Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 17.1.0 #50406

Merged
merged 11 commits into from
Dec 19, 2024
Merged

Release 17.1.0 #50406

merged 11 commits into from
Dec 19, 2024

Conversation

doggydogworld
Copy link
Contributor

  • Updated golang.org/x/net to v0.33.0 (addresses CVE-2024-45338). #50397
  • Prevents panic in SAML app or OIDC integration deletion when a plugin type is not PluginTypeAWSIdentityCenter or PluginAWSICSettings is nil. #50360
  • Fix missing roles in access lists causing users to be locked out of their account. #50298
  • Added support for connecting to PostgreSQL databases using WebUI. #50287
  • Improved the performance of Teleport agents serving a large number of resources in Kubernetes. #50279
  • Improve performance of Kubernetes App Auto Discover. #50269
  • Added more granular access controls for SSH port forwarding. Access to remote or local port forwarding can now be controlled individually using the new ssh_port_forwarding role option. #50241
  • Properly close ssh port forwarding connections to prevent requests hanging indefinitely. #50238
  • Teleport's RDP client now sets the load balancing cookie to improve compatibility with local traffic managers. #50226
  • Fixes an intermittent EKS authentication failure when dealing with EKS auto-discovery. #50197
  • Expose /.well-known/jwks-okta public endpoint for Okta API services type App. #50177
  • Switched to a new role editor UI. #50030
  • Added support for multiple ports to TCP applications. #49711

Enterprise:

  • Adds AWS Account name to Identity Center Roles and resources. Some manual cleanup may be required where users and Access Lists have been assigned the obsolete roles.

@doggydogworld doggydogworld added the no-changelog Indicates that a PR does not require a changelog entry label Dec 18, 2024
Copy link

This pull request is automatically being deployed by Amplify Hosting (learn more).

Access this pull request here: https://pr-50406.d212ksyjt6y4yg.amplifyapp.com

@tigrato
Copy link
Contributor

tigrato commented Dec 18, 2024

Can you wait for #50386?

CHANGELOG.md Outdated Show resolved Hide resolved
CHANGELOG.md Outdated

### Access requests support for AWS Identity Center

AWS Identity Center integration will allow users to request short or long term access to permission sets via Access Requests.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should change all "will allow" to "now allows" :)

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@doggydogworld You changed it here but not anywhere below. Those still say "will support ..."

CHANGELOG.md Show resolved Hide resolved
r0mant
r0mant previously approved these changes Dec 18, 2024
@r0mant r0mant dismissed their stale review December 18, 2024 23:34

Approved too early.

@doggydogworld doggydogworld added this pull request to the merge queue Dec 19, 2024
Merged via the queue into branch/v17 with commit 6e777d4 Dec 19, 2024
43 checks passed
@doggydogworld doggydogworld deleted the release/17.1.0 branch December 19, 2024 22:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport helm no-changelog Indicates that a PR does not require a changelog entry size/sm
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants