aws_assume_role 1.1.0-universal-linux → 1.1.1-universal-linux

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2f9683045ce2d3456a3ef25b40b0fb32763828726f38b209623ffccd67999b9c
4
- data.tar.gz: 5ee8ae90bb818f8a20984b73781321ec8288975f7908c8ffa81aee932723b449
3
+ metadata.gz: b4d760d911075070b709e42deb9c629b426a49aa6abee4aa28c9979f7e4d3bca
4
+ data.tar.gz: 3c3be9b959d24559262b9ec8c276006d8b53032756ccf9e7314681195ac3764e
5
5
  SHA512:
6
- metadata.gz: 8f38daa759c752f4267ecf154f13df614a4860d46e428e7f19cb2922bd5acaf23ed824e67d075762955c2b194a635cf6bf858f461a7d895c0151afc1f7441ee1
7
- data.tar.gz: db87f8aadfe7baf34e8af43f448dacfd8828191aab965634dbdb298e78d67bb6506100ba632418bd9773afbb60865cf4c68a630cc382fb08d48181f8f3e7f964
6
+ metadata.gz: 0706066010a8ced39b90f7d2e36ecae707ef01d19169f000a34b522a9a0b22434776a39eaaf39f4bd2ef06ddab618d4c233bd99947914e2315a21ab1b2322047
7
+ data.tar.gz: 1e300e1a6eb48cb1a17c6bf4a5a38d3570538eb3017c0e9c972ca771f12f8a088e6269a3156da86928c9b1a1eb5b1e53d1932bd696aafd8cf5b3e46b61e74b12
@@ -11,8 +11,6 @@ jobs:
11
11
  - stage: deploy
12
12
  rvm: 2.3
13
13
  script: bundle exec rake setup_credentials && chmod 0600 /home/travis/.gem/credentials && bundle exec rake publish
14
- secure: "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"
15
-
16
14
  stages:
17
15
  - name: test
18
16
  - name: deploy
@@ -1,3 +1,6 @@
1
+ ## 1.1.1
2
+ * Allow aws-assume-role to retrieve all Yubikey stored OATH tokens (@alanthing)
3
+
1
4
  ## 1.1.0
2
5
  * Publish separate gems for Linux, BSD and MacOS (@randomvariable)
3
6
 
data/Rakefile CHANGED
@@ -36,7 +36,7 @@ task :setup_credentials do
36
36
  File.write(File.expand_path("~/.gem/credentials"), CREDENTIALS.to_yaml)
37
37
  end
38
38
 
39
- task publish: [:build] do
39
+ task publish: %i[build build_generic] do
40
40
  Dir.glob("#{File.dirname(__FILE__)}/pkg/*.gem") do |g|
41
41
  sh "gem push #{g}"
42
42
  end
@@ -55,6 +55,12 @@ end
55
55
 
56
56
  task build: DISTRIBUTIONS.map { |d| "build_arch:#{d}" }
57
57
 
58
+ task :build_generic do
59
+ sh "cd #{File.dirname(__FILE__)} && GENERIC_GEM=true gem build aws_assume_role.gemspec"
60
+ FileUtils.mkdir_p(File.join(File.dirname(__FILE__), "pkg"))
61
+ sh "cd #{File.dirname(__FILE__)} && mv *.gem pkg/"
62
+ end
63
+
58
64
  task :no_pry do
59
65
  files = Dir.glob("**/**").reject { |x| x.match(/^spec|Gemfile|coverage|\.gemspec$|Rakefile/) || File.directory?(x) }
60
66
  files.each do |file|
@@ -25,7 +25,7 @@ Gem::Specification.new do |spec|
25
25
  spec.bindir = "bin"
26
26
  spec.executables = spec.files.grep(%r{^bin/aws}) { |f| File.basename(f) }
27
27
  spec.require_paths = ["lib"]
28
- spec.platform = PLATFORM
28
+ spec.platform = PLATFORM unless ENV.fetch("GENERIC_GEM", false)
29
29
  spec.add_runtime_dependency "activesupport", "~> 4.2"
30
30
  spec.add_runtime_dependency "aws-sdk", "~> 2.7"
31
31
  spec.add_runtime_dependency "dry-configurable", "~> 0.5"
@@ -67,8 +67,7 @@ class AwsAssumeRole::Credentials::Providers::MfaSessionCredentials < Dry::Struct
67
67
  raise "Yubikey not found" unless context.readers.length == 1
68
68
  reader_name = context.readers.first
69
69
  card = Smartcard::PCSC::Card.new(context, reader_name, :shared)
70
- codes = YubiOATH.new(card).calculate_all(timestamp: Time.now)
71
- codes.fetch(BinData::String.new(@yubikey_oath_name))
70
+ YubiOATH.new(card).calculate(name: @yubikey_oath_name, timestamp: Time.now)
72
71
  end
73
72
 
74
73
  def refresh_using_mfa
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module AwsAssumeRole
4
- VERSION = "1.1.0".freeze
4
+ VERSION = "1.1.1".freeze
5
5
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws_assume_role
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.0
4
+ version: 1.1.1
5
5
  platform: universal-linux
6
6
  authors:
7
7
  - Jon Topper
@@ -14,7 +14,7 @@ authors:
14
14
  autorequire:
15
15
  bindir: bin
16
16
  cert_chain: []
17
- date: 2018-01-04 00:00:00.000000000 Z
17
+ date: 2018-02-01 00:00:00.000000000 Z
18
18
  dependencies:
19
19
  - !ruby/object:Gem::Dependency
20
20
  name: activesupport
@@ -431,7 +431,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
431
431
  version: '0'
432
432
  requirements: []
433
433
  rubyforge_project:
434
- rubygems_version: 2.7.2
434
+ rubygems_version: 2.7.4
435
435
  signing_key:
436
436
  specification_version: 4
437
437
  summary: Manage AWS STS credentials with MFA