Releases: gravitational/teleport
Teleport 1.0.4 Release
Warning
Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.
Intro
This release only includes the addition of the ability to specify non-standard HTTPS port for Teleport proxy for tsh --proxy
flag.
Teleport 1.0.3 Release
Warning
Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.
Intro
Teleport has been quite stable since 1.0.0 release. This release only includes one major bugfix #486 plus minor changes not exposed to OSS Teleport users.
Changelist
- Fixed the regression of automatic configuration of
host ip
#486 - Improvements related to Gravitational's internal usage of Teleport
Teleport 1.0 Release
The first official release of Teleport!
The biggest reason that was preventing us from placing "Production ready v1.0" label on Teleport has been our desire to have it professionally audited and tested by security professionals. We have completed the audit and happy to report that Teleport now earns our approval for production use.
Warning
Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.
New Features:
- Support for
logging out
which clears temporary session keys - Support for connecting Teleport clusters together: see "Trusted Clusters" section in the documentation.
- Account lock after N unsuccessful attempts
Other Changes:
- Simplified build system: default source tarballs from Github are trivial to build.
- Lots of minor bugfixes
- Friendlier error messages
Compatibility with Beta Versions
Teleport YAML configuration format has changed slightly. Also, the format of key and session storage has evolved as well. We recommend beta users to wipe out /var/lib/teleport
directory on servers and ~/.tsh
directory on client machines.
Moving forward we are committed to backwards compatibility with configuration files and on-disk data.
NetAddr YAML marshaling and session env vars
Since the previous release:
- NetAddr can be successfully marshaled to / unmarshaled from YAML.
- Can set environment variables when opening a session.
Bring back AuthIdentityEvent
Merge pull request #448 from gravitational/sasha/identity recover back AuthIdentityEvent
Skip reading local agent keys if SkipLocalAuth=true
Merge pull request #446 from gravitational/ev/445 No need to read local agent keys if SkipLocalAuth=true
Properly report an error on reverse tunnel startup
This release fixes an issue with the error not being logged in case of a failure in creating a reverse tunnel.
Provisioning tokens, user lookup and reconnecting logic
This release features:
- Provisioning tokens to quickly spin up clusters
- Advanced user shell lookup fixes
- Reverse tunnels reconnecting logic
Audit Logs and OpenID Connect Authentication
This release includes:
- Support for OpenID/OAuth2 connectors, enabling external authentication with Google Apps
- Refactored and improved audit logging, session management and playback
- Numerous fixes across Teleport's code base
v0.2.0-alpha.0
This release includes:
- Support for OpenID/OAuth2 connectors, enabling external authentication with Google Apps
- Refactored and improved audit logging, session management and playback
- Numeruous fixes across Teleport's code base