A powerful tool for using AWS Identity Center for the CLI and web console.
Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.15.0...v1.15.1
~
and $HOME for UrlExecCommand by @synfinatic in https://github.com/synfinatic/aws-sso-cli/pull/822
Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.14.3...v1.15.0
Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.14.2...v1.14.3
This is a significant release with some key changes regarding configuration defaults and user experience which I hope makes aws-sso
easier and more consistent to use. The major changes (please see the change log for more details) are:
aws-sso login
to use your SSO credentials to login to AWS Identity Center.$AWS_PROFILE
and --profile
flag) uses the Account name/alias instead of the AccountId.AutoConfigCheck
config option. aws-sso
will now check the number of authorized AWS Accounts at login
to see if the cache needs to be updated. If you have been granted a new role to an existing account, you will need to run aws-sso cache
manually.I consider this beta quality as I am using this myself on a daily basis.
--threads
CLI optionaws-sso login
. No more auto-login. #291login
does a quick cache invalidation check using the AWS AccountIDs #576aws-sso
commands other than cache
and login
no longer can trigger a cache refresh or
update of ~/.aws/config
fileconfig
, config-profiles
and completions
commands
and replace with setup
flush
command. Use logout
instead--no-cache
flagCacheRefresh
configuration option. aws-sso
will only update the cache
when you ask it to via aws-sso cache
tags --force-update
flagAutoConfigCheck
configuration option.AccountIdStr()
function for ProfileFormat
.AccountIdStr
field is replaced by AccountIdPad
in list
command and ListFields
in config.yamlARN
field is replaced by Arn
in list
command and ListFields
in config.yamlExpiresStr
field is replaced by Expires
in list
command and ListFields
in config.yamlFirefoxOpenUrlInContainer
config optionConfigUrlAction
config optionCacheRefresh
config option by @synfinatic in https://github.com/synfinatic/aws-sso-cli/pull/655
AutoConfigCheck
config option by @synfinatic in https://github.com/synfinatic/aws-sso-cli/pull/660
Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.14.2...v2.0.0-beta1
console
command when accessing China/US Gov #634Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.14.1...v1.14.2
Note: This is likely the final v1.x release as I start working on v2 which will break CLI command compatibility with v1.
ProfileFormat
#590Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.14.0...v1.14.1
--no-cache
to console
, config-profiles
, exec
and list
#574--no-cache
flag by @synfinatic in https://github.com/synfinatic/aws-sso-cli/pull/575
Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.13.1...v1.14.0
RoleArn
in output #561AWS_CONTAINER_CREDENTIALS_FULL_URI
is now http://localhost:4144/
AWS_CONTAINER_CREDENTIALS_FULL_URI
is now http://localhost:4144/slot/<profile>
aws-sso ecs list
and aws-sso ecs profile
now return the same output formatmake tags
now uses gotags
Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.13.0...v1.13.1
<Del>
#531maxretry
and maxbackoff
in SSO Instance during config #536aws-sso config
with a missing config file no longer prompts you to back it up #537AccountAlias
is really the AWS Account Name #534ecs load
now updates history #519--advanced
flag #530AutoConfigCheck
now honors the $AWS_CONFIG_FILE
variable #540config-profiles
now supports the --aws-config
flagecs load
now saves to history by @synfinatic in https://github.com/synfinatic/aws-sso-cli/pull/543
aws-sso ecs list
command by @synfinatic in https://github.com/synfinatic/aws-sso-cli/pull/544
AuthUrlAction
to override UrlAction
for SSO auth by @synfinatic in https://github.com/synfinatic/aws-sso-cli/pull/545
Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.12.0...v1.13.0
This release adds support for the emulating the AWS ECS Metadata service for exposing IAM role credentials over HTTP and significant improvements for users with many AWS accounts.
console
command now always honors the --duration
flaglist
mode.$AWS_CONTAINER_CREDENTIALS_FULL_URI
#398list
mode #504MaxRetry
and MaxBackoff
config optionsrelease-tag
make target by @synfinatic in https://github.com/synfinatic/aws-sso-cli/pull/510
Full Changelog: https://github.com/synfinatic/aws-sso-cli/compare/v1.11.0...v1.12.0