Onelogin-aws-assume-role

Latest version: v1.10.1

Safety actively analyzes 688746 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 4

1.6.1

Remove debugger

1.6.0

- Add a yaml file where aliases can be provided for the aws account ids
- Relax dependencies.
- Fix typos and refactor.
- Make the script compatible with p2 and p3.
- Set 900 as min value for duration
- Add a new config file onelogin.aws.json where aws and onelogin account param can be provided
- An alternative to Writer import issue
- Use store_true in the parser instead custom method to parse boolean param

1.5.1

- Fix writer

1.5.0

* Re-package the script. Now onelogin-aws-assume-role command is available.

1.4.5

- Add password CLI option
- Add --aws-account-id and --aws-role-name parameters.
- Fix bug detected on the Protect MFA use. When PUSH Manual is used, get_saml_assertion_verifying must contain do_not_notify=True
- Include 'aws_session_expiration' and 'aws_security_token' as part of AWS cred.

1.4.4

* Fix bug when retrieving region

Page 2 of 4

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.