Releases: intel-secl/intel-secl
Releases · intel-secl/intel-secl
v4.2.0-Beta
- Containerized Deployment for FS using Helm
- Registration of specific hosts
- Introduced Helm repo to support Helm based deployment
v4.1.0
v4.0.1
- Fixes build issue with isecl-k8s-controller due to dependency refactoring.
- Refactored intel-secl codebase to reduce effect of nested lower-level dependencies such as
github.com/vmware/govmomi
, which are not required by go-trustagent, workload-agent. - Miscellaneous documentation fixes.
Intel® SecL-DC v3.6.1 GA
Changes for ext push v3.6.1
Intel® SecL-DC V4.0 GA
- Release catering to specific requirements of IoTG (Platform attestation for IOTG’s Trusted Edge Computing platform(TEP) that runs on Tiger Lake)
- Migrated to KMIP Go by removing libkmip C library to have consistent implementation in Go
- Postgres caching changes, which has improved the overall performance by ~50%
- Removal of unused code (S/w mode, removal of Directory Key manager) to meet IPAS recommendation
- Changes to Container Confidentiality using open-source version of Skopeo/CRI-O and removed the dependency on custom solution
- Improvements to SGX verifier app
- Upgrade support from V3.6 to V4.0 (both binary and container upgrade) for seamless migration to the latest version
Intel® SecL-DC v3.6 GA
Foundational/WL Use Cases:
- Containerization Deployment of Foundational and Workload Security Use Cases supported and validated with
RHEL and Ubuntu OS - Added support for pyKMIP integration with Workload Security Use Cases
- Additional performance and scalability improvements
- Common Integration Hub to support both Foundational/WL Use Cases and SKC/SGX Attestation Use Cases
Release notes: https://01.org/sites/default/files/documentation/intel_secl_releasenotes_7.pdf
Documentation: https://github.com/intel-secl/docs/tree/v3.6/develop
Intel(R) SecL-DC Version 3.5 GA
Foundational/WL Use Cases:
- Additional performance and scalability improvements
- Added new filter criteria to the /v2/hosts API. Hosts can now be searched by trust status, and the response data when retrieving host details can now optionally also include the host-status and Trusted state. See the HVS swagger doc for details.
- Host searches will now return data in a consistent order (based on the timestamp when the host was registered), and can be sorted by ascending or descending order. See the HVS Swaggerdoc for details.
- The CLI command "setup server" has been replaced by "setup update-service-config" across all Foundational Security services. See the Product Guide for details.
SKC/ SGX Attestation Use Cases:
- Containerization Deployment of SKC and SGX Attestation Use Cases supported
- Added support for pyKMIP integration with SKC Use Case; See Quick Start Guide for deployment details
- Additional performance and scalability improvements
- Added new filter criteria to the /v2/hosts API. See the HVS Swagger docs for details.
- SGX Sample Application and Verifier Enhancements
Known Issues:
- Sometimes the SGX Compute node may becomes inaccessible after the secure key transfer. See guidance in Product Guide.
- Running SHVS Setup Task after changing a config value fails. See guidance in Product Guide.
v3.4.0
v3.3.1: v3.3/bugs/isecl-13346: add dependency
(cherry picked from commit 3b096f23296a67c283e30244a8f884f9c1ba9568)