Releases: 99designs/aws-vault
Releases · 99designs/aws-vault
v6.6.0
Added
- Windows arm64 build target 5e9f196
- [login] allow sourcing STS credentials from environment #861
- [exec] Add a dynamic role route to ECS server #878
- Add golangci-lint and fix linting issues #879
Fixed
- Update to keyring v1.2.1
- pass backend: use
PASSWORD_STORE_DIR
if set - Fix tilde expansion
- pass backend: use
v6.5.0
Added
- Add --stdout option to aws-vault exec #819
- Add Linux kernel keyring (keyctl) backend implementation 99designs/keyring#91
- Windows arm64 release build
Fixed
- wincred: Detect german error message on windows 99designs/keyring#79
- secret service: using dashes in keys 99designs/keyring#82 99designs/keyring#83
- kwallet: empty wallet key error 99designs/keyring#87
- pass: Expand dir path 99designs/keyring#86
v6.4.0
Fixed
- Allow empty passwords in
AWS_VAULT_FILE_PASSPHRASE
#773 - Fix ykman prompt for v4. #741 0fa49bd db08b16
- Improve error messages when rotating 0c92ff7
- Eagerly fetch credentials when the ECS server starts to prevent timeouts #804
- Update MFA prompt message, fixes #799
Added
- Add
--force
flag toaws-vault rm
to remove a profile without a confirmation prompt #731 - Make "file" backend directory configurable #814
- Add an example Dockerfile 4de0ce9
Changed
v6.3.1
v6.3.0
v6.2.0
v6.1.0
v6.0.1
v6.0.0
See the full changelog
Added
- Support for AWS SSO #549 docs
- Support for Yubikey TOTP #558 docs
- A shell script for adding a Yubikey to IAM #559
aws-vault exec --ecs-server
starts an ECS credential server offering many advantages over the EC2 metadata server #556 #375 docs- Debug http logging for the server #330
- Support for setting the secret service collection with
--secret-service-collection
#539 - Support for assume roles using OpenID Connect tokens #587
- A native windows prompt
wincredui
#613 - A
pass
MFA provider that reads frompass otp
#640 aws-vault proxy --stop
will stop the ec2 server proxy and remove the network alias. Fixes #548, #360- A new command
aws-vault clear [<profile>]
to remove short-term session credentials and OIDC tokens #644 #591 #412 - The environment variable
AWS_MIN_TTL
will enforce a minimum expiry time on credentials #646
Fixed
- Ensure all error messages go to stderr #565
- Using a key with a slash with the file backend 99designs/keyring#69
- Login hang when using an unknown profile #575 #545
- Shell completion issues #408, #576
- Parse Windows
netsh
error messages in German #610 - The
aws-vault
executable location should now be detected correctly in more instances. Fixes #596 - Use the expiry window when retrieving credentials from the key store to enforce a minimum expiry time #608
Changed
- Config variable
parent_profile
renamed toinclude_profile
. The oldparent_profile
still works for backwards compatibility #520 #560 docs - Credentials created with AssumeRole and MFA are now cached #569 (Fixes #552, #532, #525)
- Profile names are now case-sensitive #570 #528 7262236
- The proxy command is now
aws-vault proxy
. This command is not user facing, but the oldserver
subcommand still works just in case for backwards compatibility #627 - When secret keys are added with
aws-vault add
, the secret is no longer echoed back into the terminal #625 - The
--sessions-only
flag has been deprecated from theremove
command in favour ofaws-vault clear
. The old flag still works for backwards compatibility