Skip to content

Commit fbc3703

Browse files
authored
Merge pull request #52 from britive/develop
v0.10.0
2 parents 09144ca + 866873d commit fbc3703

File tree

6 files changed

+27
-7
lines changed

6 files changed

+27
-7
lines changed

CHANGELOG.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,22 @@
22

33
All changes to the package starting with v0.3.1 will be logged here.
44

5+
## v0.10.0 [2023-01-18]
6+
#### What's New
7+
* Support Bitbucket as a federation provider
8+
9+
#### Enhancements
10+
* None
11+
12+
#### Bug Fixes
13+
* None
14+
15+
#### Dependencies
16+
* `britive~=2.14.0` from `britive~=2.13.0` - bitbucket federation provider
17+
18+
#### Other
19+
* None
20+
521
## v0.9.2 [2023-01-11]
622
#### What's New
723
* None

docs/index.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,10 +89,11 @@ At feature launch the following types of identity providers are supported for wo
8989
* Open ID Connect (OIDC)
9090
* AWS STS
9191

92-
`pybritive` offers some native integrations with the following services at the launch of this feature.
92+
`pybritive` offers some native integrations with the following services.
9393

9494
* Github Actions
9595
* AWS
96+
* Bitbucket
9697

9798
It is possible to source an identity token from a different OIDC provider and explicitly set it via the `--token\-T` flag.
9899
However, if you are using one of the above providers, a shortcut is provided to abstract away the complexity of sourcing these tokens.
@@ -115,6 +116,9 @@ pybritive checkout "profile" --federation-provider aws # use aws sts without an
115116
pybritive checkout "profile" --federation-provider aws-profile # use aws sts with an AWS CLI profile
116117
pybritive checkout "profile" --federation-provider aws-profile_expirationseconds # use aws sts with an AWS CLI profile and set the Britive expiration (in seconds) of the generated token
117118
pybritive checkout "profile" --federation-provider aws_expirationseconds # use aws sts without an AWS CLI profile and set the Britive expiration (in seconds) of the generated token
119+
120+
# bitbucket (note that no additional options are available for bitbucket)
121+
pybritive checkout "profile" --federation-provider bitbucket
118122
~~~
119123

120124
In general the field format for `--federation-provider` is `provider-[something provider specific]_[duration in seconds]`.

requirements.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
britive~=2.13.0
1+
britive~=2.14.0
22
certifi==2022.6.15
33
charset-normalizer==2.1.0
44
click==8.1.3

setup.cfg

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[metadata]
22
name = pybritive
3-
version = 0.9.2
3+
version = 0.10.0
44
author = Britive Inc.
55
author_email = support@britive.com
66
description = A pure Python CLI for Britive
@@ -26,7 +26,7 @@ install_requires =
2626
toml
2727
cryptography
2828
python-dateutil
29-
britive>=2.13.0
29+
britive>=2.14.0
3030

3131
[options.packages.find]
3232
where = src

src/pybritive/britive_cli.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ def print(self, data: object, ignore_silent: bool = False):
167167

168168
def user(self):
169169
self.login()
170-
username = self.b.my_access.whoami()['user']['username']
170+
username = self.b.my_access.whoami()['username']
171171
alias = self.tenant_alias
172172
output = f'{username} @ {self.tenant_name}'
173173
if alias != self.tenant_name:

src/pybritive/options/federation_provider.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
option = click.option(
44
'--federation-provider', '-P',
55
help='Use a federation provider available in the Britive Python SDK for auto token creation. '
6-
'Valid values are `aws[-profile]` and github[-audience]`. Optionally for the AWS provider a duration'
7-
'in seconds can be provided via `aws[-profile]_durationseconds` after which point the auto-generated'
6+
'Valid values are `aws[-profile]`, `github[-audience], and `bitbucket`. Optionally for the AWS provider a '
7+
'duration in seconds can be provided via `aws[-profile]_durationseconds` after which point the auto-generated'
88
'credentials will expire.',
99
default=None,
1010
show_default=True

0 commit comments

Comments
 (0)