aws-mfa-secure 0.3.7 → 0.3.8

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 66ffdf370150a2faa8dd385f187822633ba16bea532b359bc219443ec2b34ded
4
- data.tar.gz: 1a2f3e0d2632fbc3ddd650ee9dd04677ccea305fe30d1b8e99b85a301337e911
3
+ metadata.gz: a74bc9d5a43bc33742d4a006381a87d9a3bfeefa6b5825a3a19424bf3de2b8d1
4
+ data.tar.gz: 1cac46a95c378a8a6aaeebcc928326fd49e5bedc92de853905c0317d2b396db6
5
5
  SHA512:
6
- metadata.gz: 7ddd72b31ee4374e113c711333217dc07e385850ce641bf94d636689c788e1b93e73527d9c89194364846131f8d504ed3b4a88d9038963894e9c937a66bf2ad8
7
- data.tar.gz: 4cc98c88e78e3e43c54ee2458cc3d79eda0b18794adf644e727d6fa4de270b7c1b2874360b7ef6c481ce9689aa742bc0c10c593b0ea19d26c4554a22ed28f3cd
6
+ metadata.gz: 3ce4dd62a6e4083f584f10fdd21b6d2c6dd84e2f2043f01dabc85f976ab8d0b72cab1962c58c6e623a5e43b5f0174bda9f3047f6d63ae109c49962d050e5dbc9
7
+ data.tar.gz: 1d652274eb4480984e31b4fa4811118e99b79ec610977dde1af6616d4bf3845cc7b27611f8e325a4f5a163035f28651302ade19bfaf2febcf7e620f3392aff74
@@ -3,6 +3,9 @@
3
3
  All notable changes to this project will be documented in this file.
4
4
  This project *tries* to adhere to [Semantic Versioning](http://semver.org/), even before v1.0.
5
5
 
6
+ ## [0.3.8]
7
+ - fix edge case when aws profile not found
8
+
6
9
  ## [0.3.7]
7
10
  - check aws cli is fully setup
8
11
 
data/README.md CHANGED
@@ -4,6 +4,8 @@
4
4
 
5
5
  [![Gem Version](https://badge.fury.io/rb/aws-mfa-secure.png)](http://badge.fury.io/rb/aws-mfa-secure)
6
6
 
7
+ [![BoltOps Badge](https://img.boltops.com/boltops/badges/boltops-badge.png)](https://www.boltops.com)
8
+
7
9
  Surprisingly, the [aws cli](https://docs.aws.amazon.com/cli/latest/reference/) does not yet support MFA for normal IAM users. See: [boto/botocore/pull/1399](https://github.com/boto/botocore/pull/1399) The aws-mfa-secure tool decorates the AWS CLI or API to handle MFA authentication. The MFA prompt only activates if `mfa_serial` is configured.
8
10
 
9
11
  ## Installation
@@ -13,7 +15,7 @@ Surprisingly, the [aws cli](https://docs.aws.amazon.com/cli/latest/reference/) d
13
15
  Prerequisite: The [AWS CLI](https://docs.aws.amazon.com/cli/latest/reference/) is required. You can install the AWS CLI via pip.
14
16
 
15
17
  pip install awscli --upgrade --user
16
-
18
+
17
19
  ## Usage
18
20
 
19
21
  **Summary**:
@@ -132,7 +132,9 @@ module AwsMfaSecure
132
132
  memoize :sts
133
133
 
134
134
  def aws_config(prop)
135
- v = AWSConfig[aws_profile][prop.to_s]
135
+ profile_data = AWSConfig[aws_profile]
136
+ return unless profile_data
137
+ v = profile_data[prop.to_s]
136
138
  v unless v.blank?
137
139
  end
138
140
  memoize :aws_config
@@ -1,3 +1,3 @@
1
1
  module AwsMfaSecure
2
- VERSION = "0.3.7"
2
+ VERSION = "0.3.8"
3
3
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-mfa-secure
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.3.7
4
+ version: 0.3.8
5
5
  platform: ruby
6
6
  authors:
7
7
  - Tung Nguyen
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2019-11-14 00:00:00.000000000 Z
11
+ date: 2019-11-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: activesupport