Releases: 99designs/aws-vault
Releases · 99designs/aws-vault
v4.0.0
Fixed
- exe file extension on Windows build #123
- Regressions that unnecessarily prompted for keychain access #138 #139 #140 #145
- A number of bugs in key rotation #134
Added
exec --server
support for linux #118AWS_ASSUME_ROLE_TTL
environment variable forexec --assume-role-ttl
#128
Removed
- Drop support for reading existing AWS keys from env vars or
~/.aws/credentials
when usingexec
. Instead we only use the keys stored in aws-vault #142
Changed
v3.7.1
v3.7.0
v3.6.1
v3.6.0
- If
role_session_name
is available in ~/.aws/config it's now used in place of the Unix timestamp for the session name #87 - If there is a role to be assumed, use the IAM credentials with
AssumeRole
rather thanGetSessionToken
. This allows session expiry of 12 hours #92 - Fix cross compiled binaries in Linux #94
- Added the freedesktop.org's Secret Service as a backend #98
aws-vault login
now logs into the region set in the profile config #103
v3.5.0
v3.4.0
v3.3.0
- Add an --assume-role-ttl flag to control duration of assumed role TTL
- Add a basic file backend and the ability to choose backends with --backend or AWS_VAULT_BACKEND env
- Don't clobber AWS_CONFIG_FILE in subshells (might break things, see #65)
- Add a rotate command for automating key rotation (woot, thanks @sj26)
v3.3.0 (experimental)
- Add an
--assume-role-ttl
flag to control duration of assumed role TTL - Add a basic file backend and the ability to choose backends with
--backend
orAWS_VAULT_BACKEND
env - Don't clobber
AWS_CONFIG_FILE
in subshells (might break things, see #65) - Add a rotate command for automating key rotation (woot, thanks @sj26)