-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
V2 GA Release 🎉🎉 #163
Merged
Merged
V2 GA Release 🎉🎉 #163
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
README driven design
stub out m2m subcommand
M2M Access Token
Fetching IAM creds with assume role with web identity
required backporting from other CLIs ... Closes #142
AWS CLI process credentials JSON output
into the shell Closes #135
Discussed in issue #114
`--exec` subcommand
`OKTA_OIDC_CLIENT_ID`, `OKTA_AWS_ACCOUNT_FEDERATION_APP_ID`
appended or updated in an AWS credentials file. Implementation based @daniel-sampliner work in #94 Closes #94
web command - collect all roles for an AWS Fed App (idp) at once
Alternate open browser command
wildcard friendly labels
fix(cli): allow running --version without a subcommand
prep v2.0.0-beta.6
Remove confusing feature declaration.
duytiennguyen-okta
approved these changes
Jan 25, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
2.0.0 (January 25, 2024)
V2 GA Release 🎉🎉
New commands
okta-aws-cli
's functions are encapsulated as (sub)commands e.g.$ okta-aws-cli [sub-command]
web
okta-aws-cli
is not given a command it defaults to this originalweb
command.m2m
debug
Environment variable name changes
A small number of environment variable names have been renamed to be consistent
in the naming convention for
okta-aws-cli
specific names.OKTA_ORG_DOMAIN
OKTA_AWSCLI_ORG_DOMAIN
OKTA_OIDC_CLIENT_ID
OKTA_AWSCLI_OIDC_CLIENT_ID
OKTA_AWS_ACCOUNT_FEDERATION_APP_ID
OKTA_AWSCLI_AWS_ACCOUNT_FEDERATION_APP_ID
Process credential provider output as JSON
Emits IAM temporary credentials as JSON in process
credentials
format.
Execute follow-on command
Instead of scripting and/or eval'ing
okta-aws-cli
into a shell and thenrunning another command have
okta-aws-cli
run the command directly passingalong the IAM credentials as environment variables.
Collect all roles for all AWS Fed Apps (IdP) at once
okta-aws-cli web
will collect all available AWS IAM Roles for all Okta AWSFederation apps (IdP) at once. This is a feature specific to writing the
$HOME/.aws/credentials
file. Roles will be AWS account alias name (if STS listaliases is available on the given role) then
-
then abbreviated role name.Alternate web browser open command
The
web
command will open the system's default web browser when the--open-browser
flag is present. It is convenient to have the browser open on aseparate profile. If the command to open the browser is known for the host
system an alternate open command can be specified.
Windows examples
Friendly label matching with regular expressions
Friendly label matching for IdPs and Roles with
$HOME/.okta/okta.yaml
file canbe regular expressions.
Example: your organization uses the same role naming convention across many
different AWS accounts: