Nacho Rivera
|
78505cb0a8
|
chore(sqs_...not_publicly_accessible): less restrictive condition test (#3211)
Co-authored-by: Pepe Fagoaga <pepe@verica.io>
|
2023-12-19 16:53:19 +01:00 |
|
John Mastron
|
ec01b62a82
|
fix(aws): check all conditions in IAM policy parser (#3006)
Co-authored-by: John Mastron <jmastron@jpl.nasa.gov>
Co-authored-by: Sergio Garcia <sergargar1@gmail.com>
|
2023-11-07 10:40:34 +01:00 |
|
Nacho Rivera
|
2891bc0b96
|
fix(policy_condition_parser): add StringEquals aws:SourceArn condition (#2793)
|
2023-08-31 11:54:48 +02:00 |
|
christiandavilakoobin
|
9f2e87e9fb
|
fix(is_account_only_allowed_in_condition): Context name on conditions are case-insensitive (#2726)
|
2023-08-16 08:27:24 +02:00 |
|
christiandavilakoobin
|
ade511df28
|
fix(sns): allow default SNS policy with SourceOwner (#2698)
Co-authored-by: Azure Pipeplines CI <monitor@koobin.com>
Co-authored-by: Sergio Garcia <sergargar1@gmail.com>
Co-authored-by: Pepe Fagoaga <pepe@verica.io>
|
2023-08-10 12:13:57 +02:00 |
|
Sergio Garcia
|
36e095c830
|
fix(iam_role_cross_service_confused_deputy_prevention): add ResourceAccount and PrincipalAccount conditions (#2689)
|
2023-08-09 10:41:48 +02:00 |
|
Pepe Fagoaga
|
5bf3f70717
|
fix(vpc_endpoint_connections_trust_boundaries): Handle AWS Account ID as Principal (#2611)
|
2023-08-03 09:16:58 +02:00 |
|
Nacho Rivera
|
d1c91093e2
|
feat(cond parser): add policy cond parser & apply in sqs public check (#2575)
|
2023-07-12 15:39:01 +02:00 |
|