Skip to content

Releases: common-fate/granted

v0.24.0

29 Apr 09:36
c993e05
Compare
Choose a tag to compare

This version adds support for clearing the Granted cache non-interactively, thanks to @jsproede in #643.

granted cache clear --storage session-credentials --profile [profile_name] 

skips the prompts and clears the cache entry immediately.

This version additionally fixes the fish shell completions thanks to @Hawkbawk in #645.

What's Changed

  • support JIT role activation in assume --console commands by @meyerjrr in #644
  • CLI flags to specify storage and profile to clear credential cache without prompt by @jsproede in #643
  • Autoload fish completions and fix Makefile by @Hawkbawk in #645

New Contributors

Full Changelog: v0.23.2...v0.24.0

v0.23.2

23 Apr 11:45
183d857
Compare
Choose a tag to compare

What's Changed

Full Changelog: v0.23.1...v0.23.2

v0.23.1

18 Apr 06:20
2792b83
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v0.23.0...v0.23.1

v0.23.0

08 Apr 10:41
9418e2c
Compare
Choose a tag to compare

This release brings a few minor bug fixes and support for Just-In-Time (JIT) access using Common Fate. For more information on JIT access, check out the JIT recipe in our documentation. A big thankyou to @Nepoxx for making their first contribution in this release!

What's Changed

  • Cleanup profile registry implementation + improve testability by @chrnorm in #622
  • fix bug where every line is removed in config by @Nepoxx in #631
  • Update just-in-time access integration by @chrnorm in #630
  • cleanup the large banners and replace them with a single-line version by @chrnorm in #633
  • add a check for empty access key ID when caching by @chrnorm in #632

New Contributors

Full Changelog: v0.22.0...v0.23.0

v0.22.0

29 Mar 11:10
3bfb958
Compare
Choose a tag to compare

IAM Federated logins now have attributable username in Cloudtrail

  • The changes refactor the way federation token ID is used for AWS IAM credentials. Instead of relying on the userID which was previously parsed, the code now uses the userName which is more easily attributable to the IAM user name in the Cloudtrail events list view.

What's Changed

New Contributors

Full Changelog: v0.21.1...v0.22.0

v0.21.1

06 Mar 15:54
9924d63
Compare
Choose a tag to compare

What's Changed

  • Revert breaking change to 'granted login' with additional prompt for SSO scopes by @chrnorm in #618
  • Add --so-scope in hint for granted sso login by @keymon in #619

New Contributors

Full Changelog: v0.21.0...v0.21.1

v0.21.0

05 Mar 20:43
3ae786e
Compare
Choose a tag to compare

Added support for refreshable AWS SSO

You can now add granted_sso_registration_scopes = sso:account:access to your ~/.aws/config, which will cause Granted to respect the session duration in IAM Identity Center. This can be extended to prompt less frequently. Supplying thesso:account:access scope will cause IAM Identity Center to return a refreshable access token, with a total allowed session time in accordance with your configured AWS SSO session length.

What's Changed

  • Adds event bridge service map by @CodyDunlap in #611
  • Delete former credentials when rotating (granted credentials rotate) by @n3s7or in #582
  • Bump github.com/dvsekhvalnov/jose2go from 1.5.0 to 1.6.0 by @dependabot in #586
  • Add support for refreshable AWS SSO tokens by @chrnorm in #616

New Contributors

Full Changelog: v0.20.7...v0.21.0

v0.20.7

25 Jan 14:52
81699f9
Compare
Choose a tag to compare

Added better error handling for oauth2 invalid_grant error

we have added better error handling for the oauth2 invalid_grant error. Now, whenever this error is encountered, Granted automatically clears the cached token and sends a message like:

[i] It looks like the above error was caused by an invalid authentication token. We have cleared the token from your keychain. To re-run the command, you'll need to authenticate again by running: 'granted login https://d3h0e9z8klkkkk.cloudfront.net/'

What's Changed

Full Changelog: v0.20.6...v0.20.7

v0.20.6

03 Jan 22:10
bbc5266
Compare
Choose a tag to compare

Fix for assume --exec with multiple arguments/spaces

The output from goassume when --exec is provided now returns the arguments with proper escaping/splitting to ensure they are evaluated when passed to sh -c in the assume script.

What's Changed

Full Changelog: v0.20.5...v0.20.6

v0.20.5

20 Dec 00:48
cb1e905
Compare
Choose a tag to compare

What's Changed

  • Fix SSO_START_URL lookup for credential exports by @cedieio in #572
  • Revert "Ensure proper initialization of profiles with source_profile" by @JoshuaWilkes in #576

Full Changelog: v0.20.4...v0.20.5