Skip to content

Releases: common-fate/granted

v0.27.5

12 Jun 16:05
2f715ef
Compare
Choose a tag to compare

This release fixes an issue where Granted wouldn't work with Firefox Nightly. Thanks @meuxx for the contribution!

What's Changed

  • Add support for Firefox Nightly by @meuxx in #685

New Contributors

Full Changelog: v0.27.4...v0.27.5

v0.27.4

06 Jun 02:36
eaf9a80
Compare
Choose a tag to compare

What's Changed

  • Fix error checks on retry logic for assuming roles with common fate by @JoshuaWilkes in #681

Full Changelog: v0.27.3...v0.27.4

v0.27.3

05 Jun 09:28
14edf76
Compare
Choose a tag to compare

What's Changed

  • Add retry logic to credential process where an active request exists in Common Fate by @JoshuaWilkes in #677
  • Credential process prompts to use 'granted request latest' when possible by @JoshuaWilkes in #679
  • fix a bad error check in the credential process by @JoshuaWilkes in #678

Full Changelog: v0.27.2...v0.27.3

v0.27.2

03 Jun 20:02
c83b088
Compare
Choose a tag to compare

What's Changed

  • Fix panic due to nil pointer dereference by @chrnorm in #675

Full Changelog: v0.27.1...v0.27.2

v0.27.1

03 Jun 13:39
9b245f6
Compare
Choose a tag to compare

What's Changed

  • update error messages and auto login when grant token is expired by @meyerjrr in #672
  • Improve Granted startup time when HTTP registry is used by @chrnorm in #673

Full Changelog: v0.27.0...v0.27.1

v0.27.0

22 May 15:10
5c9f5bd
Compare
Choose a tag to compare

What's Changed

  • Fix panic due to nil pointer in frecency by @chrnorm in #658
  • Duration flag now sets the duration of the access request by @ckluy31 in #663
  • Pull AWS credentials from multiple sources when building console url by @meyerjrr in #664
  • Allow custom reason to be provided on access request through granted by @ckluy31 in #661
  • Allow automatic login to be specified globally by @chrnorm in #666
  • Fix newline in version print output by @chrnorm in #667

New Contributors

Full Changelog: v0.26.2...v0.27.0

v0.26.2

16 May 21:02
b7118f3
Compare
Choose a tag to compare

This release fixes an issue when using Granted to authenticate to an OIDC provider on Windows, when using Granted with Common Fate.

What's Changed

Full Changelog: v0.26.1...v0.26.2

v0.26.1

15 May 16:36
1486d22
Compare
Choose a tag to compare

What's Changed

  • fix profile registry sync for registries without a type by @chrnorm in #659

Full Changelog: v0.26.0...v0.26.1

v0.26.0

15 May 10:44
14a0416
Compare
Choose a tag to compare

This release introduces initial support for HTTP Profile Registries. HTTP registries implement the granted.registry.aws.v1alpha1 API.

To add a HTTP registry, you can run:

granted registry add --name <name> --url <url_of_registry_deployment> --type http

The Common Fate platform implements the HTTP Profile Registry in the v1.42.0 release.

You can read more about Profile Registries here.

What's Changed

  • add command for setting up new cf registry by @meyerjrr in #653
  • Fix the default type for the 'granted registry add' command by @chrnorm in #657

Full Changelog: v0.25.0...v0.26.0

v0.25.0

03 May 17:23
6efc360
Compare
Choose a tag to compare

This release adds support for using Sprig template functions in granted sso populate and granted sso generate. Here's an example:

granted sso populate --sso-region us-east-1 --prune --prefix gen_ --profile-template '{{ .RoleName | strings.ToLower }}-{{ .AccountName | strings.ToLower }}' https://<snip>.awsapps.com/start

Additionally, this release allows granted sso generate/granted sso populate configuration to be persisted in the Granted config file (~/.granted/config by default). You can now add the following section to your config file:

[SSO.default]
StartURL = "https://d-976708da7d.awsapps.com/start"
SSORegion = "ap-southeast-2"

and then run the following command to generate a ~/.aws/profile file, without needing to provide additional arguments:

granted sso generate

A huge thankyou to @mikesarver for contributing both of these new improvements.

Additionally, this release fixes some release pipeline issues which caused keychain errors in v0.24 for Intel MacOS (#647). If you're experiencing issues on v0.24 please update to this release.

What's Changed

New Contributors

Full Changelog: v0.24.0...v0.25.0