Skip to content

Releases: spiffe/spire

v1.14.5

08 Apr 19:23
Immutable release. Only release title and notes can be modified.
a58bc5f

Choose a tag to compare

v1.13.5

08 Apr 18:36
Immutable release. Only release title and notes can be modified.
4698eb5

Choose a tag to compare

v1.14.4

19 Mar 20:04
Immutable release. Only release title and notes can be modified.
58e0ab1

Choose a tag to compare

Fixed

- The version that the agent was reporting at startup would get replaced by an empty string every time the agent re-attests or re-news it's SVID (#6763)

v1.14.3

18 Mar 13:38
Immutable release. Only release title and notes can be modified.
7b6d5ab

Choose a tag to compare

Added

  • spire-agent version is now reported to spire-server via the PostStatus API and visible in GetAgent/ListAgents CLI output (#6542)

Changed

  • The RequirePQKEM TLS policy now uses the standardized X25519MLKEM768 instead of the draft x25519Kyber768Draft00 (#6703)
  • OPA policy evaluation performance improved by ~2x, based on benchmarking, through use of partial evaluation (#6633)

Fixed

  • ReadOnlyEntry.Clone() was incorrectly copying the Admin boolean into the Downstream field when applying an output mask, causing clients of GetAuthorizedEntries and SyncAuthorizedEntries to receive corrupted authorization metadata. The Admin and Downstream booleana were not used in spire-agent so there was no impact from this (#6636)
  • The periodic node cache rebuild was only executing once instead of running continuously at the configured interval (#6661)
  • Race condition in the spire upstream authority plugin during shutdown that could cause a nil pointer dereference on the bundle client (#6590)
  • aws_iid attestor AWS request timeout increased from 5s to 20s to prevent intermittent attestation failures in large AWS Organizations (#6558)
  • Federated trust bundles are now fetched concurrently, reducing the chance of exceeding the agent sync timeout when there are many federation relationships (#6491)
  • JWT-SVID refresh now uses a 1s timeout when a cached SVID already exists, preventing an unresponsive server from blocking delivery of a valid cached SVID (#6454)
  • Documentation improvements (#6607, #6608, #6632)

Security

  • Selectors are no longer logged at the agent level to avoid potential leakage of sensitive information (#6732)
  • Fixed an issue where TLS session ticket resumption on the server TCP endpoint could bypass SPIFFE certificate chain validation against the current trust bundle. TLS session tickets are now disabled on the server side, ensuring VerifyPeerCertificate runs on every connection (#6715)

v1.14.2

03 Mar 23:05
Immutable release. Only release title and notes can be modified.

Choose a tag to compare

Security

  • Fixed an issue in the http_challenge server node attestor plugin which allowed an attacker to make an SSRF attack. The attacker could potentially redirect the server to a domain that they wouldn't normally have access to. spire-server would make an unauthenticated GET request to that domain and return the first 64 bytes of the response to the attacker. Thank you, Oleh Konko (@1seal) for reporting this isuse.
  • Fixed an issue in the x509pop server node attestor plugin which allowed an attacker to make spire-server consume large and disproportionate amounts of CPU time for the node attestation process. Thank you Jakub Ciolek for reporting this issue.

v1.13.4

03 Mar 22:40
Immutable release. Only release title and notes can be modified.

Choose a tag to compare

Security

  • Fixed an issue in the http_challenge server node attestor plugin which allowed an attacker to make an SSRF attack. The attacker could potentially redirect the server to a domain that they wouldn't normally have access to. spire-server would make an unauthenticated GET request to that domain and return the first 64 bytes of the response to the attacker. Thank you, Oleh Konko (@1seal) for reporting this isuse.
  • Fixed an issue in the x509pop server node attestor plugin which allowed an attacker to make spire-server consume large and disproportionate amounts of CPU time for the node attestation process. Thank you Jakub Ciolek for reporting this issue.

v1.14.1

15 Jan 18:54
Immutable release. Only release title and notes can be modified.
7c78fda

Choose a tag to compare

Changed

  • The uptime_in_ms gauge metric now uses float64 instead of integer (#6532)
  • SPIRE Server on Windows can now accept persistent arguments in the service binPath for automatic startup (#6465)

Fixed

  • Incorrect logic for disposing keys in the aws_kms KeyManager plugin (#6525)
  • JWT-SVID caching now uses the SPIFFE ID returned by the server to prevent stale cache entries when entry IDs change (#6501)
  • Documentation fixes (#6488, #6521)

v1.14.0

11 Dec 22:27
Immutable release. Only release title and notes can be modified.
d18ee04

Choose a tag to compare

Added

  • New azure_imds node attestor plugin for attesting nodes running in Microsoft Azure using the Azure Instance Metadata Service (IMDS) (#6312)
  • The AWS KMS key manager plugin now supports key tagging (#6410)
  • The JWT-SVID profile on spire server can now be disabled using the disable_jwt_svids config (#6272)
  • spire-server validate now supports validating plugin configuration (#6355)
  • Support for ec-p384 curve in the workload_x509_svid_key_type configuration option in spire-agent (#6389)
  • The docker workload attestor now supports the docker:image_config_digest selector (#6391)
  • GCP CAs now specify a certificate_id in CreateCertificateRequest for Enterprise tier compatibility (#6392)
  • Dummy implementations for the WIT-SVID profile (#6399)
  • GCP cloudsql-proxy can now be used with postgres (#6463)
  • The KeyManager directory is now validated to exist and be writeable on agent startup (#6397)

Changed

  • QueryContext is now used for querying the version database version and CTE support (#6461)
  • The k8s and docker workload attestors now ignore cgroup mountinfo with root == / (#6462)
  • spire-server now stops fetching all events if a context cancelled error is returned while processing a list of events (#6472)

Removed

  • Removed the deprecated 'retry_rebootstrap' agent config (#6431)
  • Removed unused database model, V3AttestedNode (#6381)

Fixed

  • Added k8s_configmap BundlePublisher to documentation (#6437)
  • Added tpm_devid to supported Agent plugins documentation (#6449)

v1.13.3

23 Oct 13:05
191c76b

Choose a tag to compare

Added

  • X.509 CA metric with absolute expiration time in addition to TTL-based metric (#6303)
  • spire-agent configuration to source join tokens from files to support integration with third-party credential providers (#6330)
  • Capability to filter on caller path in spire-server Rego authorization policies (#6320)

Changed

  • spire-server will use the SHA-256 algorithm for X.509-SVID Subject Key Identifiers when the GODEBUG environment variable contains fips140=only (#6294)
  • Attested node entries are now purged at a fixed interval with jitter (#6315)
  • oidc-discovery-provider now fails to initialize when started with unrecognized arguments (#6297)

Fixed

v1.13.2

08 Oct 12:52
b888739

Choose a tag to compare

Security