diff --git a/_service b/_service
index 25f01c0..011bd05 100644
--- a/_service
+++ b/_service
@@ -4,7 +4,7 @@
git
disable
.git
- v17.0.5
+ v17.1.0
v*
@PARENT_TAG@
v(.*)
diff --git a/teleport-17.0.5.obscpio b/teleport-17.0.5.obscpio
deleted file mode 100644
index 555c9ef..0000000
--- a/teleport-17.0.5.obscpio
+++ /dev/null
@@ -1,3 +0,0 @@
-version https://git-lfs.github.com/spec/v1
-oid sha256:6b58beee5a08deb0626d5d090b84b866a9adbfcfa97610a8ab72a3383c25186f
-size 269946382
diff --git a/teleport-17.1.0.obscpio b/teleport-17.1.0.obscpio
new file mode 100644
index 0000000..2f716fa
--- /dev/null
+++ b/teleport-17.1.0.obscpio
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:22ac033196f4dff652bf89cdcd7e9b5eafcbfb6b5fb1a86cb6dea6a8981a4515
+size 271273998
diff --git a/teleport.changes b/teleport.changes
index 75086f2..1ecd404 100644
--- a/teleport.changes
+++ b/teleport.changes
@@ -1,3 +1,69 @@
+-------------------------------------------------------------------
+Fri Dec 20 06:01:30 UTC 2024 - Johannes Kastl
+
+- update to 17.1.0:
+ * Access requests support for AWS Identity Center AWS Identity
+ Center integration now allows users to request short or long
+ term access to permission sets via Access Requests.
+ * Database access for PostgreSQL via web UI Database access users
+ can now connect to PostgreSQL databases connected to Teleport
+ right from the web UI and use psql-style interface to query the
+ database.
+ * Hosted email plugin for Access Requests Users now have the
+ ability to setup Mailgun or generic SMTP server for Access
+ Request notifications using Teleport web UI without needing to
+ self-host the email plugin.
+ * Multi-port support for VNet Users now supports multiple ports
+ (or a range of ports) with a single TCP application, and
+ Teleport VNet will make all of the application's ports
+ accessible on the virtual network.
+ * Graphical Role Editor Teleport's web UI includes a new role
+ editor that allows users to create and modify roles without
+ resorting to a raw YAML editor.
+ * Granular SSH port forwarding controls Teleport now allows
+ cluster administrators to enable local and remote port
+ forwarding separately rather than grouping both types of port
+ forwarding behind a single option.
+ * Other improvements and fixes
+ - Fixed an issue that could cause some antivirus tools to block
+ Teleport's Device Trust feature on Windows machines. #50453
+ - Updates the UI login redirection service to honor redirection
+ to enterprise/saml-idp/sso path even if user is already
+ authenticated with Teleport. #50442
+ - Reduced cluster state storage load in clusters with a large
+ amount of resources. #50430
+ - Updated golang.org/x/net to v0.33.0 (addresses
+ CVE-2024-45338). #50397
+ - Fixed an issue causing panics in SAML app or OIDC integration
+ deletion relating to AWS Identity Center integration. #50360
+ - Fix missing roles in Access Lists causing users to be locked
+ out of their account. #50298
+ - Added support for connecting to PostgreSQL databases using
+ WebUI. #50287
+ - Improved the performance of Teleport agents serving a large
+ number of resources in Kubernetes. #50279
+ - Improve performance of Kubernetes App Auto Discover. #50269
+ - Added more granular access controls for SSH port forwarding.
+ Access to remote or local port forwarding can now be
+ controlled individually using the new ssh_port_forwarding
+ role option. #50241
+ - Properly close ssh port forwarding connections to prevent
+ requests hanging indefinitely. #50238
+ - Teleport's RDP client now sets the load balancing cookie to
+ improve compatibility with local traffic managers. #50226
+ - Fixes an intermittent EKS authentication failure when dealing
+ with EKS auto-discovery. #50197
+ - Expose /.well-known/jwks-okta public endpoint for Okta API
+ services type App. #50177
+ - Switched to a new role editor UI. #50030
+ - Added support for multiple ports to TCP applications. #49711
+ - Allow multiple consecutive occurrences of - and . in SSH
+ server hostnames. #50410
+ - Fixed bug causing users to see notifications for their own
+ access requests in some cases. #50076
+ - Improved the cluster initialization process's ability to
+ recovery from errors. #49966
+
-------------------------------------------------------------------
Thu Dec 12 05:56:48 UTC 2024 - Johannes Kastl
diff --git a/teleport.obsinfo b/teleport.obsinfo
index 0cda497..45446bf 100644
--- a/teleport.obsinfo
+++ b/teleport.obsinfo
@@ -1,4 +1,4 @@
name: teleport
-version: 17.0.5
-mtime: 1733948920
-commit: 7cc4c2a0fc54fb120a8a19f86f0acfc1d0c703a8
+version: 17.1.0
+mtime: 1734646631
+commit: 6e777d4bdbdafb186f1a89d81e6d19a641833ea9
diff --git a/teleport.spec b/teleport.spec
index 367817d..8fab092 100644
--- a/teleport.spec
+++ b/teleport.spec
@@ -17,7 +17,7 @@
Name: teleport
-Version: 17.0.5
+Version: 17.1.0
Release: 0
Summary: Identity-aware, multi-protocol access proxy
License: AGPL-3.0-only
@@ -32,7 +32,7 @@ Source5: tbot.yaml
# Rust vendoring
Source6: vendor.tar.zst
BuildRequires: bash-completion
-BuildRequires: cargo >= 1.69
+BuildRequires: cargo >= 1.82
BuildRequires: cargo-packaging
BuildRequires: git-core
BuildRequires: go >= 1.23.4
diff --git a/vendor.tar.gz b/vendor.tar.gz
index 3ac94e3..7940802 100644
--- a/vendor.tar.gz
+++ b/vendor.tar.gz
@@ -1,3 +1,3 @@
version https://git-lfs.github.com/spec/v1
-oid sha256:ebdad2e2087395d064974c5caf74072822ed5e00d5716dfe7503dbf0bb99149e
-size 52366716
+oid sha256:c1a16c187a3e6bf9f1cc751000dc93157d4e31c2fdf480b1f4161f7adab8ce4e
+size 52390877
diff --git a/vendor.tar.zst b/vendor.tar.zst
index a1f1761..c95c06d 100644
--- a/vendor.tar.zst
+++ b/vendor.tar.zst
@@ -1,3 +1,3 @@
version https://git-lfs.github.com/spec/v1
-oid sha256:fc1f6509fcf52fdf9a443e93378bbc2b4dc036fe17e2a6a904ef3814ab0874b5
-size 728384
+oid sha256:f419338524a67c2d88d51129f4f065d34e3cee4a5cb729d2f9529f3d20c94203
+size 729189