From b9e650a147664e2546cb179ba8e5b50e9a8fb589 Mon Sep 17 00:00:00 2001 From: Julio Guerra Date: Wed, 2 Sep 2020 11:12:52 +0200 Subject: [PATCH] doc: v0.14 changelog --- .github/workflows/system-tests.yaml | 3 +-- CHANGELOG.md | 32 ++++++++++++++++++++++------- internal/version/version.go | 2 +- 3 files changed, 27 insertions(+), 10 deletions(-) diff --git a/.github/workflows/system-tests.yaml b/.github/workflows/system-tests.yaml index f4ad3528..50b6a0a6 100644 --- a/.github/workflows/system-tests.yaml +++ b/.github/workflows/system-tests.yaml @@ -1,7 +1,7 @@ name: System Tests on: push: - branches: [ 'feature/*', 'fix/*' ] + branches: [ 'master', 'dev', 'hotfix/*', 'release/*', 'feature/*', 'fix/*' ] jobs: # Run system tests when the PR is no longer a draft system-tests: @@ -11,7 +11,6 @@ jobs: steps: - name: Run System Tests uses: felixp8/dispatch-and-wait@v0.1.0 - #uses: peter-evans/repository-dispatch@v1 with: token: ${{ secrets.GH_TOKEN }} owner: sqreen diff --git a/CHANGELOG.md b/CHANGELOG.md index fe4d0f72..2cd86ca5 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,3 +1,21 @@ +# v0.14.0 - 2 September 2020 + +## New Feature + +- (#142) RASP: add Shellshock protection support. This protection is currently + attached to `os.StartProcess()` which is the common function of the Go + standard library to execute a process. This protection can be configured at + . + +## Fixes + +- (#145) In-App WAF: always recover from panics as this in the way the `reflect` + package handles usage errors. + +- (#144) Backend client: avoid dropping HTTP traces in case of `Host` header + parsing errors. + + # v0.13.0 - 24 July 2020 ## New Feature @@ -80,21 +98,21 @@ ## New Features -- (#119) RASP: add Shell Injection protection support. This protection is currently dynamically applied to `os.StartProcess()` which is the only entry point of the Go standard library to execute a process. This protection can be configured at https://my.sqreen.com/application/goto/modules/rasp/details/shi. +- (#119) RASP: add Shell Injection protection support. This protection is currently dynamically applied to `os.StartProcess()` which is the only entry point of the Go standard library to execute a process. This protection can be configured at . -- (#119) RASP: add Local File Inclusion protection support. This protection is currently dynamically applied to `os.Open()` which is the only entry point of the Go standard library to open a file for reading. This protection can be configured at https://my.sqreen.com/application/goto/modules/rasp/details/lfi. +- (#119) RASP: add Local File Inclusion protection support. This protection is currently dynamically applied to `os.Open()` which is the only entry point of the Go standard library to open a file for reading. This protection can be configured at . -- (#120) RASP: add Server-Side Request Forgery protection support. This protection is currently dynamically applied to `net/http.(*Client).do()` which is the only entry point of the Go standard library to perform an HTTP request. This protection can be configured at https://my.sqreen.com/application/goto/modules/rasp/details/ssrf. +- (#120) RASP: add Server-Side Request Forgery protection support. This protection is currently dynamically applied to `net/http.(*Client).do()` which is the only entry point of the Go standard library to perform an HTTP request. This protection can be configured at . -- (#125) RASP: enable SQL Injection protection for every MySQL, Oracle, SQLite and PostgreSQL drivers listed in the Go language wiki page https://github.com/golang/go/wiki/SQLDrivers. +- (#125) RASP: enable SQL Injection protection for every MySQL, Oracle, SQLite and PostgreSQL drivers listed in the Go language wiki page . - (#115) RASP: store Sqreen's request protection context into the Goroutine Local Storage (GLS). Therefore, Sqreen can now protect every Go function without requiring the request Go context (eg. both `QueryContext()` and `Query()` can be now protected against SQL injections). For now, this protection context is only available in the goroutine handling the request, and sub-goroutines are not protected. Further support will be added very soon to remove this limitation. -- (#121) Add IP denylist support: block every request performed by an IP address of the denylist. Every usage of whitelist and blacklist in the agent was also removed when possible. The IP denylist can be configured at https://my.sqreen.com/application/goto/settings/denylist. +- (#121) Add IP denylist support: block every request performed by an IP address of the denylist. Every usage of whitelist and blacklist in the agent was also removed when possible. The IP denylist can be configured at . -- (#122) Add path passlist support: requests performed on those paths are not monitored nor protected by Sqreen. The Path passlist can be configured at https://my.sqreen.com/application/goto/settings/passlist. +- (#122) Add path passlist support: requests performed on those paths are not monitored nor protected by Sqreen. The Path passlist can be configured at . -- (#123) Export the error type returned by Sqreen protections when blocking in the new SDK package `github.com/sqreen/go-agent/sdk/types` in order to avoid retrying blocked function calls (eg. avoid retrying a blocked SQL query). It must be used along with `errors.As()` to detect such cases. Read more at https://godoc.org/github.com/sqreen/go-agent/sdk/types. +- (#123) Export the error type returned by Sqreen protections when blocking in the new SDK package `github.com/sqreen/go-agent/sdk/types` in order to avoid retrying blocked function calls (eg. avoid retrying a blocked SQL query). It must be used along with `errors.As()` to detect such cases. Read more at . - (#124) Allow to "quickly" remove the agent from a program by only removing it from the source code without disabling the program instrumentation. This is made possible by making the instrumentation fully autonomous to avoid compilation errors. diff --git a/internal/version/version.go b/internal/version/version.go index fba69777..ed67d508 100644 --- a/internal/version/version.go +++ b/internal/version/version.go @@ -4,6 +4,6 @@ package version -const version = "0.13.0" +const version = "0.14.0" func Version() string { return version }