Skip to content

Releases: common-fate/granted

v0.8.0

09 Feb 18:45
79c88ab
Compare
Choose a tag to compare

Open a CLI and a console at the same time with a one liner

This release adds a new -t flag to allow assuming a role in the terminal, and opening the web console at the same time:

assume -t -c

A huge thankyou to @n3s7or for contributing this feature!

Improvements to automatic profile generation

This release adds support for specifying sources to load AWS profiles from, using the --source flag. Our default source is AWS IAM Identity Center --source aws-sso, which sources profiles for all available SSO roles. This release adds support for using Common Fate as a source for roles: specifying --source cf will source profiles for all available Access Rules. This can be useful for generating profiles for privileged roles which require an access request to be made.

We'd love to hear if you have suggestions for additional profile sources - please open an issue with any ideas.

Additionally, profiles generated now use the Granted Credential Process by default. You can opt out of this behaviour by specifying --no-credential-process.

Finally, we've added support for a --prune flag:

granted sso populate --sso-region ap-southeast-2 --prune https://example.awsapps.com/start

This flag will remove any profiles which were previously generated by Granted, but no longer exist in the source Granted is reading profiles from. Thanks to @denniswebb for requesting this feature in #340.

Service list improvements

This release adds appsync to our service map, so running assume -s appsync will no longer give a warning message. Thanks again @n3s7or!

What's Changed

Full Changelog: v0.7.1...v0.8.0

v0.7.1

18 Jan 07:24
9b9ef4f
Compare
Choose a tag to compare

This release fixes an issue preventing the granted sso populate command from being run.

What's Changed

Full Changelog: v0.7.0...v0.7.1

v0.7.0

17 Jan 07:33
57c15f9
Compare
Choose a tag to compare

Thanks @vdesjardins for adding support for a custom template when generating profiles from SSO. Check out the docs here https://docs.commonfate.io/granted/usage/automatic-config-generation/#populate-command

Added the granted console command which allows you to generate urls or open the browser with existing credentials in the environment.

This was built for a use case where Granted can be programatically invoked to generate the console URL for a service when credentials are managed by a different application. See the example:

AWS_ACCESS_KEY_ID=example AWS_SECRET_ACCESS_KEY=example AWS_SESSION_TOKEN=example granted console --service cfn --region us-east-1 --url

What's Changed

New Contributors

Full Changelog: v0.6.1...v0.7.0

v0.6.1

10 Jan 23:14
2302e60
Compare
Choose a tag to compare

Fixes a bug introduced in v0.6.0 where granted registry setup command was missing.

What's Changed

Full Changelog: v0.6.0...v0.6.1

v0.6.0

09 Jan 22:31
fa23242
Compare
Choose a tag to compare

This release includes the updated implementation for Profile Registry based on community members feedback (thanks!). It now includes AWS profile templating for user specific values or arbitrary registry level variables 🎉
Please refer to the documents for full usage guide https://docs.commonfate.io/granted/usage/profile-registry

NOTE: If you are currently using Granted Profile Registry then you need to migrate by running the following command:

granted registry migrate

This will prompt you enter name for each registry you are subscribed to. After that you are good to go!

What's Changed

  • CLI-88 Update Profile Registry Implementation by @Eddie023 in #317
  • Better logging around waiting for the browser by @grantjoy in #321
  • Use slash to separate account and role name in sso generate by @dserodio in #320
  • Add command to list expiry status for all access token saved in the key ring by @n3s7or in #323

New Contributors

Full Changelog: v0.5.2...v0.6.0

v0.5.2

16 Dec 05:34
367e6ec
Compare
Choose a tag to compare

Configurable Firefox Container Color and Icon

Thanks @onebytegone for contributing an update that allows the color and icon of the Firefox container to be controlled in the AWS config file.

The color can be controlled using these optional fields in each profile config:

granted_color = red # blue, turquoise, green, yellow, orange, red, pink, purple
granted_icon = fruit # fingerprint, briefcase, dollar, cart, circle, gift, vacation, food, fruit, pet, tree, chill

Note

To use this feature you will need to update your granted-containers firefox extension to the latest version (v1.1.1)

Support sso-session Section in AWS Config File

Support for the new AWS SSO config format using an sso-session section has been added.

[profile example]
sso_session = example-sso
granted_sso_account_id = 123456789011
granted_sso_role_name  = AWSAdministratorAccess
region                 = ap-southeast-2
credential_process     = granted credential-process --profile example

[sso-session example-sso]
sso_region    = ap-southeast-2
sso_start_url = https://example.awsapps.com/start

What's Changed

Full Changelog: v0.5.1...v0.5.2

v0.5.1

28 Nov 00:16
64907e1
Compare
Choose a tag to compare

What's Changed

  • Added AWS services and aliases to assume by @J00MZ in #309
    • scrm: Secrets Manager
    • scrh: Security Hub
    • ses: SES
    • stepfn: Step Functions (states)
    • sns: SNS
    • tra: Trusted Advisor
  • CLI-43 Throw error for mismatching profile in granted credential-process by @Eddie023 in #308
  • Fix nil pointer error when using -sso on expired request by @meyerjrr in #311
  • fix spelling in CONTRIBUTING.md by @onebytegone in #314

New Contributors

Full Changelog: v0.5.0...v0.5.1

v0.5.0

15 Nov 05:00
9bf8cbc
Compare
Choose a tag to compare

This release includes the support for Profile Registry feature as discussed in this RFD.

Profile Registries makes it easy to share AWS config files with the team members in consistent and efficient manner. It synchronizes from git repository to your default AWS config file located locally at ~/.aws/config.

You can get started here.

What's Changed

New Contributors

Full Changelog: v0.4.0...v0.5.0

v0.4.0

19 Oct 09:16
3c43e87
Compare
Choose a tag to compare

Improved IAM user credential support

Read our guide on this feature here.

This release adds support for storing IAM user credentials in secure storage with Granted (#254).
Previously, if you were using an IAM user credentials with Granted, you'd need to store them in plaintext in ~/.aws/credentials. Now, running

granted credentials import <profile name>

will import the user credentials to your system's keychain and remove the plaintext.

A big thanks to @ipmb and @eugene1g for their feature request and feedback on the feature in #178.

As part of #254 we have migrated the name of the Keyring service which stores SSO tokens from granted to granted-aws-sso-tokens. We plan on using this suffix format to store different kinds of credentials in secure storage. When storing AWS IAM user credentials, Granted uses granted-aws-iam-credentials as the Keyring service name.

Because of this change, when upgrading to v0.4.0 you may see a keychain prompt on MacOS similar to the below. You will also need to authenticate again to AWS SSO after upgrading.

New AWS service shortcuts

This release adds additional shortcuts for networking services on AWS.

assume -s vpc # opens a console to the VPC service
assume -s dx  # opens a console to the AWS Direct Connect service

A big thanks to @networkprogrammer for contributing these shortcuts.

What's Changed

New Contributors

Full Changelog: v0.3.1...v0.4.0

v0.3.1

28 Sep 02:30
c706b2b
Compare
Choose a tag to compare

Fixes a regression introduced in v0.3.0 where SSO flows no longer worked on linux and Windows.

What's Changed

Full Changelog: v0.3.0...v0.3.1