releases.shpreview
HashiCorp/Boundary

Boundary

$npx -y @buildinternet/releases show boundary
Mon
Wed
Fri
AprMayJunJulAugSepOctNovDecJanFebMarApr
Less
More
Releases2Avg0/wkVersionsv0.21.1 → v0.21.2
Aug 30, 2022

0.10.3 (2022/08/30)

Bug Fixes

  • db: Fix an issue with migrations failing due to not updating the project_id value for the host plugin set (Issue, PR).
Aug 23, 2022

0.10.2 (2022/08/23)

Security

  • Fix security vulnerability CVE-2022-36130, Boundary up to 0.10.1 did not properly perform
    authorization checks to ensure the resources were associated with the correct scopes,
    allowing potential privilege escalation for authorized users of another scope. [HCSEC-2022-17]
Aug 11, 2022

0.10.1 (2022/08/11)

Bug Fixes

  • db: Fix an issue with migrations affecting clusters that contain credential libraries or static credentials. (Issue), (PR).
  • Managed Groups: Fix an issue where the filter field is not sent by admin UI (PR).
  • Host Sets: Fix an issue causing host sets to not display in UI when using the aws plugin (PR)
  • Plugins: Fixes regression from 0.9.0 causing a failure to start when using multiple KMS blocks of the same type (PR1, PR2)
  • CLI: Fixed errors related to URL detection when passing in -attr or -secret values that contained colons (PR)
Aug 10, 2022

0.10.0 (2022/08/10)

Known Issues

  • Migration to this version may fail if the cluster contains credential libraries. This will be fixed shortly in 0.10.1.

New and Improved

  • ssh Target Type With Credential Injection (HCP Boundary only): Boundary has gained a new ssh target type. Using this type, username/password or SSH private key credentials can be sourced from vault credential libraries or static credentials and injected into the SSH session between a client and end host. This allows users to securely SSH to remote hosts while never being in possession of a valid credential for that target host.
  • SSH Private Key Credentials: There is now an ssh_private_key credential type that allows submitting a username/private key (and optional passphrase) to Boundary for use with credential injection or brokering workflows.
  • boundary connect ssh Credential Brokering Enhancements: we have extended support into the boundary connect ssh helper for brokered credentials of ssh_private_key type; the command will automatically pass the credentials to the ssh process (PR).
  • boundary authenticate, boundary accounts: Enables use of env:// and file:// syntax to specify location of a password (PR)

Bug Fixes

  • cli: Correctly cleanup plugins after exiting boundary dev, boundary server and boundary database init (Issue, PR).
  • boundary accounts change-password: Fixed being prompted for confirmation of the current password instead of the new one (PR)

Deprecations/Changes

  • API Module: Changed the return types that reference interfaces into their expected typed definition. Type casting is only allowed against interface types, therefore to mitigate compiler errors please remove any type casting done against the return values. (Issue, PR)
  • Targets: Rename Application credentials to Brokered credentials (PR).
  • Host plugins: Plugin-type host catalogs/sets/hosts now use typed prefixes for any newly-created resources. Existing resources will not be affected. (PR)
  • Credential stores: Static-type credential stores/credentials now use typed prefixes for any newly-created resources. Existing resources will not be affected. (PR)
  • Change of behavior on -token flag in CLI: Passing a token this way can reveal the token to any user or service that can look at process information. This flag must now reference a file on disk or an env var. Direct usage of the BOUNDARY_TOKEN env var is also deprecated as it can show up in environment information; the env:// format now supported by the -token flag causes the Boundary process to read it instead of the shell so is safer. (PR)
  • Change of behavior on -password flag in CLI: The same change made above for -token has also been applied to -password or, for supporting resource types, -current-password and -new-password. (PR)
Jul 6, 2022

0.9.1 (2022/07/06)

New and Improved

  • azure host plugin: Support multiple MSI identities (PR

Bug Fixes

  • scheduler: Fix regression causing controller names of less than 10 characters to fail to register jobs (PR).
  • sessions: Fix an additional case from the changes in the 0.8.x series that could result in sessions never moving from canceling state to terminated. (PR)
  • The plugin execution_dir configuration parameter is now respected by kms plugins too PR.

Deprecations/Changes

  • sessions: The default connect limit for new sessions changed from 1 to unlimited (-1). Specific connection limits is an advanced feature of Boundary and this setting is more friendly for new users. (PR)
Jun 20, 2022

0.9.0 (2022/06/20)

New and Improved

  • PKI Workers: This release introduces a new worker type pki which authenticates to Boundary using a new certificate-based method, allowing for worker deployment without using a shared KMS.
  • Credentials: This release introduces a new credential store type static, which simply takes in a user-supplied credential and stores it (encrypted) directly in Boundary. Currently, the static credential store can hold credentials of type username_password. These credentials can act as credential sources for targets, similar to credential libraries from the vault credential store, and thus can be brokered to users at session authorization time. PR
  • boundary connect Credential Brokering Integration: we have extended integration into the boundary connect helpers. A new sshpass style has been added to the ssh helper, when used, if the credential contains a username/password and sshpass is installed, the command will automatically pass the credentials to the ssh process. Additionally, the default ssh helper will now use the username of the brokered credential. PR.
  • controller: Improve response time for listing sessions. This also creates a new periodic job that will delete terminated sessions after 1 hour. See Deprecations/Changes for some additional details. PR.
  • event filtering: Change event filters to use lowercase and snake case for data elements like the rest of Boundary filters do.
  • ui: Use include_terminated flag for listing sessions. PR.
  • ui: Add Quick Setup onboarding guide. PR.

Bug Fixes

  • The plugin execution_dir configuration parameter is now respected. PR.
  • ui: Fix Users page not updating fields correctly. PR.

Deprecations/Changes

  • Targets: Removes support for credential libraries with respect to Target resources. The library fields and actions were deprecated in Boundary 0.5.0, please use credential sources instead. See changelog referenced above for more details (PR).
  • Credential Libraries: The user_password credential type has been renamed to username_password to remove any inconsistency over what the credential type is. All existing user_password typed credential libraries will be migrated to username_password (PR).
  • controller: Change the default behavior of the session list endpoint to no longer include sessions in a terminated state and introduces a new query parameter/cli flag to include the terminated sessions. This also removes the connection information from the list response. PR.
  • Anonymous user permissions: In order to reduce the risk of accidental and unintended granting of permissions to anonymous users, the permissions system now only allows certain actions on certain resources to be assigned to the anonymous user; currently these are the same permissions as assigned in Boundary's default role permissions. If other use-cases arise this list can be expanded. See the documentation for more details.
May 16, 2022

0.8.1 (2022/05/13)

Bug Fixes

  • controller: Do not shut down cluster listener when it receives an invalid packet (Issue, PR)
  • session: update cancel_session() function to check for terminated state (Issue, PR)
May 3, 2022

0.8.0 (2022/05/03)

New and Improved

  • metrics: provide metrics for controllers and workers
  • controller: new health endpoint (PR).
  • Improve response time for listing sessions and targets. PR
  • ui: Add support for worker filters in targets.
  • ui: Add manual refresh button in sessions list.

Bug Fixes

  • worker: create new error to prevent event.newError: missing error: invalid parameter and handle session cancel with no TOFU token (Issue, PR)
  • controller: Reconcile DEKs with existing scopes (Issue, PR)
  • Fix for retrieving sessions that could result in incomplete results when there is a large number (10k+) of sessions. PR
  • session: update session state trigger to prevent transitions to invalid states (Issue, PR)
Mar 16, 2022

0.7.6 (2022/03/15)

Bug Fixes

  • sessions: Sessions and session connections have been refactored to better isolate transactions and prevent resource contention that caused deadlocks. (Issue, PR)
  • scheduler: Fix bug that causes erroneous logs when racing controllers attempted to run jobs (Issue, PR).
Feb 17, 2022

0.7.5 (2022/02/17)

New and Improved

  • cli: Update authentication examples to remove password flag and make subcommend selection a bit clearer (PR)
  • Data Warehouse: Add addresses on plugin based hosts to the database warehouse. 3 new dimension tables have been added including wh_network_address_group (which is now referenced by wh_host_dimension), wh_network_address_dimension, and wh_network_address_group_membership. (PR)
  • ui: Add support for dynamic host catalog. AWS and Azure plugin-based CRUD operations.

Bug Fixes

  • targets: Specifying a plugin based host id when authorizing a session now works. (PR)
  • targets: DNS names are now properly parsed when selecting an endpoint for authorizing a session. (PR)
  • hosts: Static hosts now include the host sets they are in. (PR)
Jan 18, 2022

0.7.4 (2022/01/18)

Deprecations/Changes

  • In newly-created scopes, if default role creation is not disabled, the roles will now contain a grant to allow listing targets. This will still be subject to listing visibility rules, so only targets the user is granted some action on (such as authorize-session) will be returned.

New and Improved

  • config: The description field for workers now supports being set from environment variables or a file on disk (PR)
  • config: The max_open_connections field for the database field in controllers now supports being set from environment variables or a file on disk (PR)
  • config: The execution_dir field for plugins now supports being set from environment variables or a file on disk.(PR)
  • config: Add support for reading worker controllers off of environment variables as well as files. (PR)
  • config: The description field for controllers now supports being set from environment variables or a file on disk (PR)
  • config: Add support for reading worker tags off of environment variables as well as files. (PR)
  • config: Add support for go-sockaddr templates to Worker and Controller addresses. (PR)
  • controllers/workers: Add client IP to inbound request information which is included in Boundary events (PR)
  • host: Plugin-based host catalogs will now schedule updates for all of its host sets when its attributes are updated. (PR)
  • scopes: Default roles in newly-created scopes now contain a grant to allow listing targets. (PR)
  • plugins/aws: AWS plugin based hosts now include DNS names in addition to the IP addresses they already provide.

Bug Fixes

  • session: Fix duplicate sessions and invalid session state transitions. (PR)
Dec 16, 2021

0.7.3 (2021/12/16)

Bug Fixes

  • target: Fix permission bug which prevents the UI from being able to add and remove host sources on a target. (PR)
  • credential: Fix panic during credential issue when a nil secret is received. This can occur when using the Vault KV backend which returns a nil secret and no error if the secret does not exist. (PR)
Dec 15, 2021

0.7.2 (2021/12/14)

Security

  • Boundary now uses Go 1.17.5 to address a security vulnerability (CVE-2021-44716) where an attacker can cause unbounded memory growth in a Go server accepting HTTP/2 requests. See the Go announcement for more details. (PR)
Nov 19, 2021

0.7.1 (2021/11/18)

Bug Fixes

  • db: Fix panic invoking the CLI on Windows. Some changes to how the binary is initialized resulted in running some functions on every startup that looked for some embedded files. However, Go's embed package does not use OS-specific path separators, so a mismatch between path separators caused a failure in the function. (PR)
Nov 17, 2021

0.7.0 (2021/11/17)

Deprecations/Changes

  • tls: Boundary's support for TLS 1.0/1.1 on the API listener was broken. Rather than fix this, we are simply not supporting TLS 1.0/1.1 as they are insecure.

New and Improved

  • Boundary now supports dynamic discovery of host resources using our (currently internal) new plugin system. See the documentation for configuration instructions. Currently, only Azure and AWS are supported, but more providers will be following in future releases.
  • workers: The existing worker connection replay prevention logic has been enhanced to be more robust against attackers that have decryption access to the shared worker-auth KMS key (PR)

Bug Fixes

  • tls: Support TLS 1.2 for more clients. This was broken for some clients due to a missing mandated cipher suite of the HTTP/2 (h2) specification that could result in no shared cipher suites between the Boundary API listener and those clients. (PR)
  • vault: Fix credential store support when using Vault namespaces (Issue, PR)
Sep 28, 2021

0.6.2 (2021/09/27)

Deprecations/Changes

  • permissions: Fix bug in Host Sets service that authenticated requests
    againist incorrect grant actions. This bug affects the SetHosts, AddHosts and RemoveHosts paths that do not have wildcard (*) action grants. If affected, please update grant actions as follows:
    • set-host-sets -> set-hosts
    • add-host-sets -> add-hosts
    • remove-host-sets -> remove-hosts (PR).
  • Removes support for the auth-methods/<id>:authenticate:login action that was deprecated in Boundary 0.2.0, please use auth-methods/<id>:authenticate instead. (PR).
  • Removes support for the credential field within auth-methods/<id>:authenticate action. This field was deprecated in Boundary 0.2.0, please use attributes instead. (PR).
Sep 15, 2021

0.6.1 (2021/09/14)

Bug Fixes

  • grants: Fix issue where credential-store, credential-library, and managed-group would not be accepted as specific type values in grant strings. Also, fix authorized actions not showing credential-store values in project scope output. (PR)
  • actions: Fix sessions collection actions not being visible when reading a scope (PR)
  • credential stores: Fix credential stores not showing authorized collection actions (PR)
Sep 9, 2021

0.6.0 (2021/09/03)

New and Improved

  • ui: Reflect user authorized actions in the UI: users now see only actionable items for which they have permissions granted.
  • ui: Icons refreshed for a friendlier look and feel.

Bug Fixes

  • controller: Fix issue with recursive listing across services when using the unauthenticated user (u_anon) with no token and the list was started in a scope where the user does not have permission (PR)
  • grants: Fix grant format type=<type>;output_fields=<fields> with no action specified. In some code paths this format would trigger an error when validating even though it is correctly handled within the ACL code. (PR)
  • targets: Fix panic when using boundary targets authorize-session (issue, PR).
Aug 19, 2021

0.5.1 (2021/08/16)

New and Improved

  • Data Warehouse: Add OIDC auth method and accounts to the database warehouse. Four new columns have been added to the wh_user_dimension table: auth_method_external_id, auth_account_external_id, auth_account_full_name, and auth_account_email. (PR)

Bug Fixes

  • events: Fix panic when using the hclog-text event's format. (PR)
  • oidc managed groups: Allow colons in selector paths (PR)
Aug 5, 2021

0.5.0 (2021/08/02)

Deprecations/Changes

  • With respect to Target resources, two naming changes are taking place. Note that these are not affecting the resources themselves, only the fields on Target resources that map them to targets:
    • Credential Libraries: In Target definitions, the field referring to attached credential libraries is being renamed to the more abstract credential sources. In the future Boundary will gain the ability to internally store static credentials that are not generated or fetched dynamically, and the sources terminology better reflects that the IDs provided are a source of credentials, whether via dynamic generation or via the credentials themselves. This will allow a paradigm similar to principals with roles, where the principal IDs can be a users, groups, and managed groups, rather than having them split out, and should result in an easier user experience once those features roll out compared to having separate flags and fields. In this 0.5 release the Boundary CLI has gained parallel application-credential-source flags to the existing application-credential-library flags, as well as boundary targets add/remove/set-credential-sources commands that parallel boundary targets add/remove/set-credential-libraries commands. This parallelism extends to the API actions and the grants system. In 0.6, the library versions of these commands, flags, and actions will be removed.
    • Host Sets: Similarly, in Target definitions, the field referring to attached host sets is being renamed to the more abstract host sources. In the future Boundary will allow attaching some host types directly, and possibly other mechanisms for gathering hosts for targets, so the sources terminology better reflects that the IDs provided are a source of hosts, whether via sets or via the hosts themselves. Like with credential sources, in this 0.5 release the Boundary CLI and API have gained parallel API actions and fields, and the set versions of these will be removed in 0.6.

New and Improved

  • OIDC Accounts: When performing a read on an oidc type account, the original token and userinfo claims are provided in the output. This can make it significantly easier to write filters to create managed groups. (PR)

  • Controllers will now mark connections as closed in the database if the worker has not reported its status; this can be seen as the controller counterpart to the worker-side session cleanup functionality released in 0.4.0. As with the worker, the timeout for this behavior is 15s.

  • Workers will shut down connections gracefully upon shutdown of the worker, both closing the connection and sending a request to mark the connection as closed in the database.

  • Pressing CTRL-C (or sending a SIGINT) when Boundary is already shutting down due to a CTRL-C or interrupt will now cause Boundary to immediately shut down non-gracefully. This may leave various parts of the Boundary deployment (namely sessions or connections) in an inconsistent state.

  • Events: Boundary has moved from writing hclog entries to emitting events. There are four types of Boundary events: error, system, observation and audit. All events are emitted as cloudevents and we support both a cloudevents-json format and custom Boundary cloudevents-text format.

    Notes:

    • There are still a few lingering hclog bits within Boundary. If you wish to only output json from Boundary logging/events then you should specify both "-log-format json" and "-event-format cloudevents-json" when starting Boundary.
    • Filtering events: hclog log levels have been replaced by optional sets of allow and deny event filters which are specified via configuration, or in the case of "boundary dev" there are new new cmd flags.
    • Observation events are MVP and contain a minimal set of observations about a request. Observations are aggregated for each request, so only one observation event will be emitted per request. We anticipate that a rich set of aggregate data about each request will be developed over time.
    • Audit events are a WIP and will only be emitted if they are both enabled and the env var BOUNDARY_DEVELOPER_ENABLE_EVENTS equals true. We anticipate many changes for audit events before they are generally available including what data is included and different options for redacting/encrypting that data.

    PRs: hclog json,text formats, log adapters, unneeded log deps, update eventlogger, convert from hclog to events, event filtering, cloudevents node, system events, convert errors to events, integrate events into servers, event pkg name, events using ctx, add eventer, and base event types

Bug Fixes

  • config: Fix error when populating all kms purposes in separate blocks (as well as the error message) (issue, PR)
  • server: Fix panic on worker startup failure when the server was not also configured as a controller (PR)

New and Improved

  • docker: Add support for muti-arch docker images (amd64/arm64) via Docker buildx
Latest
v0.21.2
Tracking Since
Oct 14, 2020
Last checked Apr 8, 2026