Skip to content

Releases: britive/python-cli

v1.7.0rc3

04 Apr 20:08
2d79348

Choose a tag to compare

What's New

  • Support for OpenShift checkout modes os-oclogin and os-ocloginexec. These checkout modes will perform the OIDC authorization code grant flow and extraction of the oc login command in code vs. having to use the browser. It is a "best effort" approach as the OpenShift login pages and programmatic access pages could change over time.

Enhancements

  • Adds 3 part profile name for command ls profiles -f json - #141

Bug Fixes

  • Fixes issue with --force-renew on checkout not providing the --console flag properly to checkin
  • Flag -p was being used by --maxpolltime and --passphrase for command checkout. Switched --maxpolltime to -x.

Dependencies

  • britive>=2.24.0rc5
  • Removal of pkg_resources dependency

Other

  • Documentation updates for --federation-provider and spacelift
  • Documentation update for Azure Managed Identities
  • Introduction of __version__ in __init.py__
  • Re-enabling the system banner/announcement logic

v1.7.0rc2

19 Jan 14:30
bc7ca00

Choose a tag to compare

What's New

  • None

Enhancements

  • None

Bug Fixes

  • Remove the banner logic as the banner api is not yet available in production

Dependencies

  • None

Other

  • None

v1.7.0rc1

19 Jan 14:08
4c692a5

Choose a tag to compare

What's New

  • Display system announcement/banner if one is present for the tenant

Enhancements

  • New checkout mode of gcloudauthexec which will invoke, via sub-shell, the gcloud auth activate-service-account command to switch credentials for gcloud. Additionally, a checkin will reset this configuration.

Bug Fixes

  • Fix issue related to the cache and clear commands when no global default tenant is set

Dependencies

  • britive>=2.24.0rc1

Other

  • None

v1.6.1rc6

18 Dec 14:33
16d5e12

Choose a tag to compare

What's New

  • None

Enhancements

  • None

Bug Fixes

  • Switch to extracting expiration time from the JWT instead of calculating based on auth time + session duration

Dependencies

  • None

Other

  • Additional debug logging related to the authentication process

v1.6.1

18 Dec 20:09
a807c99

Choose a tag to compare

What's New

  • None

Enhancements

  • None

Bug Fixes

  • Fixes issue when an authentication token has been invalidated on the server side by discarding local credentials and re-authenticating
  • Send proper logout type based on the type of user (local or SAML)

Dependencies

  • None

Other

  • Additional debug logging related to the authentication process
  • Remove logic for "safe token expiration" now that CLI and Browser tokens are shared
  • Switch to extracting expiration time from the JWT instead of calculating based on auth time + session duration

v1.6.1rc5

15 Dec 14:40
2d213c5

Choose a tag to compare

What's New

  • None

Enhancements

  • None

Bug Fixes

  • Switch to extracting expiration time from the JWT instead of calculating based on auth time + session duration

Dependencies

  • None

Other

  • Additional debug logging related to the authentication process

v1.6.1rc4

14 Dec 15:39
8e4c900

Choose a tag to compare

What's New

  • None

Enhancements

  • None

Bug Fixes

  • Remove logic for "safe token expiration" now that CLI and Browser tokens are shared

Dependencies

  • None

Other

  • None

v1.6.1rc3

14 Dec 00:53
83880c6

Choose a tag to compare

What's New

  • None

Enhancements

  • None

Bug Fixes

  • Continuing to troubleshoot the 401 - E0000 login issue.

Dependencies

  • None

Other

  • None

v1.6.1rc2

08 Dec 15:47
55762ab

Choose a tag to compare

What's New

  • None

Enhancements

  • Send proper logout type based on the type of user (local or SAML)

Bug Fixes

  • Fixes issue with user command

Dependencies

  • None

Other

  • Additional logging when entering a login/logout loop

v1.6.1rc1

07 Dec 21:19
cb53c9a

Choose a tag to compare

What's New

  • None

Enhancements

  • None

Bug Fixes

  • Fixes issue when an authentication token has been invalidated on the server side by auto-logging out the user from the CLI and re-authenticating

Dependencies

  • None

Other

  • None