Releases: manifoldco/torus-cli
Releases · manifoldco/torus-cli
v0.30.2
v0.30.1
Fixes
- The spinners released in
v0.30.0
can now be disabled by setting the
core.progress
preference to false viatorus prefs set core.progress false
. - Fixed a bug where spinners were enabled for sessions not attached to a
terminal such as in a CI environment or on a server. - Fixed a bug where the spinner during
torus run
,torus view
, ortorus export
would not be removed resulting in a stuck state for users. - Fixed a bug preventing non-Mac OS X users from setting preferences via
torus prefs set
.
v0.30.0
Breaking Changes
The concept of instance and identity as a part of the secret path has been
deprecated. Existing secrets set with non *
identity and instance values can
still be set and unset by providing the full 7 segment path (e.g. torus set /org/project/environment/service/identity/instance/secret
).
Torus will only display the full 7 segment path if identity or instance is a
non *
value (e.g. /org/project/environment/service/machine-api/1/secret
).
In all other cases, a 5 segment path will be displayed (e.g.
/org/project/environment/service/secret
).
Notable Changes
- The status of your account is now displayed via
torus profile view
- When updating your email address via
torus profile update
you are now
prompted for the verification code to re-verify your account. - More precise errors are returned to users when invalid usernames, org,
project, team, or policy names are submitted to a ui prompt. - The experimental and hidden
policies test
command has been removed. - Added spinners to represent progress. This means fewer lasting print-outs
for certain commands. - The
user
,machine
, andinstance
flags have been removed fromtorus set
,torus unset
,torus import
,torus export
, andtorus view
. - Instance and identity values are no longer displayed via
torus status
. torus allow
andtorus deny
now accept a 5 segment path along with the
deprecated 7 path version (e.g.torus allow crudl /org/project/env/service/secret <team>
).torus policies view
will only display the full 7 segment path if the
identity
oridentity
components are not a*
.torus view
andtorus list
will only display the full 7 segment path in
verbose mode if theinstance
andidentity
components are not a*
.- Added
--team, -t
flag totorus list
- The current org, project, environment, and service is now injected into the
process started bytorus run
.
Fixes
torus orgs remove
will now prompt the user to confirm the action before proceedtorus machines destroy
andtorus unset
will default to No instead of Yes
when prompting the user to confirm the action.- When asking for a user's complete name, we now refer to it as
Full Name
instead ofFullname
torus list
did not display secrets which were not set with an instance of*
.
Build
- Torus is now built using
go1.10
v0.29.0
2017-12-22
Notable Changes
- Redesigned the output of
view
and removed the--format
flag. - Updated formatting and flags of
envs list
,services list
,invites list
,
machines list
,machines view
,policies list
andpolicies view
. - Added styling, color and org/project prompts throughout commands. Colors can
be disable by runningtorus prefs set core.colors false
.
v0.28.1
Fixes
- Torus will only print out secondary information such as when it's attempting
to authenticate using credentials fromTORUS_EMAIL
,TORUS_PASSWORD
,
TORUS_TOKEN_ID
, andTORUS_TOKEN_SECRET
if stdout is attached to a
terminal window.
v0.28.0
Notable Changes
- Introduced command
orgs members --org ORG
to list all members within an
organization. - Changed the output style of
teams members
to match the output style of
orgs members --org ORG
. - Introduced the
torus export
command making it easy to export secrets from a
specific environment and service. As a result thetorus view
--format, -f
flas has been deprecated and will be removed on December 31st 2017. - Using
torus export
, you can now export secrets to terraform'stfvars
file format. - Encryption keys, user passwords, and machine secret tokens are now stored in
secure and guarded memory making it more difficult to extract data from a
running process. - Replaced
torus ls
withtorus list
making it easy to list and search for secrets within a project. Listing secrets is now twice as fast astorus ls
.
Fixes
- Fixed a bug preventing old credential values from being decrypted.
- Previously, expiration of a key was set to be one year, instead, we've set it
to be three. This fixes a bug which prevented users from setting secrets as
their keys had expired. A corresponding change was made to the torus server.
v0.27.0
Notable Changes
- Significant performance increases when secrets are sourced from multiple
keyrings. For example if a secret is brought in fromdev-*
anddev-user
Torus will no longer unseal the private encryption key twice which leads to a
signficiant reduction in decryption time. Users should notice this
improvement when usingtorus view
andtorus run
. - Significant reduction in the number of round trips made to the Torus server
to fetch an organizations claimtree (web of trust) when decrypting or
encrypting secrets. Users should notice this improvement when many different
users are contributing secrets to the same keyrings when usingtorus view
,
torus run
,torus set
, ortorus unset
. - Parallelized fetching of keypairs and an orgs claimtree during secret
decryption. Users should notice a modest improvement when usingtorus view
andtorus run
.
Fixes
- Request timeout to the server has been increased from 6s to 60s.
- Fixed a bug preventing a user's invitation from being approved after a user
was removed from the organization.
v0.26.1
No changelog entry
v0.26.0
Notable Changes
- Introduced
torus policies attach
allowing a user to attach a policy to
multiple teams or machine roles. - Introduced
torus policies delete
allowing a user to delete a policy and all
of it's attachment from an org. System policies cannot be deleted. - When generating a policy using
torus allow
ortorus deny
you can now
specify it's name and description using the--name
and--description
flags. If no description is provided, one will be generated.
Fixes
- Clarify the behaviour of the
--environment
,--service
,--instance
,
--user
, and--machine
flags when reading or writing secrets.
v0.25.2
2017-10-19
Fixes
- Fixed a bug preventing Torus from being used once installed via npm on win32.