diff --git a/_service b/_service index 25f01c0..011bd05 100644 --- a/_service +++ b/_service @@ -4,7 +4,7 @@ git disable .git - v17.0.5 + v17.1.0 v* @PARENT_TAG@ v(.*) diff --git a/teleport-17.0.5.obscpio b/teleport-17.0.5.obscpio deleted file mode 100644 index 555c9ef..0000000 --- a/teleport-17.0.5.obscpio +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:6b58beee5a08deb0626d5d090b84b866a9adbfcfa97610a8ab72a3383c25186f -size 269946382 diff --git a/teleport-17.1.0.obscpio b/teleport-17.1.0.obscpio new file mode 100644 index 0000000..2f716fa --- /dev/null +++ b/teleport-17.1.0.obscpio @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:22ac033196f4dff652bf89cdcd7e9b5eafcbfb6b5fb1a86cb6dea6a8981a4515 +size 271273998 diff --git a/teleport.changes b/teleport.changes index 75086f2..1ecd404 100644 --- a/teleport.changes +++ b/teleport.changes @@ -1,3 +1,69 @@ +------------------------------------------------------------------- +Fri Dec 20 06:01:30 UTC 2024 - Johannes Kastl + +- update to 17.1.0: + * Access requests support for AWS Identity Center AWS Identity + Center integration now allows users to request short or long + term access to permission sets via Access Requests. + * Database access for PostgreSQL via web UI Database access users + can now connect to PostgreSQL databases connected to Teleport + right from the web UI and use psql-style interface to query the + database. + * Hosted email plugin for Access Requests Users now have the + ability to setup Mailgun or generic SMTP server for Access + Request notifications using Teleport web UI without needing to + self-host the email plugin. + * Multi-port support for VNet Users now supports multiple ports + (or a range of ports) with a single TCP application, and + Teleport VNet will make all of the application's ports + accessible on the virtual network. + * Graphical Role Editor Teleport's web UI includes a new role + editor that allows users to create and modify roles without + resorting to a raw YAML editor. + * Granular SSH port forwarding controls Teleport now allows + cluster administrators to enable local and remote port + forwarding separately rather than grouping both types of port + forwarding behind a single option. + * Other improvements and fixes + - Fixed an issue that could cause some antivirus tools to block + Teleport's Device Trust feature on Windows machines. #50453 + - Updates the UI login redirection service to honor redirection + to enterprise/saml-idp/sso path even if user is already + authenticated with Teleport. #50442 + - Reduced cluster state storage load in clusters with a large + amount of resources. #50430 + - Updated golang.org/x/net to v0.33.0 (addresses + CVE-2024-45338). #50397 + - Fixed an issue causing panics in SAML app or OIDC integration + deletion relating to AWS Identity Center integration. #50360 + - Fix missing roles in Access Lists causing users to be locked + out of their account. #50298 + - Added support for connecting to PostgreSQL databases using + WebUI. #50287 + - Improved the performance of Teleport agents serving a large + number of resources in Kubernetes. #50279 + - Improve performance of Kubernetes App Auto Discover. #50269 + - Added more granular access controls for SSH port forwarding. + Access to remote or local port forwarding can now be + controlled individually using the new ssh_port_forwarding + role option. #50241 + - Properly close ssh port forwarding connections to prevent + requests hanging indefinitely. #50238 + - Teleport's RDP client now sets the load balancing cookie to + improve compatibility with local traffic managers. #50226 + - Fixes an intermittent EKS authentication failure when dealing + with EKS auto-discovery. #50197 + - Expose /.well-known/jwks-okta public endpoint for Okta API + services type App. #50177 + - Switched to a new role editor UI. #50030 + - Added support for multiple ports to TCP applications. #49711 + - Allow multiple consecutive occurrences of - and . in SSH + server hostnames. #50410 + - Fixed bug causing users to see notifications for their own + access requests in some cases. #50076 + - Improved the cluster initialization process's ability to + recovery from errors. #49966 + ------------------------------------------------------------------- Thu Dec 12 05:56:48 UTC 2024 - Johannes Kastl diff --git a/teleport.obsinfo b/teleport.obsinfo index 0cda497..45446bf 100644 --- a/teleport.obsinfo +++ b/teleport.obsinfo @@ -1,4 +1,4 @@ name: teleport -version: 17.0.5 -mtime: 1733948920 -commit: 7cc4c2a0fc54fb120a8a19f86f0acfc1d0c703a8 +version: 17.1.0 +mtime: 1734646631 +commit: 6e777d4bdbdafb186f1a89d81e6d19a641833ea9 diff --git a/teleport.spec b/teleport.spec index 367817d..8fab092 100644 --- a/teleport.spec +++ b/teleport.spec @@ -17,7 +17,7 @@ Name: teleport -Version: 17.0.5 +Version: 17.1.0 Release: 0 Summary: Identity-aware, multi-protocol access proxy License: AGPL-3.0-only @@ -32,7 +32,7 @@ Source5: tbot.yaml # Rust vendoring Source6: vendor.tar.zst BuildRequires: bash-completion -BuildRequires: cargo >= 1.69 +BuildRequires: cargo >= 1.82 BuildRequires: cargo-packaging BuildRequires: git-core BuildRequires: go >= 1.23.4 diff --git a/vendor.tar.gz b/vendor.tar.gz index 3ac94e3..7940802 100644 --- a/vendor.tar.gz +++ b/vendor.tar.gz @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:ebdad2e2087395d064974c5caf74072822ed5e00d5716dfe7503dbf0bb99149e -size 52366716 +oid sha256:c1a16c187a3e6bf9f1cc751000dc93157d4e31c2fdf480b1f4161f7adab8ce4e +size 52390877 diff --git a/vendor.tar.zst b/vendor.tar.zst index a1f1761..c95c06d 100644 --- a/vendor.tar.zst +++ b/vendor.tar.zst @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:fc1f6509fcf52fdf9a443e93378bbc2b4dc036fe17e2a6a904ef3814ab0874b5 -size 728384 +oid sha256:f419338524a67c2d88d51129f4f065d34e3cee4a5cb729d2f9529f3d20c94203 +size 729189