Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixes #189 add support for cyberark identity authentication #202

Merged

Conversation

infamousjoeg
Copy link
Owner

Fixes #189

infamousjoeg and others added 8 commits May 31, 2023 17:04
* Update action versions & add Conjur fetching (#195)

* Update action versions & add Conjur fetching

* flip Go install to after source checkout

* update go-version

* go-version to version

* version set to latest

* add debug step

* switch from authn-jwt to authn due to iat issues

* Update README.md
@infamousjoeg infamousjoeg added the enhancement New feature or request label Aug 11, 2023
@infamousjoeg infamousjoeg self-assigned this Aug 11, 2023
@infamousjoeg infamousjoeg linked an issue Aug 11, 2023 that may be closed by this pull request
@sonarcloud
Copy link

sonarcloud bot commented Aug 14, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication

@infamousjoeg infamousjoeg merged commit 274d603 into v1.0.0-release Aug 14, 2023
7 checks passed
@infamousjoeg infamousjoeg deleted the 189-add-support-for-cyberark-identity-authentication branch August 14, 2023 17:48
infamousjoeg added a commit that referenced this pull request Aug 23, 2023
* Add aws-cli based role assumption for authn-iam (#190)

* Typo in doc cybr_accounts_add (#192)

* Typo in doc cybr_accounts_add

Secret parameter should be -c, not -s

* Update account.go

* Bump golang.org/x/sys from 0.0.0-20220405052023-b1e9470b6e64 to 0.1.0 (#191)

Bumps [golang.org/x/sys](https://github.com/golang/sys) from 0.0.0-20220405052023-b1e9470b6e64 to 0.1.0.
- [Release notes](https://github.com/golang/sys/releases)
- [Commits](https://github.com/golang/sys/commits/v0.1.0)

---
updated-dependencies:
- dependency-name: golang.org/x/sys
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <[email protected]>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* [Snyk] Security upgrade ubuntu from latest to 22.10 (#194)

* fix: Dockerfile to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-UBUNTU2204-OPENSSL-3314672
- https://snyk.io/vuln/SNYK-UBUNTU2204-OPENSSL-3314696
- https://snyk.io/vuln/SNYK-UBUNTU2204-OPENSSL-3314792
- https://snyk.io/vuln/SNYK-UBUNTU2204-SYSTEMD-3098846
- https://snyk.io/vuln/SNYK-UBUNTU2204-TAR-3261138

* Set non-root `cybr` user as default

---------

Co-authored-by: snyk-bot <[email protected]>

* Update action versions & add Conjur fetching (#195) (#196)

* Update action versions & add Conjur fetching

* flip Go install to after source checkout

* update go-version

* go-version to version

* version set to latest

* add debug step

* switch from authn-jwt to authn due to iat issues

* Add unlock & checkin to cybr accounts (#199)

* [Snyk] Security upgrade ubuntu from latest to kinetic (#197)

* Update action versions & add Conjur fetching (#195)

* Update action versions & add Conjur fetching

* flip Go install to after source checkout

* update go-version

* go-version to version

* version set to latest

* add debug step

* switch from authn-jwt to authn due to iat issues

* fix: Dockerfile to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-UBUNTU2204-BASH-3098342
- https://snyk.io/vuln/SNYK-UBUNTU2204-OPENSSL-5296052
- https://snyk.io/vuln/SNYK-UBUNTU2204-OPENSSL-5296082
- https://snyk.io/vuln/SNYK-UBUNTU2204-SHADOW-5425688
- https://snyk.io/vuln/SNYK-UBUNTU2204-SHADOW-5425688

---------

Co-authored-by: snyk-bot <[email protected]>

* Fixes #189 add support for cyberark identity authentication (#202)

* Initial commit

* Implement Identity check for httpjson

* Update GitHub Workflows for successful tests (#200)

* Update action versions & add Conjur fetching (#195)

* Update action versions & add Conjur fetching

* flip Go install to after source checkout

* update go-version

* go-version to version

* version set to latest

* add debug step

* switch from authn-jwt to authn due to iat issues

* Update README.md

* Identity StartAuthentication implemented

* refactored StartAuth

* Began implementation of Password AdvanceAuth

* Identity auth-type tested successfully

* Added color to terminal

* Update /docs

* Updated README

* Use platform discovery instead of requiring TenantID

* Derive PCloud URL from Platform Discovery

* Derive PCloud URL from Platform Discovery

* Updated docs to remove tenant ID requirement

* Fix 7 code smells

* remove duplicate tests on v* branch

* Only test on push

* Fix go test failures

* Generate new docs

* Bump version to 1.0.0-release

* add ReadInput function (#204)

* Added SignOutSession function (#205)

* Update Makefile

* Add Polling of OOBPending (#206)

* channel oob polling & otp input

* Have otp code on same line

* rm bin and add to .gitignore

* Add .gitignore

* Add version to binary release

* Fixes #207 Add remaining scopes to cybr accounts change (#208)

* Add remaining scopes to cybr accounts change

* Remove VaultOnly tests & fix code smell

* fixed account credentials unit tests

* final unit tests fix

---------

Signed-off-by: dependabot[bot] <[email protected]>
Co-authored-by: Matias Siracusa <[email protected]>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: snyk-bot <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add support for CyberArk Identity authentication
1 participant