Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

teleport 17.3.0 #209311

Merged
merged 2 commits into from
Mar 1, 2025
Merged

teleport 17.3.0 #209311

merged 2 commits into from
Mar 1, 2025

Conversation

BrewTestBot
Copy link
Member

Created by brew bump


Created with brew bump-formula-pr.

release notes
## Description

Automatic Updates

17.3 introduces a new automatic update mechanism for system administrators to
control which Teleport version their agents are running. You can now configure
the agent update schedule and desired agent version via the autoupdate_config
and autoupdate_version resources.

Updates are performed by the new teleport-update binary. This new system is
package manager-agnostic and opt-in. Existing agents won't be automatically
enrolled, you can enroll existing 17.3+ agents by running teleport-update enable.

teleport-update will become the new standard way of installing Teleport as it
always picks the appropriate Teleport edition (Community vs Enterprise), the
cluster's desired version, and the correct Teleport variant (e.g. FIPS-compliant
cryptography).

Package layout changes

Starting with 17.3.0, the Teleport DEB and RPM packages, notably used by the
apt, yum, dnf and zypper package managers, will place the Teleport
binaries in /opt/teleport instead of /usr/local/bin.

The binaries will be symlinked to their previous location, no change should be
required in your scripts or systemd units.

This change allows us to do automatic updates without conflicting with the
package manager.

Delegated joining for Oracle Cloud Infrastructure

Teleport agents running on Oracle Cloud Infrastructure (OCI) are now able to
join the Teleport cluster without a static join token.

Stable UIDs for host-user creation

Teleport now provides the ability to create host users with stable UIDs across
the entire Teleport cluster.

VNet for Windows

Teleport's VNet feature are now available for Windows, allowing users to access
TCP applications protected by Teleport as if they were on the same network.

Improved GitHub Proxy enrollment flow

Teleport web UI now provides wizard-like guided enrollment flow for the new
GitHub Proxy integration.

AWS Identity Center integration improvements

AWS Identity Center integration now supports using IAM authentication instead of
OIDC (useful for private clusters) and a hybrid setup that allows to use another
IdP as external identity source.

Okta integration improvements

Teleport Okta integration now provides updated guided enrollment flow and will
allow updating integration settings (such as sync configuration or group
filters) without having to recreate the integration.

Note that the new enrollment flow uses OAuth authentication method instead of
API tokens. If the Okta integration is installed on v17.3 and the cluster is
downgraded the Okta plugin must be reinstalled to ensure proper functionality.

Readiness endpoint changes

The Auth Service readiness now reflects the connectivity from the instance to
the backend storage, and the Proxy Service readiness reflects the connectivity
to the Auth Service API. In case of Auth or backend storage failure, the
instances will now turn unready. This change ensures that control plane
components can be excluded from their relevant load-balancing pools. If you want
to preserve the old behaviour (the Auth Service or Proxy Service instance stays
ready and runs in degraded mode) in the teleport-cluster Helm chart, you can
now tune the readiness setting to have the pods become unready after a high
number of failed probes.

Other fixes and improvements

  • Added tctl edit support for Identity Center plugin resources. #52605
  • Added Oracle join method to web UI provision token editor. #52599
  • Added warnings to VNet on macOS about other software that might conflict with VNet, based on inspecting network routes on the system. #52552
  • Added auto-importing of Oracle Cloud tags. #52543
  • Added support for X509 revocations to Workload Identity. #52503
  • Git proxy commands executed in terminals now support interactive login prompts when the tsh session expires. #52475
  • Connect is now installed per-machine instead of per-user on Windows. #52453
  • Added teleport-update for default build. #52361

Enterprise:

  • Improved sync performance in Identity Center integration.
  • Delete related Git servers when deleting GitHub integration in the web UI.

Download

Download the current and previous releases of Teleport at https://goteleport.com/download.

Plugins

Download the current release of Teleport plugins from the links below.

@github-actions github-actions bot added go Go use is a significant feature of the PR or issue nodejs Node or npm use is a significant feature of the PR or issue rust Rust use is a significant feature of the PR or issue bump-formula-pr PR was created using `brew bump-formula-pr` CI-linux-self-hosted Build on Linux self-hosted runner labels Feb 28, 2025
Copy link
Contributor

github-actions bot commented Mar 1, 2025

🤖 An automated task has requested bottles to be published to this PR.

@github-actions github-actions bot added the CI-published-bottle-commits The commits for the built bottles have been pushed to the PR branch. label Mar 1, 2025
@BrewTestBot BrewTestBot enabled auto-merge March 1, 2025 01:06
@BrewTestBot BrewTestBot added this pull request to the merge queue Mar 1, 2025
Merged via the queue into master with commit a389ae2 Mar 1, 2025
15 checks passed
@BrewTestBot BrewTestBot deleted the bump-teleport-17.3.0 branch March 1, 2025 01:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bump-formula-pr PR was created using `brew bump-formula-pr` CI-linux-self-hosted Build on Linux self-hosted runner CI-published-bottle-commits The commits for the built bottles have been pushed to the PR branch. go Go use is a significant feature of the PR or issue nodejs Node or npm use is a significant feature of the PR or issue rust Rust use is a significant feature of the PR or issue
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants