v1.17.6+suite.1
Release Notes
All notable changes to this project will be documented in this file.
[v1.17.6+suite.1] - 2022-07-12
Table of Contents
- Components
- Installation Instructions for the Suite Release Version of Conjur
- Upgrade Instructions
- Changes
Components
These are the components that combine to create this Conjur OSS Suite release and links
to their releases:
Conjur Server
- cyberark/conjur v1.17.6 (2022-04-07)
- cyberark/conjur-openapi-spec v5.3.0 (2021-12-22)
- cyberark/conjur-oss-helm-chart v2.0.4 (2021-04-12)
Conjur SDK
- cyberark/conjur-cli v6.2.5 (2021-09-29)
- cyberark/conjur-api-dotnet v2.1.1 (2022-03-14)
- cyberark/conjur-api-go v0.10.1 (2022-06-14)
- cyberark/conjur-api-java v3.0.3 (2022-05-31)
- cyberark/conjur-api-python3 v7.1.0 (2021-12-22)
- cyberark/conjur-api-ruby v5.3.7 (2021-12-28)
Platform Integrations
- cyberark/cloudfoundry-conjur-buildpack v2.2.4 (2022-06-16)
- cyberark/conjur-service-broker v1.2.5 (2022-06-16)
- cyberark/conjur-authn-k8s-client v0.23.6 (2022-06-16)
- cyberark/secrets-provider-for-k8s v1.4.3 (2022-07-07)
DevOps Tools
- cyberark/ansible-conjur-collection v1.1.0 (2020-12-29)
- cyberark/ansible-conjur-host-identity v0.3.2 (2020-12-29)
- cyberark/conjur-puppet v3.1.0 (2020-10-08)
- cyberark/terraform-provider-conjur v0.6.2 (2021-09-02)
Secretless Broker
- cyberark/secretless-broker v1.7.13 (2022-07-07)
Summon
- cyberark/summon v0.9.3 (2022-06-15)
- cyberark/summon-conjur v0.6.4 (2022-07-06)
Installation Instructions for the Suite Release Version of Conjur
Installing the Suite Release Version of Conjur requires setting the container image tag. Below are more specific instructions depending on environment.
-
Docker or docker-compose
Set the container image tag to
cyberark/conjur:1.17.6
.
For example, make the following update to the conjur service in the quickstart docker-compose.ymlimage: cyberark/conjur:1.17.6
-
Update the
image.tag
value and use the appropriate release of the helm chart:helm install ... \ --set image.tag="1.17.6" \ ... https://github.com/cyberark/conjur-oss-helm-chart/releases/download/v2.0.4/conjur-oss-2.0.4.tgz
Upgrade Instructions
Upgrade instructions are available for the following components:
Changes
The following are changes to the constituent components since the last Conjur
OSS Suite release:
- cyberark/conjur
- cyberark/conjur-openapi-spec
- cyberark/conjur-api-dotnet
- cyberark/conjur-api-go
- cyberark/conjur-api-java
- cyberark/conjur-api-ruby
- cyberark/cloudfoundry-conjur-buildpack
- cyberark/conjur-service-broker
- cyberark/conjur-authn-k8s-client
- cyberark/secrets-provider-for-k8s
- cyberark/secretless-broker
- cyberark/summon
- cyberark/summon-conjur
cyberark/conjur
v1.17.3 (2022-04-04)
- Added
- Added the ability to fetch signing keys from JWKS endpoints that use a self-signed
certificate or a certificate signed by a third-party CA for JWT generic vendor
configuration
(#2462
#2461
#2456
#2455
#2457
#2452
#2437) - Added the ability for JWT generic vendor configuration to receive signing keys
for JWT token verification from a variable. Variable name is public-keys
(#2463
#2461
#2456
#2455
#2454
#2450
#2447
#2437) - Added support for SNI certificates when talking to the Kubernetes API
server through the web socket client.
#2482 - Added support for http(s)_proxy for Kubernetes client in Kubernetes
authenticator
#2432
- Added the ability to fetch signing keys from JWKS endpoints that use a self-signed
- Changed
- Fixed issue where an invalid content type sent by our .NET SDK was causing
Conjur to error - but this wasn't the case before the Ruby 3 upgrade
#2525 - Verify non user or host resources do not have credentials.
- Update to automated release process
- Proper error message appears when JWT Authenticator gets HTTP code error
while trying to fetch JWKS data from jwks-uri #2474 - Upgrade to Ruby 3. #2444
- Fixed issue where an invalid content type sent by our .NET SDK was causing
- Fixed
- IAM Authn bug fix - Take rexml gem to production configuration #2493
- Previously, a stale puma pid file would prevent the Conjur server from starting
successfully. Conjur now removes a stale pid file at startup, if it exists.
#2498 - Use entirety of configured Kubernetes endpoint URL in Kubernetes authenticator's
web socket client, instead of only host and port
#2479
- Security
- Updated rails to 6.1.4.7 to resolve CVE-2022-21831 (not vulnerable)
cyberark/conjur#2513 - Updated nokogiri to 1.13.3 to resolve CVE-2022-23308 and CVE-2021-30560
cyberark/conjur#2504 - Updated Rails to 6.1.4.4 to resolve CVE-2021-44528 (Medium, Not Vulnerable)
cyberark/conjur#2486 - Updated Rails to 6.1.4.6 to resolve CVE-2022-23633
- Updated Puma to 5.6.2 to resolve CVE-2022-23634
cyberark/conjur#2492 - Updated Puma to 5.6.4 to resolve CVE-2022-24790
cyberark/conjur#2534 - Updated KubeClient to 4.9.3 to resolve CVE-2022-0759
cyberark/conjur#2527
- Updated rails to 6.1.4.7 to resolve CVE-2022-21831 (not vulnerable)
v1.17.6 (2022-04-07)
- Changed
- Adds CONJUR_USERS_IN_ROOT_POLICY_ONLY environment variable to prevent users from being created outside the root policy.
- Fixed promotion behavior
- Security
- Upgrade Rails to 6.12.5.1 to close CVE-2022-22577 and CVE-2022-27777
cyberark/conjur#2553 - Updated nokogiri to 1.13.4 to resolve CVE-2022-24836
cyberark/conjur#2534
- Upgrade Rails to 6.12.5.1 to close CVE-2022-22577 and CVE-2022-27777
cyberark/conjur-openapi-spec
v5.3.0 (2021-12-22)
- Added
- Add new route for enabling authenticator with default service
cyberark/conjur-openapi-spec#215
- Add new route for enabling authenticator with default service
cyberark/conjur-api-dotnet
v2.1.1 (2022-03-14)
- Fixed
- Fix mime type "text/plain"
cyberark/conjur-api-dotnet#82
- Fix mime type "text/plain"
cyberark/conjur-api-go
v0.8.1 (2021-12-16)
- Changed
- Update Golang version to 1.17
cyberark/conjur-api-go#121 - Update Golang version to 1.16.
cyberark/conjur-api-go#117
- Update Golang version to 1.17
v0.9.0 (2022-02-20)
- Added
- New CONJUR_AUTHN_JWT_SERVICE_ID & JWT_TOKEN_PATH environment variables as configuration to support authn-jwt
cyberark/conjur-api-go#124
- New CONJUR_AUTHN_JWT_SERVICE_ID & JWT_TOKEN_PATH environment variables as configuration to support authn-jwt
- Changed
- Update Dockerfile to use Go 1.17 base image
cyberark/conjur-api-go#126
- Update Dockerfile to use Go 1.17 base image
v0.10.0 (2022-05-19)
- Added
- New CONJUR_AUTHN_JWT_HOST_ID environment variable for authn-jwt cyberark/conjur-api-go#130
v0.10.1 (2022-06-14)
- Changed
- Update testify to 1.7.2
cyberark/conjur-api-go#133
- Update testify to 1.7.2
cyberark/conjur-api-java
v3.0.3 (2022-05-31)
- Security
- Upgraded OpenJDK Dockerfile base image to 17-jdk-bullseye.
cyberark/conjur-api-java#107 - Upgraded nginx Dockerfile base image to fix CVE-2022-0778 and CVE-2022-1292.
cyberark/conjur-api-java#111
- Upgraded OpenJDK Dockerfile base image to 17-jdk-bullseye.
cyberark/conjur-api-ruby
v5.3.6 (2021-12-09)
- Changed
- Support ruby-3.0.2.
cyberark/conjur-api-ruby#197
- Support ruby-3.0.2.
v5.3.7 (2021-12-28)
- Changed
- Change addressable gem dependency.
cyberark/conjur-api-ruby#199 - Update to use automated release process
- Change addressable gem dependency.
cyberark/cloudfoundry-conjur-buildpack
v2.2.2 (2022-01-03)
- Changed
- Updated conjur-api-go to version 0.8.1
cyberark/cloudfoundry-conjur-buildpack#131
- Updated conjur-api-go to version 0.8.1
v2.2.3 (2022-06-07)
- Changed
- Project Go version bumped to 1.17, and support for deprecated Go versions
1.14.x and 1.15.x removed.
cyberark/cloudfoundry-conjur-buildpack#137 - Updated conjur-api-go to version 0.10.0
cyberark/cloudfoundry-conjur-buildpack#140
- Project Go version bumped to 1.17, and support for deprecated Go versions
- Security
- Updated sinatra in ruby test app to 2.2.0
cyberark/cloudfoundry-conjur-buildpack#135 - Golang-based Docker images bumped to version 1.17.9-stretch
cyberark/cloudfoundry-conjur-buildpack#137
- Updated sinatra in ruby test app to 2.2.0
v2.2.4 (2022-06-16)
- Changed
- Updated conjur-api-go to 0.10.1 and summon to 0.9.3 in conjur-env/go.mod
cyberark/cloudfoundry-conjur-buildpack#145 - Updated Spring in tests/integration/apps/java to 2.7.0
cyberark/cloudfoundry-conjur-buildpack#144 - Updated conjur-env dependencies to latest versions (github.com/cyberark/summon -> v0.9.2,
github.com/stretchr/testify -> v1.7.2)
cyberark/cloudfoundry-conjur-buildpack#143
- Updated conjur-api-go to 0.10.1 and summon to 0.9.3 in conjur-env/go.mod
cyberark/conjur-service-broker
v1.2.4 (2022-05-05)
- Fixed
- Unpin the Ruby Buildpack in the service broker's manifest.yml and update the pinned
Ruby version in the service broker's Gemfile to ~> 2.7. This captures the idea that
the service broker works for all 2.x Ruby versions from 2.7 and up, anything less has reached end of life.
cyberark/conjur-service-broker#266
- Unpin the Ruby Buildpack in the service broker's manifest.yml and update the pinned
- Security
- Upgrade nokogiri to 1.13.4 to resolve CVE-2022-24836, CVE-2018-25032,
CVE-2022-24839, and CVE-2022-23437 (not vulnerable to all)
cyberark/conjur-service-broker#273 - Upgraded puma to 5.6.4 to resolve CVE-2022-24790
cyberark/conjur-service-broker#271 - Upgraded rails components to 5.2.6.2 and puma to 5.6.2 to resolve CVE-2022-23633 and
CVE-2022-23634 cyberark/conjur-service-broker#270 - Updated puma to 5.5.1
cyberark/conjur-service-broker#267 - Update rails components to 5.2.7.1 to resolve CVE-2022-22577 and CVE-2022-27777
cyberark/conjur-service-broker#274
- Upgrade nokogiri to 1.13.4 to resolve CVE-2022-24836, CVE-2018-25032,
v1.2.5 (2022-06-16)
- Changed
- Upgrade conjur-api-go to v0.10.1 and rack to 2.2.3.1
cyberark/conjur-service-broker#285
- Upgrade conjur-api-go to v0.10.1 and rack to 2.2.3.1
- Security
- Upgrade nokogiri to 1.13.6 to resolve un-numbered libxml CVEs
cyberark/conjur-service-broker#280 - Upgrade rack to 2.2.3.1 to resolves CVE-2022-30122 and CVE-2022-30123
cyberark/conjur-service-broker#283
- Upgrade nokogiri to 1.13.6 to resolve un-numbered libxml CVEs
cyberark/conjur-authn-k8s-client
v0.23.0 (2022-01-14)
- Added
- Add support for tracing with OpenTelemetry. This adds a new function to the authenticator, AuthenticateWithContext. The existing funtion, Authenticate() is deprecated and will be removed in a future upddate. cyberark/conjur-authn-k8s-client#423
- Add support for Authn-JWT flow. cyberark/conjur-authn-k8s-client#426
- Add support for configuration via Pod Annotations. [cyberark/conjur-authn-k8s-client#407
- Changed
- The project Golang version is updated from the end-of-life v1.15 to version v1.17.
cyberark/conjur-authn-k8s-client#416
cyberark/conjur-authn-k8s-client#424 - Reduced default timeout for waitForFile from 1s to 50ms. cyberark/conjur-authn-k8s-client#423
- Instead of getting K8s config object now you get Config Interface using NewConfigFromEnv() and ConfigFromEnv().
This is a breaking change for software that leverages the github.com/cyberark/conjur-authn-k8s-client/pkg/authenticator
Go package (e.g. Secretless and Secrets Provider for Kubernetes).
cyberark/conjur-authn-k8s-client#425 - Instead of getting K8s authenticator object now you get Authenticator Interface using NewAuthenticator() and NewAuthenticatorWithAccessToken(). cyberark/conjur-authn-k8s-client#425
- The project Golang version is updated from the end-of-life v1.15 to version v1.17.
- Fixed
- Allows the Conjur certificate path in the conjur-config-cluster-prep Helm chart to be set to
any user specified directory. cyberark/conjur-authn-k8s-client#434
- Allows the Conjur certificate path in the conjur-config-cluster-prep Helm chart to be set to
v0.23.1 (2022-02-11)
- Added
- Authenticator client logs request IP address after login error.
cyberark/conjur-authn-k8s-client#439
- Authenticator client logs request IP address after login error.
- Changed
- If Cluster Prep Helm chart value authnK8s.clusterRole.create or
authnK8s.serviceAccount.create is false, their corresponding name is no
longer required, as these objects are not required for Authn-JWT.
cyberark/conjur-authn-k8s-client#445
cyberark/conjur-authn-k8s-client#452
- If Cluster Prep Helm chart value authnK8s.clusterRole.create or
- Fixed
- Fixes bug in Namespace Prep Helm chart's conjur_connect_configmap.yaml,
which silently accepted missing values from the referenced Golden ConfigMap.
cyberark/conjur-authn-k8s-client#447
- Fixes bug in Namespace Prep Helm chart's conjur_connect_configmap.yaml,
v0.23.3 (2022-05-19)
- Security
- Update base image in bin/test-workflow/test_app_summon/Dockerfile.builder to Ruby 3
cyberark/conjur-authn-k8s-client#464
- Update base image in bin/test-workflow/test_app_summon/Dockerfile.builder to Ruby 3
v0.23.5 (2022-06-14)
- Changed
- Update github.com/stretchr/testify to v1.7.2 and go.opentelemetry.io/otel to v1.7.0
cyberark/conjur-authn-k8s-client#472
- Update github.com/stretchr/testify to v1.7.2 and go.opentelemetry.io/otel to v1.7.0
- Security
- Update the Red Hat ubi image in Dockerfile
cyberark/conjur-authn-k8s-client#471
- Update the Red Hat ubi image in Dockerfile
v0.23.6 (2022-06-16)
- Security
- Added replace statement for gopkg.in/yaml.v3 prior to v3.0.1
cyberark/conjur-authn-k8s-client#475
- Added replace statement for gopkg.in/yaml.v3 prior to v3.0.1
cyberark/secrets-provider-for-k8s
v1.4.0 (2022-02-15)
- Added
- Adds support for Secrets Provider secrets rotation feature, Community release.
cyberark/secrets-provider-for-k8s#426
cyberark/secrets-provider-for-k8s#432 - Adds support for Authn-JWT.
cyberark/secrets-provider-for-k8s#431
cyberark/secrets-provider-for-k8s#433
- Adds support for Secrets Provider secrets rotation feature, Community release.
v1.4.1 (2022-04-01)
- Added
- Secrets files are written in an atomic operation. cyberark/secrets-provider-for-k8s#440
- Secret files are deleted when secrets are removed from Conjur or access is revoked. Can be disabled with annotation.
cyberark/secrets-provider-for-k8s#447 - Kubernetes Secrets are cleared when secrets are removed from Conjur or access is revoked. Can be disabled with annotation.
cyberark/secrets-provider-for-k8s#449 - Secrets Provider allows for its status to be monitored through the creation of a couple of empty sentinel files: CONJUR_SECRETS_PROVIDED and CONJUR_SECRETS_UPDATED. The first file is created when SP has completed its first round of providing secrets via secret files / Kubernetes Secrets. It creates/recreates the second file whenever it has updated secret files / Kubernetes Secrets. If desirable, application containers can mount these files via a shared volume.
cyberark/secrets-provider-for-k8s#450 - Adds support for secrets rotation with Kubernetes Secrets.
cyberark/secrets-provider-for-k8s#448
- Changed
- Update to automated release process. cyberark/secrets-provider-for-k8s#455
v1.4.3 (2022-07-07)
- Removed
- Support for OpenShift v3.11 is officially removed as of this release.
cyberark/secrets-provider-for-k8s#474
- Support for OpenShift v3.11 is officially removed as of this release.
- Security
- Add replace statements to go.mod to prune vulnerable dependency versions from the dependency tree.
cyberark/secrets-provider-for-k8s#470
cyberark/secrets-provider-for-k8s#471 - Update the Red Hat ubi image in Dockerfile.
cyberark/secrets-provider-for-k8s#469
- Add replace statements to go.mod to prune vulnerable dependency versions from the dependency tree.
cyberark/secretless-broker
v1.7.9 (2022-01-14)
- Changed
- Use latest version of conjur-authn-k8s-client which supports JWT loging and tracing.
cyberark/secretless-broker#1446
- Use latest version of conjur-authn-k8s-client which supports JWT loging and tracing.
v1.7.10 (2022-02-15)
- Fixed
- Postgres connector has been updated to propagate client options through Secretless to target server.
cyberark/secretless-broker#1444
- Postgres connector has been updated to propagate client options through Secretless to target server.
- Security
- Updated github.com/containerd/containerd to resolve GHSA-5j5w-g665-5m35
cyberark/secretless-broker#1450
- Updated github.com/containerd/containerd to resolve GHSA-5j5w-g665-5m35
v1.7.11 (2022-04-29)
- Added
- Support for building on Apple M1 hardware.
cyberark/secretless-broker#1456
- Support for building on Apple M1 hardware.
- Security
- Updated github.com/containerd/containerd to resolve CVE-2022-23648
cyberark/secretless-broker#1459 - Updated github.com/docker/docker to resolve CVE-2015-3627
cyberark/secretless-broker#1459 - Updated github.com/docker/distribution to resolve GHSA-qq97-vm5h-rrhg
cyberark/secretless-broker#1459
- Updated github.com/containerd/containerd to resolve CVE-2022-23648
v1.7.12 (2022-05-02)
- Changed
- Update to automated release process
cyberark/secretless-broker#1462
- Update to automated release process
v1.7.13 (2022-07-07)
- Changed
- Updated direct dependencies in bin/juxtaposer/go.mod and in go.mod and add replace statements
for known vulnerable third-party versions.
cyberark/secretless-broker#1467
- Updated direct dependencies in bin/juxtaposer/go.mod and in go.mod and add replace statements
cyberark/summon
v0.9.1 (2021-12-22)
- Changed
- Update go to 1.17 & switch to github.com/urfave/cli
from github.com/codegangsta/cli
cyberark/summon#226
- Update go to 1.17 & switch to github.com/urfave/cli
v0.9.2 (2022-05-31)
- Security
- Update main and acceptance base images to Golang 1.17 to fix CVE-2022-0778 and CVE-2022-1292.
cyberark/summon#232
- Update main and acceptance base images to Golang 1.17 to fix CVE-2022-0778 and CVE-2022-1292.
v0.9.3 (2022-06-15)
- Changed
- Updated dependencies in go.mod (github.com/stretchr/testify -> 1.7.2,
github.com/urfave/cli -> 1.22.9, golang.org/x/net -> v0.0.0-20220607020251-c690dde0001d,
gopkg.in/yaml.v3 -> v3.0.1)
cyberark/summon#234
- Updated dependencies in go.mod (github.com/stretchr/testify -> 1.7.2,
cyberark/summon-conjur
v0.6.1 (2021-12-31)
- Changed
- Updated Golang to 1.17 and the Conjur API to 0.8.1
cyberark/summon-conjur#96
- Updated Golang to 1.17 and the Conjur API to 0.8.1
v0.6.2 (2022-02-25)
- Changed
- Updated Conjur API to 0.9.0 to support authn-JWT
cyberark/summon-conjur#99
- Updated Conjur API to 0.9.0 to support authn-JWT
v0.6.3 (2022-05-19)
- Changed
- Updated the Conjur API to 0.10.0 to support the new CONJUR_AUTHN_JWT_HOST_ID environment variable
cyberark/summon-conjur#103
- Updated the Conjur API to 0.10.0 to support the new CONJUR_AUTHN_JWT_HOST_ID environment variable
- Security
- Update test env Golang to 1.17 to fix CVE-2022-0778 and CVE-2022-1292.
cyberark/summon-conjur#102
- Update test env Golang to 1.17 to fix CVE-2022-0778 and CVE-2022-1292.
v0.6.4 (2022-07-06)
- Changed
- Updated direct dependencies (github.com/cyberark/conjur-api-go -> v0.10.1,
github.com/stretchr/testify -> 1.7.2)
cyberark/summon-conjur#106
- Updated direct dependencies (github.com/cyberark/conjur-api-go -> v0.10.1,