Skip to content

Releases: spiffe/spire

0.9.1

19 Dec 19:25
f849a24
Compare
Choose a tag to compare
  • Agent cache file writes are now atomic, more resilient (#1267)
  • Introduced Google Cloud Storage bundle notifier plugin for server (#1227)
  • Server and agent now detect unknown configuration options in supported blocks (#1289, #1299, #1306, #1307)
  • Improved agent response to heavy server load through use of request backoffs (#1270)
  • The in-memory telemetry sink can now be disabled, and will be by default in a future release (#1248)
  • Agents will now re-balance connections to servers (and re-resolve DNS) automatically (#1265)
  • Improved behavior of M3 duration telemetry (#1262)
  • Fixed a bug in which MySQL deadlock may occur under heavy attestation load (#1291)
  • KeyManager "disk" now emits a friendly error when directory option is missing (#1313)

0.9.0

14 Nov 19:02
f2a8727
Compare
Choose a tag to compare
  • Users can now opt-out of workload executable hashing when enabling the workload path as a selector (#1078)
  • Added M3 support to telemetry and other telemetry and logging improvements (#1059, #1085, #1086, #1094, #1102, #1122,#1138,#1160,#1186,#1208)
  • SQL auto-migration can be disabled (#1089)
  • SQL schema compatability checks are aligned with upgrade compatability guarantees (#1089)
  • Agent CLI can provide information on attested nodes (#1098)
  • SPIRE can tolerate small SVID expiration periods (#1115)
  • Reduced Docker image sizes by roughly 25% (#1140)
  • The upstream_bundle configurable is deprecated (#1147)
  • Agents can be configured to bootstrap insecurely with SPIRE Servers for ease of evaluation (#1148)
  • The issuer claim in JWT-SVIDs can be customized (#1164)
  • SPIRE Server supports a wider variety of signing key types (#1169)
  • New OIDC discovery provider that serves a compatible JWKS document with signing keys from the trust domain (#1170,#1175)
  • New Upstream CA plugin that signs SPIRE Server CA CSRs using a Private Ceriticate Authority in AWS Certificate Manager (#1172)
  • Agents respond more predictably when making requests to an overloaded SPIRE Server (#1182)
  • Docker Workload Attestor supports a wider variety of cgroup drivers (#1188)
  • Docker Workload Attestor supports selection based on container environment variables (#1205)
  • Fixed an issue in which Kubernetes workload attestation occasionally fails to identify the caller (#1216)

0.8.4

28 Oct 22:58
1d34b5b
Compare
Choose a tag to compare
  • Fixed spurious agent synchronization failures during agent SVID rotation (#1084)
  • Added support for Kind to the Kubernetes Workload Attestor (#1133)
  • Added support for ACME v2 to the bundle endpoint (#1187)
  • Fixed a bug that could result in agent crashes after upgrading to 0.8.2 or newer (#1194)

0.8.3

18 Oct 21:54
69d5e08
Compare
Choose a tag to compare

0.8.2

10 Oct 00:09
aa6bb82
Compare
Choose a tag to compare
  • Connection pool details in SQL DataStore plugin are now configurable (#1028)
  • SQL DataStore plugin now emits telemetry (#998)
  • The SPIFFE bundle endpoint now supports serving Web PKI via ACME (#1029)
  • Fix Workload API socket permissions when enclosing directory is automatically created (#1048)
  • The Kubernetes PSAT node attestor now emits node and pod label selectors (#1042)
  • SVIDs can now be created directly against SPIRE server using the new mint feature (#1036)
  • SPIRE agent behavior improved to more efficiently balance load across SPIRE servers (#1061)
  • Significant SQL DataStore performance improvements (#1069, #1079)
  • Kubernetes workload registrar now supports assigning SPIFFE IDs based on an annotation (#1047)
  • Registration entries with an expiry set are now automatically pruned from the datastore (#1056)
  • Fix bug that resulted in authorized workloads being denied SVIDs (#1103)

0.8.1

19 Jul 22:07
65b70eb
Compare
Choose a tag to compare
  • Failure to obtain peer information from a Workload API connection no longer brings down the agent (#946)
  • Agent now detects expired cached SVID when it starts and will attempt to re-attest instead of failing (#1000)
  • GCP IIT-based node attestation produces selectors for the project, zone, instance name, tags, service accounts, metadata and labels (#969, #1006, #1012)
  • X.509 certificate serial numbers are now random 128-bit numbers (#999)
  • Added SQL table indexes to SQL datastore to improve query performance (#1007)
  • Improved metrics coverage (#931, #932, #935, #968)
  • Plugins can now emit metrics (#990, #993)
  • GCP CloudSQL support (#995)
  • Experimental support for SPIFFE federation (#951, #983)
  • Fixed a peertracker bug parsing /proc/PID/stat on Linux (#982)
  • Fixed a bug causing occasional panics on shutdown when running on a BSD-based system (#970)
  • Fixed a bug in the unix workload attestor failing attestation if the user or group lookup failed (#973)
  • Server plugins can now query for attested agent information (#964)
  • AWS Secrets UpstreamCA plugin can now authenticate to AWS via a Role ARN (#938, #963)
  • K8S Workload Attestor now works with Docker's systemd cgroup driver (#950)
  • Improved documentation and examples (#915, #916, #918, #926, #930, #940, #941, #948, #954, #955, #1014)
  • Fixed SSH-based node attested agent IDs to be URL-safe (#944)
  • Fixed bug preventing agent bootstrapping when an UpstreamCA is used in conjunction with upstream_bundle = false (#939)
  • Agent now properly handles signing SVIDs for multiple registration entries mapped to the same SPIFFE ID (#929)
  • Agent Node Attestor plugins no longer have to determine the agent ID (#922)
  • GCP IIT node attestor can now be configured with the host used to obtain the token (#917)
  • Fixed race in bundle pruning for HA deployments (#919)
  • Disk UpstreamCA plugin now supports intermediate CAs (#910)
  • Docker workload attestation now retries connections to the Docker deamon on transient failures (#901)
  • New Kubernetes Workload Registrar that automatically registers Kubernetes workloads (#885, #953)
  • Logs can now be emitted in JSON format (#866)

0.8.0

20 May 17:04
c812352
Compare
Choose a tag to compare
  • Fix a bug in which the agent periodically logged connection errors (#906)
  • Kubernetes SAT node attestor now supports the TokenReview API (#904)
  • Agent cache refactored to improve memory management and fix a leak (#863)
  • UpstreamCA "disk" will now reload cert and keys when needed (#903)
  • Introduced Nested SPIRE: server clusters can now be chained together (#890)
  • Fix a bug in AWS IID NodeResolver with instance profile lookup (#888)
  • Improved workload attestation and fixed a security bug related to PID reuse (#886)
  • New Kubernetes bundle notifier for keeping a bundle configmap up-to-date (#877)
  • New plugin type Notifier for programatically taking action on important events (#877)
  • New NodeAttestor based on SSH certificates (#868, #870)
  • v2 client library for Workload API interaction (#841)
  • Back-compat bundle management code removed - bundle is now handled correctly (#858, #859)
  • Plugins can now expose auxiliary services and consume host-based services (#840)
  • Fix bug preventing agent recovery prior to its first SVID rotation (#839)
  • Agent and server can now export telemetry to Prometheus, Statsd, DogStatsd (#817)
  • Fix bug in SDS API that prevented updates following Envoy restart (#820)
  • Kubernetes workload attestor now supports using the secure port (#814)
  • Support for TLS-protected connections to MySQL (#821)
  • X509-SVID can now include an optional CN/DNS SAN (#798)
  • SQL DataStore plugin now supports MySQL (#784)
  • Fix bug preventing agent from reconnecting to a new server after an error (#795)
  • Fix bug preventing agent from shutting down when streams are open (#790)
  • Registration entries can now have an expiry and be pruned automatically (#776, #793)
  • New Kubernetes NodeAttestor based on PSAT for node specificity (#771, #860)
  • New UpstreamCA plugin for AWS secret manager (#751)
  • Healthcheck commands exposed in server and agent (#758, #763)
  • Kubernetes workload attestor extended with additional selectors (#720)
  • UpstreamCA "disk" now supports loading multiple key types (#717)

0.7.3

12 Feb 00:14
81bbb8e
Compare
Choose a tag to compare
  • Agent can now expose Envoy SDS API for TLS certificate installation rotation (#667)
  • Agent now automatically creates its configured data dir if it doesn't exist (#678)
  • Agent panic fixed in the event that rotation is attempted from non-attested node (#684)
  • Docker workload attestor plugin introduced (#687)
  • Agent and Server no longer force a configured umask, upgrades it if too permissive (#686)
  • Registration entry CLI utility now supports --node entry distinction (#695)
  • Server can now evict previously-attested agents (#693)
  • Official docker images are now published on build and release (#700)
  • Server now validates Agent credentials on every API call instead of only when TLS is established (#711)

0.7.2

23 Jan 23:16
Compare
Choose a tag to compare
  • Fix non-random UUID bug by moving to gofrs-maintained uuid pkg (#659)
  • Server now supports multiple node resolvers (#652)
  • Server no longer allows agent to specify X.509 Subject value (#663)
  • Registration API is now authenticated, can be reached remotely (#656)
  • Fixed debug log message in the Node API handler (#666)
  • Agent's KeyManager interface updated for better durability (#669)
  • Use FQDN in the GCP Node Attestor to prevent reliance on shortname resolution (#672)
  • Upgrade to Go 1.11.5 in response to CVE-2019-6486 (#690)

0.7.1

21 Dec 00:04
Compare
Choose a tag to compare
  • Documentation updates for Azure plugins, agent, server (#629, #631, #642, #651, #654)
  • Intermediate certificates now included in bundle for compatibility with 0.6 (#633)
  • Attestation now fails if NodeResolver encounters an error (#634)
  • Fix bootstrap bug when upstream_bundle is not set (#639)
  • Additional telemetry points added, introduced telemetry in server (#640)
  • CLI utilities now print TTL value of default instead of 0 when not set (#645)
  • Fix bug in CLI utilities causing them to write PEM files with the wrong header (#647)
  • Go runtime upgraded in response to CVE-2018-16875 (#653)
  • Server now detects and prevents trust domain configuration change (#644)
  • Fix vulnerability in which X.509 path validation is not performed on node API (#655)