Skip to content

Releases: kubernetes-sigs/aws-iam-authenticator

v0.5.5

17 Feb 17:53
85e5098
Compare
Choose a tag to compare

Changelog

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.5
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.5-arm64
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.5-amd64

v0.5.4

04 Feb 20:31
83bb933
Compare
Choose a tag to compare
v0.5.4 Pre-release
Pre-release

Release v0.5.4

Docker Images

Please use release v0.5.5

v0.5.3

29 Apr 17:53
a0516fb
Compare
Choose a tag to compare

Changelog

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.3-debian-jessie
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.3-alpine-3.7
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.3-debian-stretch
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.3-amazonlinux-2
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.3-alpine-3.6
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.3-scratch

v0.5.2

07 Oct 16:59
292b9b8
Compare
Choose a tag to compare

Changlelog

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-debian-jessie
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-alpine-3.7
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-debian-stretch
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-amazonlinux-2
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-alpine-3.6
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-scratch

v0.5.1

01 Jul 16:43
d7c0b2e
Compare
Choose a tag to compare

Changlelog

  • Update examples/README (#317, @otterley)
  • Changelog gen (#318, @nckturner)
  • Fix CRD mapper blocking all others because caches never sync and revamp backend-mode flag (#303, @wongma7)
  • Update aws-sdk-go to version v1.30.0 (#306, @nckturner)
  • Bump k8s.io/ dependencies to 1.16.8 (#305, @wongma7)
  • chown aws-iam-authenticator to avoid permission denied (#302, @wongma7)
  • Indentation and unit test improvements (#298, @bhagwat070919)
  • Adding Rate limiting ec2:DescribeInstances API along with Batching for high TPS (#292, @bhagwat070919)
  • Restrict ClusterRole to readonly IAMIdentityMapping access (#287, @rifelpet)
  • added selector to spec and changed from extenstions to apps/v1 (#291, @andarob)
  • Add AWS AccessKeyID as an extra field in UserInfo (#286, @pepov)
  • Allow server port customization (#278, @diversario)

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-debian-jessie
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-alpine-3.7
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-debian-stretch
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-amazonlinux-2
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-alpine-3.6
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-scratch

v0.5.1-alpha.1

15 May 07:48
6e9918f
Compare
Choose a tag to compare
v0.5.1-alpha.1 Pre-release
Pre-release

Changelog

  • Fix CRD mapper blocking all others because caches never sync and revamp backend-mode flag (#303, @wongma7)
  • Update aws-sdk-go to version v1.30.0 (#306, @nckturner)
  • Bump k8s.io/ dependencies to 1.16.8 (#305, @wongma7)
  • chown aws-iam-authenticator to avoid permission denied (#302, @wongma7)
  • Indentation and unit test improvements (#298, @bhagwat070919)
  • Adding Rate limiting ec2:DescribeInstances API along with Batching for high TPS (#292, @bhagwat070919)
  • Restrict ClusterRole to readonly IAMIdentityMapping access (#287, @rifelpet)
  • added selector to spec and changed from extenstions to apps/v1 (#291, @andarob)
  • Add AWS AccessKeyID as an extra field in UserInfo (#286, @pepov)
  • Allow server port customization (#278, @diversario)

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-alpha.1-amazonlinux-2
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-alpha.1-scratch
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-alpha.1-alpine-3.7
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-alpha.1-debian-jessie
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-alpha.1-alpine-3.6
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.1-alpha.1-debian-stretch

v0.5.0

24 Jan 01:35
1cfe2a9
Compare
Choose a tag to compare

Changelog

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.0-debian-jessie
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.0-alpine-3.7
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.0-debian-stretch
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.0-amazonlinux-2
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.0-alpine-3.6
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.0-scratch

v0.4.0

19 Apr 23:42
c141eda
Compare
Choose a tag to compare
  • Update aws-sdk version to 1.19.11 (#216, @nckturner)
  • Add credentials cache for expiring credentials (#193, @llamahunter)
  • Support Global Different Region STS Endpoints (#173, @sunfuze)
  • Add expiration to token creation. (#160, @nckturner)
  • Log STS response on successful authentication. (#161, @nckturner)
  • Allow session names to be forwarded with --forward-session-name. (#134, @jrnt30)
  • Add output format option for verify command. (#126, @joshkurz)
  • Add flags to configure the address and port to allow running the server locally. (#124, @christopherhein)
  • Add a flag to only output the token. (#122, @christopherhein)
  • Add --log-format server flag to configure output format. (#73, @phillipj)
  • Build release for windows. (#113, acaire)
  • Add support for ARNs with paths. (#103, @mattlandis)
  • GetWithSTS and GetWithRoleForSession added to Generator interface to allow tools integrating with Authenticator to pass an existing STS client or existing session. (#101, @errordeveloper)

Docker images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.4.0-alpine-3.7
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.4.0-debian-stretch
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.4.0-alpine-3.6
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.4.0-scratch
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.4.0
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.4.0-alpine
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.4.0-debian
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.4.0-debian-jessie

v0.4.0-alpha.3

12 Apr 19:13
bf5937e
Compare
Choose a tag to compare
v0.4.0-alpha.3 Pre-release
Pre-release
  • Update aws-sdk version to 1.19.11 (#216, @nckturner)
  • Add credentials cache for expiring credentials (#193, @llamahunter)
  • Support Global Different Region STS Endpoints (#173, @sunfuze)
  • Add expiration to token creation. (#160, @nckturner)
  • Log STS response on successful authentication. (#161, @nckturner)
  • Allow session names to be forwarded with --forward-session-name. (#134, @jrnt30)
  • Add output format option for verify command. (#126, @joshkurz)
  • Add flags to configure the address and port to allow running the server locally. (#124, @christopherhein)
  • Add a flag to only output the token. (#122, @christopherhein)
  • Add --log-format server flag to configure output format. (#73, @phillipj)
  • Build release for windows. (#113, acaire)
  • Add support for ARNs with paths. (#103, @mattlandis)
  • GetWithSTS and GetWithRoleForSession added to Generator interface to allow tools integrating with Authenticator to pass an existing STS client or existing session. (#101, @errordeveloper)

Docker images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:0.4.0-alpha.3-debian-stretch
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:0.4.0-alpha.3-scratch
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:0.4.0-alpha.3-alpine-3.7
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:0.4.0-alpha.3-debian
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:0.4.0-alpha.3-alpine-3.6
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:0.4.0-alpha.3
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:0.4.0-alpha.3-alpine
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:0.4.0-alpha.3-debian-jessie

v0.4.0-alpha.1

22 Oct 17:20
82544ec
Compare
Choose a tag to compare
v0.4.0-alpha.1 Pre-release
Pre-release
  • Log STS response on successful authentication. (#161, @nckturner)
  • Add expiration to token creation. (#160, @nckturner)
  • Allow session names to be forwarded with --forward-session-name. (#134, @jrnt30)
  • Add output format option for verify command. (#126, @joshkurz)
  • Add flags to configure the address and port to allow running the server locally. (#124, @christopherhein)
  • Add a flag to only output the token. (#122, @christopherhein)
  • Build release for windows. (#113, acaire)
  • Add support for ARNs with paths. (#103, @mattlandis)
  • GetWithSTS and GetWithRoleForSession added to Generator interface to allow tools integrating with Authenticator to pass an existing STS client or existing session. (#101, @errordeveloper)
  • Add --log-format server flag to configure output format. (#73, @phillipj)

Docker images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 894847497797)
  • docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-alpine-3.6
  • docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-alpine-3.7
  • docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-scratch
  • docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-debian-stretch
  • docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-alpine
  • docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1
  • docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-debian
  • docker pull 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-iam-authenticator:0.4.0-alpha.1-debian-jessie