You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: add validator to the final config struct (#27)
* fix: add validator to the final config struct
* fix: De Morgans law fix in lint
* fix: add more tests to sso edge case
* fix: add some logging
* fix: remove comment
REVERT: when needed we can bring back struct for credentialexchange
* fix: layout of tests in cmdutils
* fix: update sonar org
* fix: CI workflow tasks
* fix: semver
* fix: see token
* fix: unit test and coverage
* fix: add sonar prep
* fix: correct context
* fix: update task for sonarscanner
* fix: debug token
* fix: clean up
* fix: sonar prep
* fix: yaml lint
# Disabling shallow clones is recommended for improving the relevancy of reporting
47
+
fetch-depth: 0
45
48
46
49
- uses: ensono/actions/eirctl-setup@v0.3.1
47
-
with:
50
+
with:
48
51
version: latest
49
52
isPrerelease: false
50
53
@@ -60,23 +63,27 @@ jobs:
60
63
61
64
- name: Unit Tests
62
65
run: |
63
-
eirctl run unit:test:run
66
+
eirctl run pipeline gha:unit:test
64
67
65
68
- name: Publish Test Report
66
-
uses: mikepenz/action-junit-report@v5
69
+
uses: mikepenz/action-junit-report@v6
67
70
if: success() || failure()
68
71
with:
69
-
report_paths: '.coverage/report-junit.xml'
72
+
report_paths: ".coverage/report-junit.xml"
70
73
commit: ${{ github.sha }}
71
74
fail_on_failure: true
72
75
check_name: aws-cli-auth Unit Tests
73
76
74
77
- name: Analyze with SonarCloud
75
-
uses: SonarSource/sonarqube-scan-action@v5
78
+
uses: SonarSource/sonarqube-scan-action@v6
76
79
env:
80
+
# Needed to get PR information
77
81
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
82
+
# Generate a token on Sonarcloud.io, add it to the secrets of this repo with the name SONAR_TOKEN (Settings > Secrets > Actions > add new repository secret)
@@ -57,8 +61,8 @@ Stores them under the $HOME/.aws/credentials file under a specified path or retu
57
61
r.Cmd.PersistentFlags().StringVarP(&rf.CfgSectionName, "cfg-section", "", "", "Config section name to use in the look up of the config ini file (~/.aws-cli-auth.ini) and in the AWS credentials file")
58
62
// When specifying store in profile the config section name must be provided
r.Cmd.PersistentFlags().IntVarP(&rf.Duration, "max-duration", "d", 900, `Override default max session duration, in seconds, of the role session [900-43200].
61
-
NB: This cannot be higher than the 3600 as the API does not allow for AssumeRole for sessions longer than an hour`)
64
+
r.Cmd.PersistentFlags().IntVarP(&rf.Duration, "max-duration", "d", 900, fmt.Sprintf("Override default max session duration, in seconds, of the role session [900-43200].\nNB: This cannot be higher than the 3600 as the API does not allow for AssumeRole for sessions longer than an hour\nMore info on this and especially around role-chaining\nSee %s",
sc.cmd.PersistentFlags().Int32VarP(&flags.SamlTimeout, "saml-timeout", "", 120, "Timeout in seconds, before the operation of waiting for a response is cancelled via the chrome driver")
183
+
sc.cmd.PersistentFlags().Int32VarP(&flags.SamlTimeout, "saml-timeout", "", 120, "Timeout in seconds, before the operation of waiting for a response is cancelled via CDP (ChromeDeubgProto)")
v.RequiredString(config.ProviderUrl, "provider-url", "provider url must be specified").
248
+
// RequiredString(config.BaseConfig.Role, "role", "role must be provided").
249
+
RequiredString(config.PrincipalArn, "principal-arn", "principal ARN must be provided").
250
+
CustomRule(ssoVal, "is-sso", "sso-role must be specified when is-sso is set").
251
+
CustomRule((len(config.BaseConfig.Role) >1&&len(config.SsoRole) <1) || (len(config.BaseConfig.Role) <1&&len(config.SsoRole) >1), "role", "sso-role cannot be specified when role is also set")
0 commit comments