zrok/CHANGELOG.md

56 lines
3.5 KiB
Markdown
Raw Normal View History

2023-01-30 17:39:36 +01:00
# v0.3.0-rc5
CHANGE: Improvements to controller log messages to assist in operations (https://github.com/openziti/zrok/issues/186)
2023-01-30 19:04:35 +01:00
CHANGE: `armv7` builds for Linux are now shipped with releases; these builds were tested against a Raspberry Pi 4 (https://github.com/openziti/zrok/issues/93)
2023-01-30 19:59:02 +01:00
CHANGE: `zrok config set` now includes a warning when the `apiEndpoint` config is changed and an environment is already enabled; the user will not see the change until `zrok disable` is run. The CLI now includes a `zrok config unset` command (https://github.com/openziti/zrok/issues/188)
2023-01-26 17:52:14 +01:00
# v0.3.0-rc4
CHANGE: Enable notarization for macos binaries (https://github.com/openziti/zrok/issues/92)
# v0.3.0-rc3
2023-01-23 19:06:12 +01:00
> This release increments the configuration version from `1` to `2`. See the note below.
CHANGE: The email "from" configuration moved from `registration/email_from` to `email/from`. **NOTE: This change increments the configuration `V` from `1` to `2`.**
2023-01-23 19:11:23 +01:00
CHANGE: Replaced un-salted sha512 password hashing with salted hashing based on Argon2 **NOTE: This version will _invalidate_ all account passwords, and will require all users to use the 'Forgot Password?' function to reset their password.** (https://github.com/openziti/zrok/issues/156)
2023-01-23 19:06:12 +01:00
2023-01-24 17:40:15 +01:00
CHANGE: Switched from `ubuntu-latest` (`22.04`) for the Linux builds to `ubuntu-20.04`. Should improve `glibc` compatibility with older Linux distributions (https://github.com/openziti/zrok/issues/179)
2023-01-24 19:47:50 +01:00
CHANGE: `zrok admin generate` now outputs the generated tokens to `stdout` after successfully provisioning the tokens (https://github.com/openziti/zrok/issues/181)
2023-01-23 22:45:06 +01:00
FIX: Fixed log message in `resetPasswordRequest.go` (https://github.com/openziti/zrok/issues/175)
2023-01-24 18:01:01 +01:00
FIX: Fixed `-v` (verbose mode) on in TUI-based `zrok share` and `zrok access` (https://github.com/openziti/zrok/issues/174)
2023-01-20 19:23:47 +01:00
# v0.3.0-rc2
FEATURE: Allow users to reset their password (https://github.com/openziti/zrok/issues/65)
CHANGE: Improved email styling for new user invite emails (https://github.com/openziti/zrok/issues/157)
CHANGE: Migrated from `openziti-test-kitchen` to `openziti` (https://github.com/openziti/zrok/issues/158).
CHANGE: Show a hint when `zrok invite` fails, indicating that the user should check to see if they need to be using the `--token` flag and token-based invites (https://github.com/openziti/zrok/issues/172).
FIX: Fixed PostgreSQL migration issue where sequences got reset and resulted in primary key collisions on a couple of tables (https://github.com/openziti/zrok/issues/160).
FIX: Remove `frontend` instances when `zrok disable`-ing an environment containing them (https://github.com/openziti/zrok/issues/171)
2023-01-19 19:11:26 +01:00
# v0.3.0
2022-11-11 19:32:08 +01:00
2023-01-19 19:11:26 +01:00
The `v0.2` series was a _proof-of-concept_ implementation for the overall `zrok` architecture and the concept.
2022-11-21 20:05:37 +01:00
2023-01-19 19:11:26 +01:00
`v0.3` is a massive elaboration of the concept, pivoting it from being a simple ephemeral reverse proxy solution, to being the beginnings of a comprehensive sharing platform, complete with public and private sharing (built on top of OpenZiti).
2022-11-21 20:05:37 +01:00
2023-01-19 19:11:26 +01:00
`v0.3.0` includes the minimal functionality required to produce an early, preview version of the elaborated `zrok` concept, suitable for both production use at `zrok.io`, and also suitable for private self-hosting.
2022-11-21 20:05:37 +01:00
2023-01-19 19:11:26 +01:00
From `v0.3.0` forward, we will begin tracking notable changes in this document.
2022-11-14 19:58:42 +01:00
2022-11-11 19:23:51 +01:00
# v0.2.18
2022-11-02 20:23:35 +01:00
2022-11-28 17:22:06 +01:00
* DEFECT: Token generation has been improved to use an alphabet consisting of `[a-zA-Z0-9]`. Service token generation continues to use a case-insensitive alphabet consisting of `[a-z0-9]` to be DNS-safe.