-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added the PureSec serverless least-privileged plugin, which auto-gene… #160
base: master
Are you sure you want to change the base?
Conversation
…rates least-privileged IAM roles for AWS Lambda functions based on static code analysis.
Codecov Report
@@ Coverage Diff @@
## master #160 +/- ##
=======================================
Coverage 96.59% 96.59%
=======================================
Files 3 3
Lines 88 88
=======================================
Hits 85 85
Misses 3 3 |
README.md
Outdated
* [Other Awesome Lists](#other-awesome-lists) | ||
* [Contact Info](#contact-info) | ||
* [License](#license) | ||
- [Awesome AWS ![Awesome](https://github.com/sindresorhus/awesome)](#awesome-aws-awesomehttpsgithubcomsindresorhusawesome) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The change on line 944 looks good. Can you remove these extraneous changes?
Update localstack repo to newer github location (donnemartin#157)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@oorryy I'm still seeing a ton of extraneous changes in this diff. There really should only be one lined changed.
…rates least-privileged IAM roles for AWS Lambda functions based on static code analysis.
Review the Contributing Guidelines
Before submitting a pull request, verify it meets all requirements in the Contributing Guidelines.
Describe Why This Is Awesome
The PureSec serverless least-privileged plugin automatically generates AWS IAM roles that are least-privileged based on static code analysis of the Lambda function. It is a huge time saver for AWS Lambda developers, and helps to make sure that functions do not have over-permissive privileges already during development.
--
Like this pull request? Vote for it by adding a 👍