Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump github.com/spiffe/spire from 0.10.0 to 1.0.3 #8

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Jan 12, 2022

Bumps github.com/spiffe/spire from 0.10.0 to 1.0.3.

Release notes

Sourced from github.com/spiffe/spire's releases.

v1.0.3

Security

v1.0.2

Added

  • Experimental support for custom authorization policies based on Open Policy Agent (OPA) (#2416)
  • SPIRE Server can now be configured to emit audit logs (#2297, #2391, #2394, #2396, #2442, #2458)
  • Envoy SDS v3 API in agent now supports the SPIFFE Certificate Validator for federated SPIFFE authentication (#2435, #2460)
  • SPIRE OIDC Discovery Provider now intelligently handles host headers (#2404, #2453)
  • SPIRE OIDC Discovery Provider can now serve over HTTP using the allow_insecure_scheme setting (#2404)
  • Metrics configuration options to filter out metrics and labels (#2400)
  • The k8s-workload-registrar now supports identity template based workload registration (#2417)
  • Enhancements in filtering support in server APIs (#2467, #2463, #2464, #2468)
  • Improvements in logging of errors in peertracker (#2469)

Changed

  • CRD mode of the k8s-workload-registrar now uses SPIRE certificates for the validating webhook (#2321)
  • The vault UpstreamAuthority plugin now continues retrying to renew tokens on failures until the lease time is exceeded (#2445)

Fixed

  • Fixed a nil pointer dereference when the deprecated allow_unsafe_ids setting was configured (#2477)

Deprecated

  • The SPIRE OIDC Discovery Provider domain configurable has been deprecated in favor of domains (#2404)

v1.0.1

Added

  • LDevID-based TPM attestation can now be performed via a new tpm_devid NodeAttestor plugin (#2111, #2427)
  • Caller details are now logged for unauthorized Server API calls (#2399)
  • The aws_iid NodeAttestor plugin now supports attesting nodes across multiple AWS accounts via AWS IAM role assumption (#2387)
  • Added support for running the k8s_sat NodeAttestor plugin with Kubernetes v1.21 (#2423)
  • Call counter metrics are now emitted for SPIRE Server rate limiters (#2422)
  • SPIRE Server now logs a message on startup when configured TTL values may result in SVIDs with a shorter lifetime than expected (#2284)

Changed

  • Updated a trust domain validation error message to mention that underscores are valid trust domain characters (#2392)

Fixed

  • Fixed bugs that broke the ACME bundle endpoint when using the aws_kms KeyManager plugin (#2390, #2397)
  • Fixed a bug that resulted in SPIRE Agent sending unnecessary updates over the Workload API (#2305)
  • Fixed a bug in the k8s_psat NodeAttestor plugin that prevented it from being configured with kubeconfig files (#2421)

v1.0.0

Added

  • The vault UpstreamAuthority plugin now supports Kubernetes service account authentication (#2356)
  • A new cert-manager UpstreamAuthority plugin is now available (#2274)
  • SPIRE Server CLI can now be used to ban agents (#2374)
  • SPIRE Server CLI now has count subcommands for agents, entries, and bundles (#2128)
  • SPIRE Server can now be configured for SPIFFE federation using the configurables defined by the spec (#2340)

... (truncated)

Changelog

Sourced from github.com/spiffe/spire's changelog.

[1.0.3] - 2022-01-07

Security

[1.0.2] - 2021-09-02

Added

  • Experimental support for custom authorization policies based on Open Policy Agent (OPA) (#2416)
  • SPIRE Server can now be configured to emit audit logs (#2297, #2391, #2394, #2396, #2442, #2458)
  • Envoy SDS v3 API in agent now supports the SPIFFE Certificate Validator for federated SPIFFE authentication (#2435, #2460)
  • SPIRE OIDC Discovery Provider now intelligently handles host headers (#2404, #2453)
  • SPIRE OIDC Discovery Provider can now serve over HTTP using the allow_insecure_scheme setting (#2404)
  • Metrics configuration options to filter out metrics and labels (#2400)
  • The k8s-workload-registrar now supports identity template based workload registration (#2417)
  • Enhancements in filtering support in server APIs (#2467, #2463, #2464, #2468)
  • Improvements in logging of errors in peertracker (#2469)

Changed

  • CRD mode of the k8s-workload-registrar now uses SPIRE certificates for the validating webhook (#2321)
  • The vault UpstreamAuthority plugin now continues retrying to renew tokens on failures until the lease time is exceeded (#2445)

Fixed

  • Fixed a nil pointer dereference when the deprecated allow_unsafe_ids setting was configured (#2477)

Deprecated

  • The SPIRE OIDC Discovery Provider domain configurable has been deprecated in favor of domains (#2404)

[1.0.1] - 2021-08-05

Added

  • LDevID-based TPM attestation can now be performed via a new tpm_devid NodeAttestor plugin (#2111, #2427)
  • Caller details are now logged for unauthorized Server API calls (#2399)
  • The aws_iid NodeAttestor plugin now supports attesting nodes across multiple AWS accounts via AWS IAM role assumption (#2387)
  • Added support for running the k8s_sat NodeAttestor plugin with Kubernetes v1.21 (#2423)
  • Call counter metrics are now emitted for SPIRE Server rate limiters (#2422)
  • SPIRE Server now logs a message on startup when configured TTL values may result in SVIDs with a shorter lifetime than expected (#2284)

Changed

  • Updated a trust domain validation error message to mention that underscores are valid trust domain characters (#2392)

Fixed

  • Fixed bugs that broke the ACME bundle endpoint when using the aws_kms KeyManager plugin (#2390, #2397)
  • Fixed a bug that resulted in SPIRE Agent sending unnecessary updates over the Workload API (#2305)
  • Fixed a bug in the k8s_psat NodeAttestor plugin that prevented it from being configured with kubeconfig files (#2421)

[1.0.0] - 2021-07-08

Added

  • The vault UpstreamAuthority plugin now supports Kubernetes service account authentication (#2356)

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/spiffe/spire](https://github.com/spiffe/spire) from 0.10.0 to 1.0.3.
- [Release notes](https://github.com/spiffe/spire/releases)
- [Changelog](https://github.com/spiffe/spire/blob/v1.0.3/CHANGELOG.md)
- [Commits](spiffe/spire@v0.10.0...v1.0.3)

---
updated-dependencies:
- dependency-name: github.com/spiffe/spire
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jan 12, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants