Boundary 0.18.0 release notes
GA date: October 15, 2024
Release notes provide an at-a-glance summary of key updates to new versions of Boundary. For a comprehensive list of product updates, improvements, and bug fixes refer to the changelog included with the Boundary code on GitHub.
We encourage you to upgrade to the latest release of Boundary to take advantage of continuing improvements, critical fixes, and new features.
Important changes
Change | Description |
---|---|
Role creation | In a future version Boundary will no longer automatically create roles when new scopes are created. This was implemented prior to multi-scope grants to ensure administrators and users had default permissions in new scopes. Since Boundary 0.15, initial roles created for new clusters provide these permissions by default to all scopes using multi-scope grants. |
Docker image no longer contains curl | As of version 0.17.1 and later, the curl binary is no longer included in the published Docker container image for Boundary. The image now includes wget , which you can alternatively use to check the health endpoint for a worker. If your workflow depends on having curl in the image, you can dynamically install it using apk .Learn more: Known issues and breaking changes |
New features
Feature | Update | Description |
---|---|---|
Transparent sessions | BETA | Transparent sessions allows users to eliminate steps in their current workflows using Boundary’s Client Agent, a component that operates in the background to intercept network traffic and automatically route this traffic through a session if the user is authenticated and authorized. Platform teams and access management teams that administer Boundary can now build much faster, simpler secure remote access workflows that feel more intuitive and invisible to their developer customers. Learn more: Transparent sessions and Client Agent. |
Backblaze B2 support for storage buckets | GA | Backblaze B2 is now supported as a storage provider for session recording storage buckets. Learn more: Configure an S3-compliant storage provider. |
AssumeRole support for AWS dynamic host catalogs | GA | AWS host plugins now support AssumeRole. AssumeRole returns a set of temporary security credentials that you can use to access AWS resources. Learn more: AWS dynamic host catalogs. |
Known issues and breaking changes
Version | Issue | Description |
---|---|---|
0.13.0+ | Rotation of AWS access and secret keys during a session results in stale recordings | In Boundary version 0.13.0+, when you rotate a storage bucket's secrets, any new sessions use the new credentials. However, previously established sessions continue to use the old credentials. As a best practice, administrators should rotate credentials in a phased manner, ensuring that all previously established sessions are completed before revoking the stale credentials. Otherwise, you may end up with recordings that aren't stored in the remote storage bucket, and are unable to be played back. |
0.13.0+ | Unsupported recovery workflow during worker failure | If a worker fails during a recording, there is no way to recover the recording. This could happen due to a network connectivity issue or because a worker is scaled down, for example. Learn more: Unsupported recovery workflow |
0.17.1+ | Docker image no longer contains curl | As of version 0.17.1 and later, the curl binary is no longer included in the published Docker container image for Boundary.The image now includes wget . You can use wget to check the health endpoint for workers.Learn more: Check the health endpoint using wget If your workflow depends on having curl in the image, you can dynamically install it using apk . Refer to the following commands for examples of using apk to install curl :<CONTAINER-ID> apk add curl or kubectl exec -ti <NAME> -- apk add curl |
0.18.0 (Fixed in 0.18.1) | Users are incorrectly removed from managed groups | If your organization has over 10,000 managed groups, Boundary may incorrectly remove users from the managed group memberships. In version 0.18.0 and earlier, there was a maximum number of managed groups supported for an auth method. If you had over 10,000 managed groups, Boundary may have incorrectly removed a user from a group during authentication. This issue is fixed in version 0.18.1. There is no longer a maximum number of managed groups. Learn more: Managed groups Upgrade to the latest version of Boundary |