Toan Nguyen
85acf54d01
update predefined resources test
2017-09-09 12:56:42 +07:00
Toan Nguyen
be96454fab
update share api gateway resource
2017-09-02 18:39:06 +07:00
davidwells
d4364b7c46
update link
2017-08-25 15:20:08 -07:00
mpuittinen
4e96ea77c4
Fix #3979 . CLI option aws-profile overrides AWS_PROFILE env var
2017-07-24 10:30:30 +03:00
Eslam λ Hefnawy
40d529ced5
Revert "Improves invalid security token message per issue #3862 "
2017-07-12 17:49:37 +07:00
Philipp Muens
4ed4a8e9bb
Update to match two security token related cases
2017-07-07 16:40:17 +02:00
Ralph Dugue
c15ec99d9c
Fixed some issues per recommendations and added test
2017-07-07 07:13:14 -04:00
Ralph Dugue
cb6e81a114
fixed some issues based on recommendations
2017-07-06 22:45:48 -04:00
Ralph Dugue
c7f44b64f3
minor changes to adhere to style guideline
2017-07-05 15:50:48 -04:00
Ralph Dugue
0874f77d0b
making a minor fix
...
Carelessly forgot to space out the message correctly
2017-07-05 15:23:00 -04:00
Ralph Dugue
4d424b9d25
Improves invalid security token message per issue #3862
2017-07-05 14:47:29 -04:00
Philipp Muens
0e580bfd26
Update formatting of error message
2017-06-28 09:29:35 +02:00
davidwells
57b1421ecc
userStats noProviderCredsFound
2017-06-26 17:05:25 -07:00
davidwells
041b0356e9
add remove service placeholder function
2017-06-26 17:03:36 -07:00
Philipp Muens
526d3a6da4
Refactor code to support deploymentBucket object representation globally
2017-06-16 11:50:51 +01:00
Philipp Muens
b87326d5dd
Minor refactorings
2017-06-16 09:19:41 +01:00
Max Redmond
da0736fd6b
added signatureVersion: 'v4' parameter to s3 object if tyring to use aws:kms sse
2017-06-16 08:12:23 +01:00
Philipp Muens
8ca5f214f8
Add aws-profile option support
2017-05-29 13:50:03 +02:00
Vlad Golubev
12ba45421c
Merge branch 'master' into fix-average-functions-duration
2017-02-07 23:42:25 +02:00
Erik Erikson
5bd31687b5
Use STS getCallerIdentity instead of IAM getUser
...
A possible fix for https://github.com/serverless/serverless/issues/3151
Switch from using IAM `getUser` to get the account ID of the current user to calling STS `getCallerIdentity`. It is expected that this is a less protected segment of rights and will, as a result, impact fewer users. Of course, this is hard to guarantee.
Changes tests appropriately
Related Docs:
http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/STS.html#getCallerIdentity-property
2017-01-26 18:14:15 -08:00
Eslam λ Hefnawy
a19fbfbbb3
Merge pull request #3125 from serverless/refactor-function-arn-for-info-plugin
...
BREAKING - Refactor function arn generation for info plugin
2017-01-23 21:11:59 +07:00
Philipp Muens
a3ce3edb72
Remove getStackName() method
2017-01-23 10:51:06 +01:00
Philipp Muens
116c79dbf8
Refactor function arn generation for info plugin
2017-01-20 14:45:11 +01:00
Vlad Golubev
7d7f7c7054
Refactor getting aws provider stage
2017-01-06 20:53:08 +02:00
Vlad Golubev
0fb4cf6fba
Refactor getting aws provider region
2017-01-06 20:53:08 +02:00
Erik Erikson
3210aff617
Detect Successful Async Credential Loading
...
Check for the roleArn attribute on ini file loaded credentials. If that exists, then asynchronous (assume role) credentials are being loaded but they may not yet be received. Accept these as valid credentials and use the containing credentials object as the current credentials object.
Clean up the test data (fakeCredentials didn't need so much)
Create a test that verifies the async credential loading functionality
Create a test that ensures a non-existent profile one attempts to load does not load any credentials
Bump the version of the aws-sdk so that the modified aws-sdk will be demanded for proper handling of this feature.
2016-12-01 01:45:14 -08:00
Erik Erikson
0ddd4ec804
Credential Fixes Roundup
...
Merge fixes from both #2373 & #2695 , adding editorial suggestions and future-proofing them a bit (probably)
Clean up tests to broadly clean and restore process/test environment and simplify test code.
This work uncovered that we were returning profiles when no profile credentials were loaded. This seems inappropriate. The tests were modified to use the temporary credential file code that @stevecaldwell77 wrote, exclusively. This way there are actual credentials to load from the given profile.
I am not sure how to test the assume-role/asynchronous STS credential loading capability and would love some help making sure that is right
2016-11-29 03:16:47 -08:00
Erik Erikson
e317399da4
Merge remote-tracking branch 'journeyapps/fix-async-credentials' into credentials-fixes
2016-11-28 23:06:03 -08:00
Stephen Caldwell
4969c74a17
add support for environment variable AWS_SHARED_CREDENTIALS_FILE when loading credentials
2016-11-28 09:58:29 -08:00
Erik Erikson
6cc5d1364a
Merge branch 'master' into logical-ids-missed-details
2016-11-22 13:26:28 -08:00
Eslam A. Hefnawy
0519987cb8
moved getStackName method into provider class
2016-11-21 17:48:39 +07:00
Eslam A. Hefnawy
632e86ec2e
fix typo
2016-11-21 16:42:38 +07:00
Eslam A. Hefnawy
4087921e0e
bring back probider.getStackName()
2016-11-21 16:33:52 +07:00
Erik Erikson
61783191ee
"sdk" => "provider"
...
Change the legacy "sdk" moniker to "provider" in line with the (good, clarifying) class name changes in order to reduce potential future confusion.
2016-11-16 17:14:48 -08:00
Ralf Kistner
a78ed09773
Use AWS.SharedIniFileCredentials directly for profile credentials.
2016-11-11 11:20:25 -08:00
Eslam A. Hefnawy
fef9b68e5a
refactored naming-js method naming
2016-11-10 19:05:02 +07:00
Eslam A. Hefnawy
1a02e15d9b
updated tests using name-js
2016-11-10 15:14:33 +07:00
Eslam A. Hefnawy
61efd35850
added logical id names in naming-js file
2016-11-09 19:31:08 +07:00
Phillip J. Roth
a669b46a37
Updates git.io URL to aws credential setup
2016-11-02 09:46:22 -04:00
Philipp Muens
300e21be9d
DRY out setProvider() usage
2016-10-31 09:55:06 +01:00
Eslam A. Hefnawy
6beb3a802c
update unit tests for overwrite bug fix
2016-10-19 16:50:41 +07:00
Eslam A. Hefnawy
402cc2c376
fixed overwrite resources bug
2016-10-19 16:50:41 +07:00
Nik Graf
360bfb814a
Merge branch 'master' into ellipsis
2016-10-19 10:35:34 +02:00
Philipp Muens
c273abec68
Move AwsProvider plugin into aws directory
2016-10-19 08:32:06 +02:00