Identity Federation for AWS 2.4 Release Notes

 

18 February 2016

The Utoolity team is pleased to present Identity Federation for AWS 2.4 – this release adds an Amazon ECR Credentials Variables task to Bamboo for providing temporary Amazon EC2 Container Registry (ECR) authentication credentials to other tools by injecting them via variables into AWS unaware tasks like the Bamboo Docker task, adds a REST API for temporary Amazon EC2 Container Registry (ECR) authentication credentials, and adds support for assuming another IAM role from EC2 instance profile credentials used by an Elastic Bamboo agent.

If you are using Bamboo remote agents, please review the Identity Federation for AWS 2.4 Upgrade Notes for important information about this release.

Highlights

Amazon ECR Credentials Variables task for Bamboo

Use the Amazon ECR Credentials Variables task in Bamboo to provide temporary Amazon EC2 Container Registry (ECR) authentication credentials for other tools by injecting them into AWS unaware tasks like the Bamboo Docker task.

Use Amazon ECR Credentials with Bamboo Docker task

The most frequent use case for the Amazon ECR Credentials Variables task is to enable the built-in Bamboo Docker task to push images to an Amazon ECR repository - refer to How to push a Docker image to a repository in your Amazon ECR registry with the Bamboo Docker task for details.


Amazon ECR Credentials retrieval via REST API

Retrieve temporary Amazon EC2 Container Registry (ECR) authentication credentials via the REST API so that developers can easily integrate this feature into their own solutions.

Support for assuming another IAM Role from EC2 Instance Profile credentials

The IAM Role for EC2 (Agent) option in the AWS Credentials Variables and Amazon ECR Credentials Variables tasks for Bamboo now supports assuming another IAM role from the EC2 instance profile credentials - this enables various scenarios, notably switching to roles accross your own AWS accounts and third-party.AWS accounts (cross-account IAM roles).

Details

This release addresses the following issues:

  • Stories

    • IFAWS-504 - As a user, I want a task to create Bamboo variables from ECR credentials so that I can reuse them in scripts

    • IFAWS-505 - As a developer, I want an API to GET ECR credentials so that I don't need to derive them myself

    • IFAWS-515 (UAA-74) - As a user, I want to let an instance role assume another role so that EC2 instances can be leveraged for cross-account IAM usage

  • Improvements

    • IFAWS-134 - Add sorting by header to connector table

    • IFAWS-453 - Graduate scalable group selection labs feature

    • IFAWS-477 - Redirect to main configuration screen after configuring labs features

    • IFAWS-495 - Add system usage column to connector table

    • IFAWS-496 - Add IAM read only policy to inline dialog help

    • IFAWS-509 (UAA-132) - Add conditional validation of empty IAM policy for federated users

    • IFAWS-516 - Add missing principal types to duration inline dialog help

  • Bugs

    • IFAWS-497 - Fix default button in account edit dialog not being triggered on return

    • IFAWS-498 - Mitigate missing paging functionality in connector table

    • IFAWS-507 (UAA-135) - Fix typo in generated variables popup BASH (UNIX SHELL) section

  • Tasks

    • IFAWS-467 - Drop support for Bamboo 5.1

    • IFAWS-500 - Drop support for Bamboo 5.2

    • IFAWS-501 - Drop support for Bamboo 5.3

Release 2.4.1

2016-04-11

This release addresses the following issues:

  • Improvements

    • IFAWS-532 (UAA-156) - Add support for additional ECR regions eu-west-1 and us-west-2

    • IFAWS-541 (UAA-150) - Add UI support for surfacing/copying an AWS Connector ID

    • IFAWS-550 - Expand AWS Connector filter scope to additional columns

    • IFAWS-553 - Adjust default AWS Connector sort order to alphabetical by name

  • Bugs

    • IFAWS-521 - Fix CSS alignment mismatch between connector row content and action links

    • IFAWS-529 - Fix spelling of 'Access Key ID'

    • IFAWS-542 (UAA-154) - Fix AWS Connector filter yielding no results

Atlassian®, Atlassian Bamboo®, Bitbucket®, Atlassian Crowd®, Confluence®, Jira®, Jira Service Management™, Opsgenie®, and Statuspage™ are registered trademarks of Atlassian.
Amazon Web Services™, AWS™ and the “Powered by Amazon Web Services” logo are trademarks of Amazon.com, Inc. or its affiliates in the United States and/or other countries.

Utoolity® is a registered trademark of Utoolity GmbH.
© 2024 Utoolity GmbH. All rights reserved.