Releases: 99designs/aws-vault
Releases · 99designs/aws-vault
v4.0.0
Fixed
- exe file extension on Windows build #123
 - Regressions that unnecessarily prompted for keychain access #138 #139 #140 #145
 - A number of bugs in key rotation #134
 
Added
exec --serversupport for linux #118AWS_ASSUME_ROLE_TTLenvironment variable forexec --assume-role-ttl#128
Removed
- Drop support for reading existing AWS keys from env vars or 
~/.aws/credentialswhen usingexec. Instead we only use the keys stored in aws-vault #142 
Changed
v3.7.1
v3.7.0
v3.6.1
v3.6.0
- If 
role_session_nameis available in ~/.aws/config it's now used in place of the Unix timestamp for the session name #87 - If there is a role to be assumed, use the IAM credentials with 
AssumeRolerather thanGetSessionToken. This allows session expiry of 12 hours #92 - Fix cross compiled binaries in Linux #94
 - Added the freedesktop.org's Secret Service as a backend #98
 aws-vault loginnow logs into the region set in the profile config #103
v3.5.0
v3.4.0
v3.3.0
- Add an --assume-role-ttl flag to control duration of assumed role TTL
 - Add a basic file backend and the ability to choose backends with --backend or AWS_VAULT_BACKEND env
 - Don't clobber AWS_CONFIG_FILE in subshells (might break things, see #65)
 - Add a rotate command for automating key rotation (woot, thanks @sj26)
 
v3.3.0 (experimental)
- Add an 
--assume-role-ttlflag to control duration of assumed role TTL - Add a basic file backend and the ability to choose backends with 
--backendorAWS_VAULT_BACKENDenv - Don't clobber 
AWS_CONFIG_FILEin subshells (might break things, see #65) - Add a rotate command for automating key rotation (woot, thanks @sj26)