profile
viewpoint
If you are wondering where the data of this site comes from, please visit https://api.github.com/users/supergibbs/events. GitMemory does not store any data, but only uses NGINX to cache data for a period of time. The idea behind GitMemory is simply to give users a better reading experience.

reactstrap/reactstrap 10116

Simple React Bootstrap 4 components

supergibbs/AutomaticSharp 6

A C# client for Automatic's API

supergibbs/bootstrap 1

Sleek, intuitive, and powerful front-end framework for faster and easier web development.

supergibbs/angular.js 0

HTML enhanced for web apps

supergibbs/aspnet-formsauthentication-js 0

A minimal JavaScript implementation of ASP.NET FormsAuthentication

supergibbs/AspNet.Security.OAuth.Providers 0

OAuth2 social authentication providers for ASP.NET Core

supergibbs/aws-cognito-dot-net-desktop-app 0

Sample .NET Desktop App with Cognito User Pools

supergibbs/copilot-cli 0

The AWS Copilot CLI is a tool for developers to build, release and operate production ready containerized applications on Amazon ECS and AWS Fargate.

push eventTechTangent/yalejewelers.com

Jesse Mandel

commit sha 1a2a347fbc5487c8267d7d27476dd55b412203e0

Setup prettier

view details

Jesse Mandel

commit sha 86689e1bde5ee4cde03f9b4189ea25af219b9dc3

Prettier

view details

Jesse Mandel

commit sha 3baf319bff05616647a5f692c754a75a047c6f08

Update github pages gem, url and set author

view details

push time in a month

push eventTechTangent/yalejewelers.com

Jesse Mandel

commit sha ac261de94f855361618096fcd87355aefdcb22bf

Disable summer vacation banner for 2021

view details

push time in 2 months

issue commentaws/aws-sdk-net

SSO credentials are not accepted as default

Otherwise the only workaround is to hand-patch the credentials file every time I run.

Alternative workaround is using yawsso, it'll help with the hand patching part at least.

ryan-motive

comment created time in 2 months

push eventTechTangent/yalejewelers.com

Jesse Mandel

commit sha 938b51a3fc5b51f92d0371098665c8914dacf038

Update GitHubPages gem

view details

Jesse Mandel

commit sha 70cd0cd61563850afcb915a2e8f4fce41616d080

Enable summer vacation banner for 2021

view details

push time in 2 months

MemberEvent

PR opened victorskl/yawsso

Add rename functionality to login subcommand

Part two of issue #50

+26 -5

0 comment

3 changed files

pr created time in 3 months

create barnchsupergibbs/yawsso

branch : issue_50_login

created branch time in 3 months

created tagsupergibbs/yawsso

tag0.7.0

Yet Another AWS SSO - sync up AWS CLI v2 SSO login session to legacy CLI v1 credentials

created time in 3 months

delete branch supergibbs/yawsso

delete branch : issue_50

delete time in 3 months

issue commentaws/aws-sdk-net

Reading credentials in recent SDK versions

FYI for those that are using yawsso. I added a feature to rename the profile on sync so you can have rolesso in your config sync'd to role in credentials file. It helps this scenario but will ideally still be fixed in a future SDK release. Thanks to @victorskl for the quick merge and release!

asherber

comment created time in 3 months

PR opened victorskl/yawsso

Implement profile rename functionality

Implements basic rename functionality for issue #50

Not a python developer so input is welcome! Still todo, add support for login command.

+36 -7

0 comment

2 changed files

pr created time in 3 months

create barnchsupergibbs/yawsso

branch : issue_50

created branch time in 3 months

fork supergibbs/yawsso

Yet Another AWS SSO - sync up AWS CLI v2 SSO login session to legacy CLI v1 credentials

fork in 3 months

issue closedhashicorp/terraform-provider-aws

Optional principals in aws_iam_policy_document

<!--- Please keep this note for the community --->

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

<!--- Thank you for keeping this note for the community --->

Description

<!--- Please leave a helpful description of the feature request here. ---> I have an assume role policy for ecs so I have the folllowing principals

principals {
  type        = "Service"
  identifiers = ["ecs-tasks.amazonaws.com"]
}

In my dev environment, I'd like to allow my developers to assume this role to test locally

principals {
  type        = "AWS"
  identifiers = [var.software_engineer_role_arns[var.aws_account_id]]
}

With the above I'd like to set the prod account value to null or "" so it doesn't apply but that doesn't work currently. Workaround would be two aws_iam_policy_documents and apply the correct one or create a dummy role no one uses and set it to that. Neither are very elegant. I'd be open to an enabled attribute too.

New or Affected Resource(s)

<!--- Please list the new or affected resources and data sources. --->

  • aws_iam_policy_document

Potential Terraform Configuration

<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->

Have terraform not include the principal if one of the following is detected.

principals {
  type        = "AWS"
  identifiers = [null]
}

principals {
  type        = "AWS"
  identifiers = [""]
}

principals {
  type        = "AWS"
  identifiers = [""]
  enabled = false
}

References

<!--- Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests

Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor blog posts or documentation? For example:

  • https://aws.amazon.com/about-aws/whats-new/2018/04/introducing-amazon-ec2-fleet/ --->

  • n/a

closed time in 3 months

supergibbs

issue commenthashicorp/terraform-provider-aws

Optional principals in aws_iam_policy_document

Ah thanks for that! Yes, that works great. For anyone interested, here is my working example:

variable "additional_principals" {
  type    = list(object({ type = string, identifiers = list(string) }))
  default = []
}

data "aws_iam_policy_document" "task_assume_role_ecs_tasks" {
  statement {
    actions = ["sts:AssumeRole"]

    dynamic "principals" {
      for_each = concat([{
        type        = "Service"
        identifiers = ["ecs-tasks.amazonaws.com"]
      }], var.additional_principals)

      content {
        type        = principals.value["type"]
        identifiers = principals.value["identifiers"]
      }
    }
  }
}
supergibbs

comment created time in 3 months

issue commentvictorskl/yawsso

Rename profile on sync

Ya, I included a snippet from the docs that seems to say colons aren't allowed in profile names. I think this would be better so the rest of the functionality would still work without change. A flag or subcommand would limit to one profile probably or be harder to use. Thanks!

supergibbs

comment created time in 3 months