Releases: common-fate/granted
v0.1.17
v0.1.16
What's Changed
- Adds --env flag to export credentials by @JoshuaWilkes in #157
- Load default profile from ~/.aws/config by @chrnorm in #159
Full Changelog: v0.1.15...v0.1.16
v0.1.15
v0.1.14
What's Changed
- Support profiles with (some) special characters by @badideasforsale in #131
- Fix console session expires in 15 minutes + add session duration flag by @meyerjrr in #130
- split assume process for credential_process by @JoshuaWilkes in #134
- update PGP public key to include release signing subkey by @chrnorm in #136
- Use a policy on get federation token API by @JoshuaWilkes in #142
- added settings option for ordering of profiles by @meyerjrr in #143
- Adjust session duration implementation by @JoshuaWilkes in #135
- Truncate usernames getfederationtoken by @meyerjrr in #145
New Contributors
- @badideasforsale made their first contribution in #131
Full Changelog: v0.1.13...v0.1.14
v0.1.13
What's Changed
- Add AWS_SESSION_EXPIRATION, fix windows scripts by @JoshuaWilkes in #124
- Refactor and simplify cred process assumer by @JoshuaWilkes in #127
- Add support for --exec flag in linux and mac by @JoshuaWilkes in #125
Full Changelog: v0.1.12...v0.1.13
v0.1.12
What's Changed
- Adds correct MFA prompt and enforces serial if available by @JoshuaWilkes in #123
Full Changelog: v0.1.11...v0.1.12
v0.1.11
What's Changed
- Configurable Keyring by @chrnorm in #112
- Resolve issues loading profiles and fix GetFederationToken by @JoshuaWilkes in #118
- Fix MFA for IAM profiles and role chaining for SSO @JoshuaWilkes in #119
Full Changelog: v0.1.10...v0.1.11
v0.1.10
What's Changed
- grab credentials from credential file by @meyerjrr in #112
- Fail silently when opening default browser for SSO login by @JoshuaWilkes in #113
Full Changelog: v0.1.9...v0.1.10
v0.1.8
What's Changed
- Fix comment typo by @QuinnyPig in #80
- Fallback url link if browser opening fails by @meyerjrr in #82
- command to unset environment variables by @meyerjrr in #83
- Fix Azure SSO login - Add Passthrough args by @meyerjrr in #91
- Bug fix for global flags by @JoshuaWilkes in #95
- Implement support for Windows by @JoshuaWilkes in #100
- build cleanup commands for tokens and config by @meyerjrr in #98
- rename GitHub actions tests by @chrnorm in #101
- Optimise test pipeline by @JoshuaWilkes in #102
- problems with assuming roles by @meyerjrr in #97
New Contributors
- @QuinnyPig made their first contribution in #80
Full Changelog: v0.1.7...v0.1.8
Download this release by following our getting started guide.
This new release of Granted includes a number of high priority fixes and improvements.
Additions and Features:
-
We heard from many in the community that Windows functionality was a high priority, so we are happy to announce that we have added Granted support for Windows Command Prompt and Powershell.
- By default, terminal colours are disabled in Command Prompt, to get full coloured output in Command Prompt run this before running granted commands
set NO_COLOR=
- Thanks to our community members DavidSandoval, ShaykiAbramczyk for highlighting the issue.
- By default, terminal colours are disabled in Command Prompt, to get full coloured output in Command Prompt run this before running granted commands
-
In the case that
assume -c
fails to open the browser Assume will fall back to returning the access URL via the CLI.- We have also added the
-u
flag which can be included when assuming a role to grab that URL manually.
- We have also added the
-
Added a flag to Assume to unset exported AWS environment variables
assume -unset
-
Added flag to Assume to allow pass-through flags
- Passthrough flags are useful if you are using one of the custom SSO credential providers like aws-azure-login or aws-google-auth and want to use some functionality that that tool provides in their CLI.
Using the
-pt
or--pass-through
flag will allow you to pipe commands into that internal command.
eg.
assume role-a -pt --no-prompt
under the hood will run :
aws-azure-login —profile role-a —no-prompt
-
Added commands to the Granted binary to allow for management of SSO tokens and ability to reset Granted configs
- List all tokens currently saved in the store
granted token
granted token list
- Remove a token from the local store
granted token remove
granted token remove profile_name
- Remove all tokens from the local store
granted token remove --all
- Remove all granted config (deletes the ~/.granted folder), unsets alias
granted uninstall
- List all tokens currently saved in the store
Bug Fixes:
- Fixed a problem stopping users from assuming roles with MFA.
- Added expandable global services list for opening up services using Assume
- Fixed a bug causing the global flags to be mutated due to being pointers, this led to unexpected behaviour and duplication of stringSlice flags values in the assume command
- Fixed a problem where Granted was checking for cached environment variables for aws-azure-login rather than in the
.aws/credentials
file
v0.1.6
What's Changed
- Fix spacing in PromoteUseFlags by @chrnorm in #60
- Allow Granted to launch Console for IAM profiles without assumed roles by @JoshuaWilkes in #64
- Reg lookup windows default browser by @meyerjrr in #65
- Support using external credential source to launch browser by @JoshuaWilkes in #57
- Fix Granted exports Env Vars in wrong order by @JoshuaWilkes in #67
- Update CONTRIBUTING.md by @meyerjrr in #72
- Interface for aws profile assumer by @JoshuaWilkes in #68
- Allow users to assume and open console in Chromium browser by @meyerjrr in #73
- Implement aws-azure-login cred provider using assumer interface by @meyerjrr in #75
Full Changelog: v0.1.5...v0.1.6
Download this release by following our getting started guide.