Releases: manifoldco/torus-cli
Releases · manifoldco/torus-cli
v0.30.2
v0.30.1
Fixes
- The spinners released in
v0.30.0can now be disabled by setting the
core.progresspreference to false viatorus prefs set core.progress false. - Fixed a bug where spinners were enabled for sessions not attached to a
terminal such as in a CI environment or on a server. - Fixed a bug where the spinner during
torus run,torus view, ortorus exportwould not be removed resulting in a stuck state for users. - Fixed a bug preventing non-Mac OS X users from setting preferences via
torus prefs set.
v0.30.0
Breaking Changes
The concept of instance and identity as a part of the secret path has been
deprecated. Existing secrets set with non * identity and instance values can
still be set and unset by providing the full 7 segment path (e.g. torus set /org/project/environment/service/identity/instance/secret).
Torus will only display the full 7 segment path if identity or instance is a
non * value (e.g. /org/project/environment/service/machine-api/1/secret).
In all other cases, a 5 segment path will be displayed (e.g.
/org/project/environment/service/secret).
Notable Changes
- The status of your account is now displayed via
torus profile view - When updating your email address via
torus profile updateyou are now
prompted for the verification code to re-verify your account. - More precise errors are returned to users when invalid usernames, org,
project, team, or policy names are submitted to a ui prompt. - The experimental and hidden
policies testcommand has been removed. - Added spinners to represent progress. This means fewer lasting print-outs
for certain commands. - The
user,machine, andinstanceflags have been removed fromtorus set,torus unset,torus import,torus export, andtorus view. - Instance and identity values are no longer displayed via
torus status. torus allowandtorus denynow accept a 5 segment path along with the
deprecated 7 path version (e.g.torus allow crudl /org/project/env/service/secret <team>).torus policies viewwill only display the full 7 segment path if the
identityoridentitycomponents are not a*.torus viewandtorus listwill only display the full 7 segment path in
verbose mode if theinstanceandidentitycomponents are not a*.- Added
--team, -tflag totorus list - The current org, project, environment, and service is now injected into the
process started bytorus run.
Fixes
torus orgs removewill now prompt the user to confirm the action before proceedtorus machines destroyandtorus unsetwill default to No instead of Yes
when prompting the user to confirm the action.- When asking for a user's complete name, we now refer to it as
Full Name
instead ofFullname torus listdid not display secrets which were not set with an instance of*.
Build
- Torus is now built using
go1.10
v0.29.0
2017-12-22
Notable Changes
- Redesigned the output of
viewand removed the--formatflag. - Updated formatting and flags of
envs list,services list,invites list,
machines list,machines view,policies listandpolicies view. - Added styling, color and org/project prompts throughout commands. Colors can
be disable by runningtorus prefs set core.colors false.
v0.28.1
Fixes
- Torus will only print out secondary information such as when it's attempting
to authenticate using credentials fromTORUS_EMAIL,TORUS_PASSWORD,
TORUS_TOKEN_ID, andTORUS_TOKEN_SECRETif stdout is attached to a
terminal window.
v0.28.0
Notable Changes
- Introduced command
orgs members --org ORGto list all members within an
organization. - Changed the output style of
teams membersto match the output style of
orgs members --org ORG. - Introduced the
torus exportcommand making it easy to export secrets from a
specific environment and service. As a result thetorus view--format, -f
flas has been deprecated and will be removed on December 31st 2017. - Using
torus export, you can now export secrets to terraform'stfvarsfile format. - Encryption keys, user passwords, and machine secret tokens are now stored in
secure and guarded memory making it more difficult to extract data from a
running process. - Replaced
torus lswithtorus listmaking it easy to list and search for secrets within a project. Listing secrets is now twice as fast astorus ls.
Fixes
- Fixed a bug preventing old credential values from being decrypted.
- Previously, expiration of a key was set to be one year, instead, we've set it
to be three. This fixes a bug which prevented users from setting secrets as
their keys had expired. A corresponding change was made to the torus server.
v0.27.0
Notable Changes
- Significant performance increases when secrets are sourced from multiple
keyrings. For example if a secret is brought in fromdev-*anddev-user
Torus will no longer unseal the private encryption key twice which leads to a
signficiant reduction in decryption time. Users should notice this
improvement when usingtorus viewandtorus run. - Significant reduction in the number of round trips made to the Torus server
to fetch an organizations claimtree (web of trust) when decrypting or
encrypting secrets. Users should notice this improvement when many different
users are contributing secrets to the same keyrings when usingtorus view,
torus run,torus set, ortorus unset. - Parallelized fetching of keypairs and an orgs claimtree during secret
decryption. Users should notice a modest improvement when usingtorus view
andtorus run.
Fixes
- Request timeout to the server has been increased from 6s to 60s.
- Fixed a bug preventing a user's invitation from being approved after a user
was removed from the organization.
v0.26.1
No changelog entry
v0.26.0
Notable Changes
- Introduced
torus policies attachallowing a user to attach a policy to
multiple teams or machine roles. - Introduced
torus policies deleteallowing a user to delete a policy and all
of it's attachment from an org. System policies cannot be deleted. - When generating a policy using
torus allowortorus denyyou can now
specify it's name and description using the--nameand--description
flags. If no description is provided, one will be generated.
Fixes
- Clarify the behaviour of the
--environment,--service,--instance,
--user, and--machineflags when reading or writing secrets.
v0.25.2
2017-10-19
Fixes
- Fixed a bug preventing Torus from being used once installed via npm on win32.