Releases: 99designs/aws-vault
Releases · 99designs/aws-vault
v5.1.2
v5.1.1
v5.1.0
Fixed
Added
rotate: Added the--no-sessionflag to use the master credentials instead of using a temporary session #478 (#481)- Config environment var
AWS_CHAINED_SESSION_TOKEN_TTLto specify the TTL for chained sessions (#481) exec: sets an environment variableAWS_SESSION_EXPIRATION#473- release binaries for linux amd64 #487
v5.0.1
v5.0.0
Refactoring on the codebase took place for this release, see the full changeset here. Please report any bugs
Fixed
aws-vault exec: Signals to processes now propagate correctly #454- Case is ignored when parsing config #461
- non-profile sections are ignored when parsing config #293
Added
- The
AWS_ROLE_ARN,AWS_ROLE_SESSION_NAMEandAWS_MFA_SERIALenvironment variables can be used to specify config for theexec,loginandrotatecommands #443 6c94f99 - A new config variable
parent_profileallows a profile to import all of the config and credentials from the specified parent profile, and should be used in conjunction withsource_profile. Note that this config variable is not recognised or compatible with aws-cli or SDK #450 - Support for
duration_secondsin the.aws/configfile 17062f1 --durationflag on the exec and login command to specify the duration of the session #464
Removed
--mfa-tokenflag from the rotate command #460--mfa-serial-overrideflag from the exec command (useAWS_MFA_SERIALinstead) 6c94f99--session-ttl,--assume-role-ttlflags from the exec and login command (use--durationinstead) #464--federation-token-ttlflag from the login command (use--durationinstead) #464
Changed
- [BC break] The
mfa_serialconfig is no longer imported from thesource_profile. This was behaviour introduced in v4.6.0, however it had unintended backwards-incompatible side effects on existing configs.source_profilenow imports credentials only, the same way that the aws cli does. If you relied on the previousmfa_serialimporting behaviour, useparent_profile(along withsource_profile) #445 - [BC break] The
aws-vault execshort flag for--mfa-tokenwas changed from-mto-t, to make it consistent withaws-vault login#464 aws-vault execnow uses the exec syscall rather than creating a child process #454- Changed the default durations #464
GetSessionToken: 1h (previously 4h)AssumeRole: 1h (previously 15m)GetFederationToken: 1h (previously 12h)- Cached MFA
GetSessionTokenforAssumeRole: 8h (previously 4h)
- Changed API for package github.com/99designs/aws-vault/vault. Note this package exists only to support the CLI and has no guarantees for backwards compatibility. It is public only for the convenience of those already using it
v4.7.1
v4.7.0
v4.6.4
Fixed
- Compatibility with the latest kwallet 99designs/keyring#51