Changelog
0.21.1
Fixed
- Fixes for UI errors saving empty headers, custom text fields, and more
New
- Pass TLS options to HTTP clients
Updated
- Remove device credential references from the user and session
0.21.0
Breaking
- Re-enroll devices and update device IDs due to non-forward compatible internal change
New
- Auto TLS support for Console and Databroker gRPC endpoints
- Client TLS renegotiation for upstream clusters
Fixed
- Fixes to the Enterprise Console's UI, builds, gRPC calls, and more
0.20.1
Fixed
- UI fixes and improvements to branding settings
0.20.0
Breaking
- Groups & Directory sync now managed and sourced from external data sources. See upgrading for details.
Fixed
- Dozens of UI fixes and improvements
- Fixed a bug in policy builder when using groups
- Performance improvements to generated metrics
Updated
- Envoy updated to v1.23.1
0.19.0
New
- Additional error details and policy debugging for Enterprise
- ACME TLS-ALPN support for autocert
- Branding customization for Enterprise
Updated
- Well-Known endpoint handler for Proxy
- Upgrade to Envoy 1.23.0
- Add virtual host domains for all certificates
- Use generic types for sets and atomics
Fixed
- Add CORS headers to JWKS endpoint
- Add authority header to outbound gRPC requests
- Remove not-null constraint on data column of record changes table
0.18.0
New
- Support for external data sources
- Simplified Kubernetes ingress controller
Updated
- Postgres databroker backend
- Upgrade to Envoy 1.21.1
- Data in the Authorize service is now queried on-demand
Fixed
- Various issues related to internal service URLs
- Error pages for forward auth
- Databroker in-memory backend deadlock
0.17.0
New
- Pomerium Enterprise now requires a valid license to start.
Updated
- Route and Policy screens have been redesigned for better UX.
0.16.0
New
- Devices: It is now possible to manage, enroll, approve, and write authorization policy for device identity.
- Signing keys can now be dynamically pulled from the Authenticate service's JWKS endpoint.
- Added the ability to write PPL policy for HTTP method and path contexts.
Updated
- Policies can now incorporate device identity and approval status.
- Routes certificate UI now shows the matching TLS certificate used.
- Routes now has Kubernetes service account token field
- Metric addresses are now shown in the runtime info dashboard.
- Envoy was upgraded to 1.20.1.
- The code editor now supports dark mode.
- Various UI style improvements and fixes.
Fixed
--tls-insecure-skip-verify
was not applied to databroker connections.- Fixed a bug in the host rewrite code (thank you @rankinc for reporting).
- Fixed a bug in the way timeout fields were being displayed.
- Fixed a bug in the way route header fields were being ordered.
Fixed
0.15.2
Fixed
- A regression in the
Deployments
page loading has been corrected.
0.15.1
Fixed
- Tracing settings now persist correctly.
Updated
- Support configuring multiple audiences for the console.
- Improved configuration validation.
- Various UI style improvements.
0.15.0
New
- Telemetry - View real time metrics and status from Pomerium components inside the Enterprise Console.
- More expressive policy syntax: Pomerium's new extended policy language allows more complex policies to be configured, along with non-identity based conditions for access.
- Support for Google Cloud Serverless configuration on routes.
- Support for SPDY configuration on routes.
- More consistent filtering and sorting across resource listing pages.
Updated
- Certificate Management - Certificates with overlapping SAN names are no longer permitted.
- Policies - New editing screen supports Wizard based, Text based or Rego based policy.
- Policies - Only global administrators may manage Rego based policies.
- Policies - Support time based criteria.
- Service Accounts - Simplified UI.
- Service Accounts - Support token expiration time.
- Service Accounts - Namespace support.
- Impersonation - Impersonation is now done on an individual session basis.
- Various other bug fixes and improvements.