Tetrate Service BridgeVersion: 1.11.x
Release Notes
Version 1.11.1
- Added t1 support for direct mode shared t2 gateway.
- Fixed the following CVEs: CVE-2024-5535, CVE-2024-9143, CVE-2024-47535, CVE-2024-7254, CVE-2024-41110, CVE-2024-9681, CVE-2024-41110, CVE-2024-45337.
- Enhanced the configuration profiles blame output to better identify whether a configuration value originates from a profile default or a profile mandate. Additionally, added functionality to trace the specific profile attachment for each configuration value.
- Enhanced the list of available profiles to exclude those already attached higher in the resource hierarchy.
- Enhanced the Gateway HTTP JWT Authentication with the added fields for "fromHeaders" and "fromCookies".
- Enhanced the usability of the Tree View in Tracing with zooming and panning.
- Enhanced UX of profile configuration editor.
- Made it easier to distinguish between set and unset values.
- The defaults and mandates configurations are now displayed on the same tab, allowing for seamless editing.
- Cleaned up YAML and JSON views to only show fields that have been set.
- Display the JSON of the entire Profile object, making it easier to use in GitOps purpose.
Outstanding CVEs
At the time of shipping, there are no Critical and High vulnerabilities flagged. The following CVEs (medium/low) have been identified as being present in some images by our security tools. They have been evaluated by Tetrate Product Security and are not exploitable in TSB installations. Where applicable, this was ascertained by using static code analysis tools.
- CVE-2024-10041 - No fix available.
- CVE-2024-26462 - No fix available.
- CVE-2024-10963 - No fix available.
- PRISMA-2021-0153 - No fix available.
- CVE-2024-28180 - No fix available.
- CVE-2021-31879 - No fix available.
- CVE-2022-40735 - No fix available.
- CVE-2023-4039 - No fix available.
- CVE-2024-6119 - No fix available.
- CVE-2024-0406 - No fix available.
- CVE-2019-25210 - No fix available.
- CVE-2024-26461 - No fix available.
- CVE-2024-4603 - No fix available.
- CVE-2016-20013 - No fix available.
- CVE-2016-2781 - No fix available.
- CVE-2022-3219 - No fix available.
- CVE-2023-50495 - No fix available.
- CVE-2023-45918 - No fix available.
- CVE-2012-2663 - No fix available.
- CVE-2024-2236 - No fix available.
- CVE-2022-27943 - No fix available.
- CVE-2010-4756 - No fix available.
- CVE-2024-26458 - No fix available.
- CVE-2024-5535 - No fix available.
- CVE-2019-1010022 - No fix available.
- CVE-2023-29383 - No fix available.
- CVE-2023-34969 - No fix available.
- CVE-2024-0727 - No fix available.
- CVE-2018-20796 - No fix available.
- CVE-2023-5678 - No fix available.
- CVE-2024-41996 - No fix available.
- CVE-2022-4899 - No fix available.
- CVE-2022-41409 - No fix available.
- CVE-2023-26604 - No fix available.
- CVE-2023-7008 - No fix available.
- CVE-2017-11164 - No fix available.
- CVE-2019-1010025 - No fix available.
- CVE-2018-1000021 - No fix available.
- CVE-2019-9192 - No fix available.
- CVE-2023-6129 - No fix available.
- CVE-2019-1010023 - No fix available.
- CVE-2024-4741 - No fix available.
- CVE-2013-4235 - No fix available.
- CVE-2023-6237 - No fix available.
- CVE-2019-1010024 - No fix available.
- CVE-2024-2511 - No fix available.
Version 1.11.0
- In the Service Registry, values previously found in the
ExternalAddresses
andHostnames
fields are now returned in theHostnames
andInternalHostnames
fields, respectively. TheExternalAddresses
field now contains a list of IPs or load balancer hostnames that can be used to reach the service from outside the mesh. - The STRICTER propagation for WASM extensions from all Security Settings has been changed so that it is not accumulative. Instead, the WASM Extension collection applied in a parent resource will overwrite their children's. This is more secure and gives more control to privileged users on the extensions that can be used in the different workspaces.
- By default, new clusters will use LOCAL namespace scoping if no other scope is specified. This default setting is chosen because most use cases do not involve cross-cluster applications. As a result, the service registry will provide a more accurate view of the services within the mesh. Note: You can always update the namespace scoping by modifying the Cluster resource.
- Added a new metric
service_relation_mtls_percentage
for service relation (tcp_service_relation_mtls_percentage
for TCP service relation) to reflect the percentage of calls that use mutual TLS, the percentage is multiplied by 100 and is in range[0, 10000]
, e.g.500
means5.00%
and1234
means12.34%
. - Minimum length is now enforced for the HMAC keys. A key of the same size as the hash output (for instance, 256 bits for "HS256") or larger MUST be used with this algorithm. This requirement is based on Section 5.3.4 (Security Effect of the HMAC Key) of NIST SP 800-117 [NIST.800-107], which states that the effective security strength is the minimum of the security strength of the key and two times the size of the internal hash value.
- This release bumps the Istio version to 1.22. Please check the upgrade notes to understand the implications of the upgrade.
- Added a configuration to set the retention period days for traces data, the default value is 3 days. This can be configured in the ManagementPlane resource:
telemetryStore:
tracesRetentionPeriodDays: 5 - When isolation boundaries are enabled for the first time on an existing TSB install, the
istio-gateway
namespace will not be deleted automatically anymore. If this namespace is not required, users are advised to delete this namespace manually. If it is required to delete this namespace, one needs to cleanup the terminating resources by removing finalizers usingkubectl get iop -n istio-gateway -o name | xargs -I % kubectl patch % -n istio-gateway -p '{"metadata":{"finalizers":null}}' --type=merge;
. After which the namespace can be deleted normally. Read more on isolation boundaries post upgrade cleanup steps. - Enabled automatically refreshing access token using refresh token in OIDC response by default. To toggle this option use
useRefreshToken
option in gateway authentication:authentication:
oidc:
clientId: "example-client"
clientTokenSecret: "example-secret"
redirectUri: http://httpbin.example.com/bearer
provider:
issuer: https://example.com/issuer
authorizationEndpoint: https://example.com/authorize/v1
tokenEndpoint: https://example.com/authorize/v1/token
jwksUri: https://example.com/authorize/v1/jwks
useRefreshToken: false - TSB can run kong plugins as an extension. This needs a sidecar to be injected in TSB called
tetrate-kong-extender
. The image for this sidecar is currently not supported for FIPS mode and will fail to install. Please refer HowTos to know about extending TSB in detail.
Upgrade notes
- If the Management Plane runs on Azure and uses a managed database with Azure AD credentials, you will need to
create an additional federated credential for the new
tsb-n2ac
service account introduced in TSB 1.11. Further details can be found in the Configuring Azure AD with PostgreSQL in TSB guide. - In 1.11, the
postgres-credentials
secret in the Management Plane namespace is updated. If you are doing a Helm based upgrade, no additional steps are required. However, if the upgrade is being done by generating the manifests withtctl
, the manifest for thepostgres-credentials
secret needs to be regenerated with the tctl install manifest management-plane-secrets command and applied as well. The changes in the secret are the addition of a.pg_service.conf
key to it, that is required for 1.11.