-
Notifications
You must be signed in to change notification settings - Fork 188
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix sts credentials reusage #222
Conversation
At first glance this looks good to me. I'm swamped today, but should be able to look deeper at this tonight or tomorrow, and I can make the test additions/fixes for it. Have you used this code yourself, and can you confirm that it's working and fixes the issue? |
I tested it today and it works fine with pure STS/AssumeRole but without MFA token. I'm just not sure if it does not interfere with MFA related code. |
@dsumsky sorry for the delay on this. I should be able to fix the tests, but this needs to be rebased on develop. If it's OK with you, I'll pull this PR into a branch of mine, rebase it, fix the tests, and open a new PR from that. You'll still be tracked as the contributor as far as the commits are concerned... |
Oh wow... there's now an "Update branch" button where, apparently, I can merge the target branch into your branch... |
it's definitely ok, do what you need to do. Dne 10. 11. 2016 10:50 odpoledne napsal uživatel "Jason Antman" <
|
Current coverage is 99.93% (diff: 100%)@@ develop #222 diff @@
==========================================
Files 22 22
Lines 1660 1650 -10
Methods 0 0
Messages 0 0
Branches 257 253 -4
==========================================
- Hits 1659 1649 -10
Misses 0 0
Partials 1 1
|
I'm closing this in favor of #225 which has my fixes in it. Thanks so much for this!!!! |
This has been released in 0.6.0 and is now live on PyPI |
STS credentials for one AWS account seem to be reused when connecting to another AWS account before they expire. The issue is reported as #221.
I want to write a function to check limits/thresholds in multiple AWS accounts at once. The code below returns number of S3 buckets in ACCOUNT01 account correctly but it is incorrect for ACCOUNT02 account as the STS credentials from ACCOUNT01 account are reused.
Testing code to reproduce the issue:
Contributor License Agreement
By submitting this work for inclusion in awslimitchecker, I agree to the following terms:
is being made under the same license as the awslimitchecker project (the Affero GPL v3,
or any subsequent version of that license if adopted by awslimitchecker).
this pull request grants a perpetual, global, unlimited license for it to be used and distributed
under the terms of awslimitchecker's license.