Releases: common-fate/granted
v0.27.5
v0.27.4
What's Changed
- Fix error checks on retry logic for assuming roles with common fate by @JoshuaWilkes in #681
Full Changelog: v0.27.3...v0.27.4
v0.27.3
What's Changed
- Add retry logic to credential process where an active request exists in Common Fate by @JoshuaWilkes in #677
- Credential process prompts to use 'granted request latest' when possible by @JoshuaWilkes in #679
- fix a bad error check in the credential process by @JoshuaWilkes in #678
Full Changelog: v0.27.2...v0.27.3
v0.27.2
What's Changed
Full Changelog: v0.27.1...v0.27.2
v0.27.1
v0.27.0
What's Changed
- Fix panic due to nil pointer in frecency by @chrnorm in #658
- Duration flag now sets the duration of the access request by @ckluy31 in #663
- Pull AWS credentials from multiple sources when building console url by @meyerjrr in #664
- Allow custom reason to be provided on access request through granted by @ckluy31 in #661
- Allow automatic login to be specified globally by @chrnorm in #666
- Fix newline in version print output by @chrnorm in #667
New Contributors
Full Changelog: v0.26.2...v0.27.0
v0.26.2
This release fixes an issue when using Granted to authenticate to an OIDC provider on Windows, when using Granted with Common Fate.
What's Changed
- Updated sdk to fix windows token store issue by @shwethaumashanker in #660
Full Changelog: v0.26.1...v0.26.2
v0.26.1
What's Changed
Full Changelog: v0.26.0...v0.26.1
v0.26.0
This release introduces initial support for HTTP Profile Registries. HTTP registries implement the granted.registry.aws.v1alpha1
API.
To add a HTTP registry, you can run:
granted registry add --name <name> --url <url_of_registry_deployment> --type http
The Common Fate platform implements the HTTP Profile Registry in the v1.42.0 release.
You can read more about Profile Registries here.
What's Changed
- add command for setting up new cf registry by @meyerjrr in #653
- Fix the default type for the 'granted registry add' command by @chrnorm in #657
Full Changelog: v0.25.0...v0.26.0
v0.25.0
This release adds support for using Sprig template functions in granted sso populate
and granted sso generate
. Here's an example:
granted sso populate --sso-region us-east-1 --prune --prefix gen_ --profile-template '{{ .RoleName | strings.ToLower }}-{{ .AccountName | strings.ToLower }}' https://<snip>.awsapps.com/start
Additionally, this release allows granted sso generate
/granted sso populate
configuration to be persisted in the Granted config file (~/.granted/config
by default). You can now add the following section to your config file:
[SSO.default]
StartURL = "https://d-976708da7d.awsapps.com/start"
SSORegion = "ap-southeast-2"
and then run the following command to generate a ~/.aws/profile
file, without needing to provide additional arguments:
granted sso generate
A huge thankyou to @mikesarver for contributing both of these new improvements.
Additionally, this release fixes some release pipeline issues which caused keychain errors in v0.24 for Intel MacOS (#647). If you're experiencing issues on v0.24 please update to this release.
What's Changed
- bump awsconfigfile by @mikesarver in #648
- for granted sso command, add storing parameters in input config #650 by @mikesarver in #651
New Contributors
- @mikesarver made their first contribution in #648
Full Changelog: v0.24.0...v0.25.0