Releases: britive/python-cli
Releases · britive/python-cli
v1.8.0rc2
v1.8.0rc2 [2024-06-07]
What's New:
- Added a new global config setting for CA bundle certificates.
Enhancements:
- Added new
ca_bundle
global setting for user provided CA bundle certs.
Bug Fixes:
- Switched
pybritive-kube-exec
to full path in for kube config.
Dependencies:
britive>=2.25.0rc4
Other:
- None
v1.8.0rc1
v1.8.0rc1 [2024-06-03]
What's New:
- Support for step up MFA/OTP when performing a
checkout
, using the--otp
flag.
Enhancements:
- None
Bug Fixes:
- Fixed
python3.7
compatibility issues. - Removed unexpected keyword argument from
hashlib.sha512
calls.
Dependencies:
britive>=2.25.0rc3
- Moved to minimally freezing dependencies.
Other:
- Documentation linting/conformity updates.
- Python linting changes.
- Resolve dependabot issue dependabot/7.
- Testing updates for
python3.7
compatability and warn when API token is present instead of fail.
v1.7.0
What's New
- Display system announcement/banner if one is present for the tenant
- Support for OpenShift checkout modes
os-oclogin
andos-ocloginexec
. These checkout modes will perform the OIDC authorization code grant flow and extraction of theoc login
command in code vs. having to use the browser. It is a "best effort" approach as the OpenShift login pages and programmatic access pages could change over time.
Enhancements
- New checkout mode of
gcloudauthexec
which will invoke, via sub-shell, thegcloud auth activate-service-account
command to switch credentials forgcloud
. Additionally, acheckin
will reset this configuration. - Adds 3 part profile name for command
ls profiles -f json
- #141
Bug Fixes
- Fix issue related to the
cache
andclear
commands when no global default tenant is set - Fixes issue with
--force-renew
oncheckout
not providing the--console
flag properly tocheckin
- Flag
-p
was being used by--maxpolltime
and--passphrase
for commandcheckout
. Switched--maxpolltime
to-x
.
Dependencies
britive>=2.24.0
- Removal of
pkg_resources
dependency
Other
- Documentation updates for
--federation-provider
andspacelift
- Documentation update for Azure Managed Identities
- Introduction of
__version__
in__init.py__
- Re-enabling the system banner/announcement logic
v1.7.0rc3
What's New
- Support for OpenShift checkout modes
os-oclogin
andos-ocloginexec
. These checkout modes will perform the OIDC authorization code grant flow and extraction of theoc login
command in code vs. having to use the browser. It is a "best effort" approach as the OpenShift login pages and programmatic access pages could change over time.
Enhancements
- Adds 3 part profile name for command
ls profiles -f json
- #141
Bug Fixes
- Fixes issue with
--force-renew
oncheckout
not providing the--console
flag properly tocheckin
- Flag
-p
was being used by--maxpolltime
and--passphrase
for commandcheckout
. Switched--maxpolltime
to-x
.
Dependencies
britive>=2.24.0rc5
- Removal of
pkg_resources
dependency
Other
- Documentation updates for
--federation-provider
andspacelift
- Documentation update for Azure Managed Identities
- Introduction of
__version__
in__init.py__
- Re-enabling the system banner/announcement logic
v1.7.0rc2
v1.7.0rc1
What's New
- Display system announcement/banner if one is present for the tenant
Enhancements
- New checkout mode of
gcloudauthexec
which will invoke, via sub-shell, thegcloud auth activate-service-account
command to switch credentials forgcloud
. Additionally, acheckin
will reset this configuration.
Bug Fixes
- Fix issue related to the
cache
andclear
commands when no global default tenant is set
Dependencies
britive>=2.24.0rc1
Other
- None
v1.6.1rc6
v1.6.1
What's New
- None
Enhancements
- None
Bug Fixes
- Fixes issue when an authentication token has been invalidated on the server side by discarding local credentials and re-authenticating
- Send proper logout type based on the type of user (local or SAML)
Dependencies
- None
Other
- Additional debug logging related to the authentication process
- Remove logic for "safe token expiration" now that CLI and Browser tokens are shared
- Switch to extracting expiration time from the JWT instead of calculating based on auth time + session duration