Skip to content

Releases: common-fate/granted

v0.3.0

27 Sep 09:59
f990edc
Compare
Choose a tag to compare

Automatic config file population

This release adds support for automatically populating ~/.aws/config with available roles from AWS SSO (#230). Thanks to @misterjoshua for contributing support for this! We'd love to hear your feedback on how Granted can make your AWS config file easier to manage on this discussion: #249.

credential_process support

This release adds support for using Granted as a credential_process provider in your AWS config (#257). This allows Granted to work with the --profile flag in the AWS CLI. You can set up profiles as follows:

[profile my-profile]
region = ap-southeast-2
granted_sso_account_id = 123456789012
granted_sso_region = ap-southeast-2
granted_sso_role_name = MyRoleName
granted_sso_start_url = https://example.awsapps.com/start
credential_process = granted credential-process --profile my-profile 

and then run

aws sts get-caller-identity --profile my-profile

and Granted keychain storage will be used to load the SSO token. This eliminates the need to authenticate with AWS SSO a second time when running commands which use the --profile flag.

Access request integration

If you're using the Granted CLI with Granted Approvals, running granted settings request-url set will set a request URL. You'll be prompted to request access to roles if Granted receives a ForbiddenException error when trying to assume them.

❯ aws sts get-caller-identity --profile needs-requesting

Error when retrieving credentials from custom-process: error: operation error SSO: GetRoleCredentials, https response error StatusCode: 403, RequestID: 88c940dd-9f53-4bdf-a49c-f6f6f6f2b50d, api error ForbiddenException: No access

You need to request access to this role:
https://example.com/access?type=commonfate%2Faws-sso&permissionSetArn.label=MyRole&accountId=123456789012

New service shortcuts

Running assume -s ce will open a console to Cost Explorer (#258). Thanks for the contribution @mjulian!

UX improvements

We now support automatically re-assuming roles for ZSH (#228). Thanks to @sosheskaz for the contribution! To enable this, set GRANTED_ENABLE_AUTO_REASSUME=true in your .zshrc. We're working on further improving this for other shells using the AWS credential_process's built in refreshing functionality in #263.

Our session credential duration is now displayed in a far more readable format too (#259). Thanks to @alexjurkiewicz for the contribution!

[demo-sandbox1](ap-southeast-2) session credentials will expire in 1 hour

Bug fixes

We fixed a regression which caused assume to not print any output on headless Linux machines (#260) - thanks to @QuinnyPig for helping to diagnose the specific commit which caused this! We've added additional testing to our CI to prevent this happening in future (#265).

We also fixed an issue where the browser launched by Granted would be closed if you pressed Control+C in the terminal which originally opened the browser (#252).

What's Changed

New Contributors

Full Changelog: v0.2.9...v0.3.0

v0.2.9

07 Sep 04:12
d2d47e4
Compare
Choose a tag to compare

What's Changed

Full Changelog: v0.2.8...v0.2.9

v0.2.8

30 Aug 07:30
f8debcd
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: 0.2.6...v0.2.8

v0.2.6

15 Aug 06:29
a1c38ee
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v0.2.5...v0.2.6

v0.2.5

19 Jul 21:08
1c60da8
Compare
Choose a tag to compare

Fixes an issue where an error would be returned if the AWS credentials file (~/.aws/credentials on Unix machines) doesn't exist.

What's Changed

Full Changelog: v0.2.4...v0.2.5

New Contributors

v0.2.4

19 Jul 07:37
6b2b779
Compare
Choose a tag to compare

What's Changed

Full Changelog: v0.2.3...v0.2.4

v0.2.3

19 Jul 05:08
9c48516
Compare
Choose a tag to compare

This release includes a range of feature requests and fixes from our Issues on github.
Thanks @alexjurkiewicz for your shorthand region syntax allowing you to launch the console or terminal to a region without typing the whole name out. assume demo -r ue1 is equivalent to assume demo -r us-east-1

Thanks @tassm for introducing support for loading profiles from the .credentials file when running assume, you will now see options from both your ~/.aws/config file and your ~/.aws/credentials file.

We have made some improvements to our profile parsing which reduces response time of the assume command and autocomplete for users with large config files >7000 lines long. These users should see seconds reduced to milliseconds for the assume command.

What's Changed

New Contributors

Full Changelog: v0.2.2...v0.2.3

v0.2.2

07 Jul 07:04
b7e9894
Compare
Choose a tag to compare

What's Changed

Full Changelog: v0.2.1...v0.2.2

v0.2.1

07 Jul 06:45
b03dfde
Compare
Choose a tag to compare

What's Changed

Tab auto complete for zsh is now available, checkout the docs to get started using it!

Full Changelog: v0.2.0...v0.2.1

v0.2.0

22 Jun 15:23
8c63fe9
Compare
Choose a tag to compare

This release adds better support for using Granted to authenticate to EKS clusters! Thankyou to @nicgrayson for helping us improve Granted for this use case. We've added a recipe for using Granted with EKS to our documentation.

Additionally this release adds support for more service shortcuts when using the assume -s <SERVICE_NAME> command. Thanks to @alexjurkiewicz and @holly-evans for contributing these!

Download this release by following our getting started guide.

What's Changed

New Contributors

Full Changelog: v0.1.17...v0.2.0