Skip to content

Releases: fwdcloudsec/granted

v0.26.0

15 May 10:44
14a0416
Compare
Choose a tag to compare

This release introduces initial support for HTTP Profile Registries. HTTP registries implement the granted.registry.aws.v1alpha1 API.

To add a HTTP registry, you can run:

granted registry add --name <name> --url <url_of_registry_deployment> --type http

The Common Fate platform implements the HTTP Profile Registry in the v1.42.0 release.

You can read more about Profile Registries here.

What's Changed

  • add command for setting up new cf registry by @meyerjrr in #653
  • Fix the default type for the 'granted registry add' command by @chrnorm in #657

Full Changelog: v0.25.0...v0.26.0

v0.25.0

03 May 17:23
6efc360
Compare
Choose a tag to compare

This release adds support for using Sprig template functions in granted sso populate and granted sso generate. Here's an example:

granted sso populate --sso-region us-east-1 --prune --prefix gen_ --profile-template '{{ .RoleName | strings.ToLower }}-{{ .AccountName | strings.ToLower }}' https://<snip>.awsapps.com/start

Additionally, this release allows granted sso generate/granted sso populate configuration to be persisted in the Granted config file (~/.granted/config by default). You can now add the following section to your config file:

[SSO.default]
StartURL = "https://d-976708da7d.awsapps.com/start"
SSORegion = "ap-southeast-2"

and then run the following command to generate a ~/.aws/profile file, without needing to provide additional arguments:

granted sso generate

A huge thankyou to @mikesarver for contributing both of these new improvements.

Additionally, this release fixes some release pipeline issues which caused keychain errors in v0.24 for Intel MacOS (#647). If you're experiencing issues on v0.24 please update to this release.

What's Changed

New Contributors

Full Changelog: v0.24.0...v0.25.0

v0.24.0

29 Apr 09:36
c993e05
Compare
Choose a tag to compare

This version adds support for clearing the Granted cache non-interactively, thanks to @jsproede in #643.

granted cache clear --storage session-credentials --profile [profile_name] 

skips the prompts and clears the cache entry immediately.

This version additionally fixes the fish shell completions thanks to @Hawkbawk in #645.

What's Changed

  • support JIT role activation in assume --console commands by @meyerjrr in #644
  • CLI flags to specify storage and profile to clear credential cache without prompt by @jsproede in #643
  • Autoload fish completions and fix Makefile by @Hawkbawk in #645

New Contributors

Full Changelog: v0.23.2...v0.24.0

v0.23.2

23 Apr 11:45
183d857
Compare
Choose a tag to compare

What's Changed

Full Changelog: v0.23.1...v0.23.2

v0.23.1

18 Apr 06:20
2792b83
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v0.23.0...v0.23.1

v0.23.0

08 Apr 10:41
9418e2c
Compare
Choose a tag to compare

This release brings a few minor bug fixes and support for Just-In-Time (JIT) access using Common Fate. For more information on JIT access, check out the JIT recipe in our documentation. A big thankyou to @Nepoxx for making their first contribution in this release!

What's Changed

  • Cleanup profile registry implementation + improve testability by @chrnorm in #622
  • fix bug where every line is removed in config by @Nepoxx in #631
  • Update just-in-time access integration by @chrnorm in #630
  • cleanup the large banners and replace them with a single-line version by @chrnorm in #633
  • add a check for empty access key ID when caching by @chrnorm in #632

New Contributors

Full Changelog: v0.22.0...v0.23.0

v0.22.0

29 Mar 11:10
3bfb958
Compare
Choose a tag to compare

IAM Federated logins now have attributable username in Cloudtrail

  • The changes refactor the way federation token ID is used for AWS IAM credentials. Instead of relying on the userID which was previously parsed, the code now uses the userName which is more easily attributable to the IAM user name in the Cloudtrail events list view.

What's Changed

New Contributors

Full Changelog: v0.21.1...v0.22.0

v0.21.1

06 Mar 15:54
9924d63
Compare
Choose a tag to compare

What's Changed

  • Revert breaking change to 'granted login' with additional prompt for SSO scopes by @chrnorm in #618
  • Add --so-scope in hint for granted sso login by @keymon in #619

New Contributors

Full Changelog: v0.21.0...v0.21.1

v0.21.0

05 Mar 20:43
3ae786e
Compare
Choose a tag to compare

Added support for refreshable AWS SSO

You can now add granted_sso_registration_scopes = sso:account:access to your ~/.aws/config, which will cause Granted to respect the session duration in IAM Identity Center. This can be extended to prompt less frequently. Supplying thesso:account:access scope will cause IAM Identity Center to return a refreshable access token, with a total allowed session time in accordance with your configured AWS SSO session length.

What's Changed

  • Adds event bridge service map by @CodyDunlap in #611
  • Delete former credentials when rotating (granted credentials rotate) by @n3s7or in #582
  • Bump github.com/dvsekhvalnov/jose2go from 1.5.0 to 1.6.0 by @dependabot in #586
  • Add support for refreshable AWS SSO tokens by @chrnorm in #616

New Contributors

Full Changelog: v0.20.7...v0.21.0

v0.20.7

25 Jan 14:52
81699f9
Compare
Choose a tag to compare

Added better error handling for oauth2 invalid_grant error

we have added better error handling for the oauth2 invalid_grant error. Now, whenever this error is encountered, Granted automatically clears the cached token and sends a message like:

[i] It looks like the above error was caused by an invalid authentication token. We have cleared the token from your keychain. To re-run the command, you'll need to authenticate again by running: 'granted login https://d3h0e9z8klkkkk.cloudfront.net/'

What's Changed

Full Changelog: v0.20.6...v0.20.7