Accepting request 1202355 from devel:kubic

OBS-URL: https://build.opensuse.org/request/show/1202355
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/teleport?expand=0&rev=115
This commit is contained in:
Ana Guerrero 2024-09-23 13:19:41 +00:00 committed by Git OBS Bridge
commit 28739c00e5
8 changed files with 79 additions and 12 deletions

View File

@ -4,7 +4,7 @@
<param name="scm">git</param> <param name="scm">git</param>
<param name="submodules">disable</param> <param name="submodules">disable</param>
<param name="exclude">.git</param> <param name="exclude">.git</param>
<param name="revision">v16.3.0</param> <param name="revision">v16.4.0</param>
<param name="versionformat">@PARENT_TAG@</param> <param name="versionformat">@PARENT_TAG@</param>
<param name="changesgenerate">disable</param> <param name="changesgenerate">disable</param>
<param name="versionrewrite-pattern">v(.*)</param> <param name="versionrewrite-pattern">v(.*)</param>

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:2e3b34d55a0ac7f480c09c6d96d89238ce79bd3bd82b6807ba3beec113a8fe01
size 264692238

3
teleport-16.4.0.obscpio Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:d31ab9a3045b9121527bda25658704b7f41a0e03c84d7ab9313217d7f0364578
size 270617614

View File

@ -1,3 +1,70 @@
-------------------------------------------------------------------
Sat Sep 21 13:37:04 UTC 2024 - Johannes Kastl <opensuse_buildservice@ojkastl.de>
- update to 16.4.0:
* Machine ID for HCP Terraform and Terraform Enterprise
Teleport now supports secure joining via Terraform Cloud,
allowing Machine ID workflows to run on Terraform Cloud without
shared secrets.
* SPIFFE Federation for Workload Identity
Teleport Workload Identity now supports SPIFFE Federation,
allowing trust relationships to be established between a
Teleport cluster's trust domain and trust domains managed by
other SPIFFE compatible platforms. Establishing a relationship
between the trust domains enables workloads belonging to one
trust domain to validate the identity of workloads in the other
trust domain, and vice versa.
* Multi-domain support for web applications
Teleport now supports web application access where one
application depends on another. For example, you may have a web
application that depends on a backend API service, both of
which are separate apps protected by Teleport.
* Okta integration status dashboard
Cluster admins are now able to get a detailed overview of the
Okta integration status in the Teleport web UI.
* Other improvements and fixes
- Fixed the web favicon not displaying on specific builds.
#46736
- Fixed regression in private key parser to handle mismatched
PEM headers. #46727
- Removed TXT record validation from custom DNS zones in VNet;
VNet now supports any custom DNS zone, as long as it's
included in vnet_config. #46722
- Fixed audit log not recognizing static host user events.
#46697
- Fixes a bug in Kubernetes access that causes the error
expected *metav1.PartialObjectMetadata object when trying to
list resources. #46694
- Added a new default_shell configuration for the static host
users resource that works exactly the same as the
create_host_user_default_shell configuration added for roles.
#46688
- Machine ID now generates cluster-specific ssh_config and
known_hosts files which will always direct SSH connections
made using them via Teleport. #46684
- Fixed a regression that prevented the fish shell from
starting in Teleport Connect. #46662
- Added a new create_host_user_default_shell configuration
under role options that changes the default shell of auto
provisioned host users. #46648
- Fixed an issue that prevented host user creation when the
username was also listed in host_groups. #46635
- Fixed tsh scp showing a login prompt when attempting to
transfer a folder without the recursive option. #46603
- The Teleport Terraform provider now supports
AccessMonitoringRule resources. #46582
- The teleport-plugin-slack chart can now deploy tbot to obtain
and renew the Slack plugin credentials automatically. This
setup is easier and more secure than signing long-lived
credentials. #46581
- Always show the device trust green shield for authenticated
devices. #46565
- Add new terraform_cloud joining method to enable secretless
authentication on HCP Terraform jobs for the Teleport
Terraform provider. #46049
- Emit audit logs when creating, updating or deleting Teleport
Plugins. #4939
------------------------------------------------------------------- -------------------------------------------------------------------
Sat Sep 14 07:49:25 UTC 2024 - Johannes Kastl <opensuse_buildservice@ojkastl.de> Sat Sep 14 07:49:25 UTC 2024 - Johannes Kastl <opensuse_buildservice@ojkastl.de>

View File

@ -1,4 +1,4 @@
name: teleport name: teleport
version: 16.3.0 version: 16.4.0
mtime: 1726110771 mtime: 1726699200
commit: 5cf82cc114da605cc3ba414da3a76750d5ed27c6 commit: e08d4e0e2137bf4ec353d19a4b08a88e264f539d

View File

@ -19,7 +19,7 @@
%define __arch_install_post export NO_BRP_STRIP_DEBUG=true %define __arch_install_post export NO_BRP_STRIP_DEBUG=true
Name: teleport Name: teleport
Version: 16.3.0 Version: 16.4.0
Release: 0 Release: 0
Summary: Identity-aware, multi-protocol access proxy Summary: Identity-aware, multi-protocol access proxy
License: AGPL-3.0-only License: AGPL-3.0-only

View File

@ -1,3 +1,3 @@
version https://git-lfs.github.com/spec/v1 version https://git-lfs.github.com/spec/v1
oid sha256:667e73cc1287d2b7bbcef65cc1dad47311b1b04a593cb8d929183773eb4e9dea oid sha256:e8b35d8901ed4acacc553d15991c8b89778d7b1260724701bc281457df7a73b1
size 46689724 size 46695419

View File

@ -1,3 +1,3 @@
version https://git-lfs.github.com/spec/v1 version https://git-lfs.github.com/spec/v1
oid sha256:7584fc64fcb730526b1bae05f1c5fd396b041edb1994821b0d5166b841b0b49c oid sha256:5b472d2aad0efc5cb1ace5cbb1606758d37b394c75c5321f622ca4fbe76fab83
size 720882 size 720754