-
Notifications
You must be signed in to change notification settings - Fork 0
/
opendistro-elasticsearch-security-advanced-modules.release-notes
68 lines (46 loc) · 2.46 KB
/
opendistro-elasticsearch-security-advanced-modules.release-notes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
## 2019-11-18 Version 1.3.0.0 (Current)
- Support for Elasticsearch 7.3.2
- Fixed leaked ldap connection
- Use combine bitset for DLS
- Fixed FLS exists query on fields without norms and doc values
- Fixed field masking with aggregations
- Introduced MaskedTermsEnum to fix field anonymization with aggregations
- Added _seq_no and _primary_term to meta fields for FLS
- Fixed rest API validator to accept opendistro_secuirty_roles for internal users
- Exception handling for SAML IdP at startup
- Updated Jackson databind dependency to 2.9.9
- Updated Kafka client dependency to 2.0.1
- Fixed access control exception for ldap2
- Upgraded CXF to 2.3.9
- Bumped jackson-databind from 2.9.9.2 to 2.9.10.1
- Other minor fixes for detailed error logging
## 2019-10-10, Version 1.2.1.0
- Support for Elasticsearch 7.2.1
## 2019-08-07, Version 1.2.0.0
- Support for Elasticsearch 7.2.0
## 2019-06-21, Version 1.1.0.0
- Support for Elasticsearch 7.1
## 2019-06-21, Version 1.0.0.0
- New configuration syntax
- Streamlined the YAML configuration file syntax and added a migration feature to `securityadmin.sh` to help you move from the old file format to the new format.
- Request bodies for calls to the REST API are also slightly different.
- Static default roles
- Previously, all roles were dynamically configured and stored in the Security plugin configuration index, including default roles such as `kibana_read_only` and `logstash`
- Now, all default roles are static, so permission changes to these roles are automatically applied when you upgrade Open Distro for Elasticsearch.
- New LDAP/Active Directory module
- We’ve added a new version of the LDAP/Active Directory module that supports querying multiple userbases/rolebases and more sophisticated connection pooling.
- It replaces the existing module and is fully backward-compatible.
PRs:
https://github.com/opendistro-for-elasticsearch/security-advanced-modules/pull/11
Algorithm is not mandatory for the key material, so we set it to the same as the JWT. Thanks MichelZ@ for contribution.
https://github.com/opendistro-for-elasticsearch/security-advanced-modules/pull/16
Allow KID of JWK's to contain forward slashes
## 2019-04-23, Version 0.9.0.0
- Support For Elasticsearch 6.7
## 2019-04-04, Version 0.8.0.0
- Support For Elasticsearch 6.6
## 2019-03-19, Version 0.7.0.1
- Fixed git repo URLs in pom.xml
- Minor config fixes
## 2019-03-12, Version 0.7.0.0
- Initial launch of security-advanced-modules for opendistro-for-elasticsearch