v0.4.4
Added
pcc secrets image-pull-secretnow supports updating existing image pull secrets. Previously, updating required deleting and recreating the secret. The command prompts for confirmation before overwriting; use--skipto bypass the prompt in scripts.
Changed
-
--show-cli-confignow redactstokenandrefresh_tokenvalues in output. A type prefix (e.g.pcc_pat_****) is shown for diagnostics. Users who need raw values can read the config file directly. -
pcc auth use-patnow reads the token from a secure hidden prompt instead of a positional argument. The positional form still works but emits a deprecation warning (tokens passed as arguments are visible in shell history and process listings). -
OAuth callback server now binds to
127.0.0.1instead oflocalhostto prevent DNS rebinding attacks.
Fixed
-
pcc auth logoutno longer claims "session revoked" when server-side revocation was not confirmed. It now accurately reports what succeeded. -
pcc auth logoutno longer crashes if the credentials file is already absent. -
Fixed
organizations_current()fallback returning the wrong data shape when no specific org is requested. -
OIDC discovery metadata is now validated before use: issuer must match expected value, endpoints must use HTTPS, and PKCE S256 support is verified when advertised.
-
Credentials are now written atomically (write to temp file, fsync, rename) to prevent corruption from interrupted writes. File permissions are restrictive from creation.