saml2aws icon indicating copy to clipboard operation
saml2aws copied to clipboard

No such interface “org.freedesktop.DBus.Properties” on object at path /

Open paulo-silva opened this issue 4 years ago • 4 comments

While trying to use saml2aws configure in WSL2 I got this error:

error storing password in keychain: No such interface “org.freedesktop.DBus.Properties” on object at path /

paulo-silva avatar Sep 25 '20 14:09 paulo-silva

An issue was opened for this a few days before yours, you might consider following it instead: https://github.com/Versent/saml2aws/issues/561

GoFightNguyen avatar Sep 30 '20 21:09 GoFightNguyen

In the mean time use the --disable-keychain flag when using both the configure and login commands.

viltohmyst avatar Feb 03 '21 15:02 viltohmyst

In the mean time use the --disable-keychain flag when using both the configure and login commands.

it worked for me thanks !!

gajapathi28 avatar Jul 22 '21 11:07 gajapathi28

In my situation the root cause of the problem was with Vagrant. We can not use the SSH connection for the following command: aws-vault add <name>, launching a terminal locally and executing the command will solve the problem. You must open a terminal on the machine itself.

Resolution Steps: You have two possibilities to download the aws-vault. With brew and wget.

Recommended with brew: brew install aws-vault

Or with wget:

  • Download AWS Vault wget https://github.com/99designs/aws-vault/releases/download/v6.4.0/aws-vault-linux-amd64

  • Install AWS Vault

    mv aws-vault-linux-amd64 aws-vault
    chmod u+x aws-vault
    sudo mv aws-vault /usr/local/bin
    
  • Check AWS Vault version aws-vault --version

  • Download the pass and gnupg (used for encryption / decryption.) sudo apt-get update && sudo apt-get install -y pass gnupg

  • Generates the key used for encryption / decryption. gpg --gen-key

After generating the gpg key, you will get the output like in the example below:

pub   rsa3072 2022-01-29 [SC] [expires: 2024-01-29]
      FD905667DE12B1678DF234272EEF7*********
  • Initialize the pass: pass init "FD905667DE12B1678DF234272EEF7*********"

  • AWS Vault profile creation Create a profile with any name and register the IAM user access key. After successful finishing previous point, you can create your aws-vault connection:

    aws-vault add "<your_profile_name>"
    Enter Access Key ID: ***********
    Enter Secret Access Key: ***********
    Added credentials to profile "<your_profile_name>" in vault
    
  • Check the created profiles. aws-vault ls

  • You can use the AWS Vault profile you created to run AWS CLI commands. aws-vault exec <your_profile_name>

  • After creation the new terminal session, you can check the existing s3 buckets in your AWS: aws s3 ls

Boniker avatar Jan 29 '22 03:01 Boniker