-okta are you up for code-reviewing this? |
|
I would not be the right person to code review it. :( But perhaps @tom-smith-okta can help? Tom? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure, @mmahadevan-okta @AlainODea, where would the CredentialProcess get called from? Or can you tell me what you mean by "Add CredentialProcess entry-point"? How does it get invoked?
mmahadevan-okta
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
From my cursory overview, it LGTM. :)
|
CredentialProcess would be run from the command-line. I suppose it’s probably a good idea to create awscreds-okta bash script and Bat file or something similar to make this easier to consume. |
|
@AlainODea I'm sure your code is greta. The nice thing about the credential_process keyword is that it allows you to keep the "regular" aws commands and profile system in place. So I can set up my and then I can invoke this profile by using |
|
@tom-smith-okta you are right. The more people use this, the more I realize overriding the aws command was a bad idea. I’m going to remove that from the installer in an upcoming PR. |
|
|
|
@tom-smith-okta are you okay with me merging this and following up with the installer fix. Is there anything essential I should do before merging it? |
|
Absolutely OK with that
…________________________________
From: AlainODea <[email protected]>
Sent: Monday, September 24, 2018 7:16 AM
To: oktadeveloper/okta-aws-cli-assume-role
Cc: Tom Smith; Mention
Subject: Re: [oktadeveloper/okta-aws-cli-assume-role] 🌱 Support for credential_process (#203)
@tom-smith-okta<https://github.com/tom-smith-okta> are you okay with me merging this and following up with the installer fix. Is there anything essential I should do before merging it?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub<#203 (comment)>, or mute the thread<https://github.com/notifications/unsubscribe-auth/ATnFNgZtPv_ohpKW1L7rpPA259XqxI2Fks5ueM0kgaJpZM4WknVC>.
|
Problem Statement
Issue #59 states:
Solution
Add CredentialProcess entry-point
Move logging/console interaction to STDERR (allow 2>/dev/null)
Depends on 🐛 OKTA_AWS_ROLE_TO_ASSUME doesn't work #201 unless you only have one AWS role assigned in Okta
Resolves #59