Releases: kubernetes-sigs/aws-iam-authenticator
Releases · kubernetes-sigs/aws-iam-authenticator
v0.4.0-alpha.1
- Log STS response on successful authentication. (#161, @nckturner)
- Add expiration to token creation. (#160, @nckturner)
- Allow session names to be forwarded with
--forward-session-name
. (#134, @jrnt30) - Add output format option for verify command. (#126, @joshkurz)
- Add flags to configure the address and port to allow running the server locally. (#124, @christopherhein)
- Add a flag to only output the token. (#122, @christopherhein)
- Build release for windows. (#113, acaire)
- Add support for ARNs with paths. (#103, @mattlandis)
- GetWithSTS and GetWithRoleForSession added to Generator interface to allow tools integrating with Authenticator to pass an existing STS client or existing session. (#101, @errordeveloper)
- Add --log-format server flag to configure output format. (#73, @phillipj)
Docker images
Note: You must log in with the registry ID and your role must have the necessary ECR privileges:
$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 894847497797)
docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-alpine-3.6
docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-alpine-3.7
docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-scratch
docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-debian-stretch
docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-alpine
docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1
docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-debian
docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-debian-jessie
v0.3.0
Changelog
- Prompt from stderr instead of stdin. (#74, @nckturner)
- Format output to work with 1.10 exec credential provider. (https://github.com/kubernesustes-sigs/aws-iam-authenticator/pull/72, @christopherhein)
- Discover an ec2 instance's private dns and use it for the node name when {{EC2PrivateDNSName}} is used in the template username. (#65, @nckturner)
- Allow opt-out of the server generating a kubeconfig. (#62, @mumoshu)
- Fix incomplete build. (#59, @mumoshu)
- Canonicalize ARNs to lookup in the map. (#54, @mattlandis)
- Add STS error metric, differentiate between STS and token errors. (#53, @mattlandis)
- Automap ARNs to user/role for allowed accounts. (#50, @Sushant)
- Support getting tokens from an IAM Role requiring MFA. (#42, @gwkunze)
Docker images
docker pull gcr.io/heptio-images/authenticator:v0.3.0-alpine-3.6
docker pull gcr.io/heptio-images/authenticator:v0.3.0-debian-jessie
docker pull gcr.io/heptio-images/authenticator:v0.3.0-alpine-3.7
docker pull gcr.io/heptio-images/authenticator:v0.3.0-scratch
docker pull gcr.io/heptio-images/authenticator:v0.3.0-alpine
docker pull gcr.io/heptio-images/authenticator:v0.3.0
docker pull gcr.io/heptio-images/authenticator:v0.3.0-debian-stretch
docker pull gcr.io/heptio-images/authenticator:v0.3.0-debian