Changelog

The hash at the front of each changelog entry communicates which container hash the change was made in. There will only ever be multiple hashes in a single changelog if the underlying image was rebuilt to fix a security vulnerability.

v4.0.0

[2021-10-01], Container Hash 6060c635270b: Initial release.
  • Incremental configuration refreshes, which improves performance and memory use when the TSP has many tenants.
  • Removed deprecated metadata interface.
  • Separated tenant-security-logdriver from tenant-security-proxy, see documentation for configuration information.

Compatibility

  • tenant-security-logdriver must be version 4.0.0+
  • TSC-node must be version 2.0.0+
  • TSC-java must be version 3.0.0+

v3.3.6

[2021-08-09], Hash bdb97ebcec5e8: Initial release.
  • Improve performance of TSP startup when many leased keys need to be generated.
  • Reduce per-tenant memory footprint of TSP by sharing HTTP clients.
  • Remove tenant_id label from published metrics to reduce the number of metrics dimensions for cases with many tenants.
  • Dependency updates.
[2021-08-13], Hash cba2994a6675: Update OS dependencies.

v3.3.5

[2021-07-22], Hash c672f6255696: Initial release.
  • Improve performance of TSP startup.
  • Use RustTLS instead of OpenSSL TLS connections.
[2021-08-13], Hash a4184017c28f: Update OS dependencies.

v3.3.4

[2021-07-15], Hash a2f5a64cc362: Initial release.
  • Logging service performance improvements.
[2021-08-13], Hash 668800328ae0: Update OS dependencies.

v3.3.3

[2021-07-12], Hash b48beaac9b8b: Initial release.
  • Dependency updates. No code changes.
[2021-08-13], Hash e6ade0b112a8: Update OS dependencies.

v3.3.1

[2021-05-05], Hash 09c280cb7e2c: Initial release.
  • Fixed a bug leading to dropped security events in cases with high tenant activity for prolonged periods.
[2021-08-13], Hash ed80ef31bb0d: Update OS dependencies.

v3.3.0

[2021-03-02], Hash 5989f0ec8b66: Initial release.
  • Added rekey endpoint and functionality.
[2021-08-13], Hash 3275b0ea9a96: Update OS dependencies.

v3.2.0

[2021-02-12], Hash 1cf65ebcff59: Initial release.
  • Added backwards compatible wrap/unwrap/batch interfaces.
[2021-08-13], Hash 654c9a6ba10a: Update OS dependencies.

Compatibility

  • TSC-node must be version 1.0.0+
  • TSC-java must be version 2.0.0+
In the future we’ll always produce at least a minor migration version when making breaking changes to the TSP/TSC to prevent possible downtime.

v3.1.1

[2021-01-14], Hash ba02d61a407b: Initial release.
  • Fixed a bug that prevented TSP from reporting ready if no logging configs were present.
[2021-08-13], Hash b40d23e2d687: Update OS dependencies.

v3.1.0

[2020-12-18], Hash 15cf874f252b: Initial release.
  • Added prometheus metrics for TSP container.
  • Improved resiliency of reading stored logging events.
  • Added checks for misconfigured logdriver volume.
[2021-08-13], Hash e5776760b5e8: Update OS dependencies.

v3.0.0

[2020-11-16], Hash 4e0add9105d3: Initial release.
  • Added Security Event endpoint and functionality.
  • Fixed a bug that may prevent the TSP from starting when corrupt events are in its DB.
  • Improved TSP stdout log consistency.
  • Added TSP_SEND_LOGGING_TIMEOUT_MS, TSP_SEND_HIGH_WATER_MARK, and TSP_EVENT_LOG_CHANNEL_SIZE optional configurations.
[2021-08-13], Hash fa8e7722c2e7: Update OS dependencies.

Compatibility

  • TSC-node must be version 2.0.2+
  • TSC-java must be version 3.0.1+

v2.3.0

  • (f19221ca0e52) Standardized JSON logging across the proxy and logdriver.
  • (f19221ca0e52) Added limiting functionality to the logdriver tenant buffers. If defaults don’t work for you contact IronCore for settings to tweak.
  • (f19221ca0e52) Improve healthchecks.

v2.2.0

  • (c606f2a368c0) Adds logging of TSP activity to a tenant’s logging system (GCP Stackdriver and Splunk are currently supported). This feature must be configured on a per-tenant basis. If unsent log-events need to survive TSP restarts, a persistent volume needs to be added to the TSP container.

v2.1.0

  • (6944df682377) Enables key leasing feature within the TSP. Key leasing must be enabled on a per-KMS configuration basis for leased keys to be used. By default, upgrading to this version of the TSP will have no effect until a KMS configuration is updated to allow for key leasing.

v2.0.2

  • (95ef07958b78) Fixes unwrap of certain Azure keys which do not contain an embedded version header.

v2.0.1

  • (db9325e6212a) Fix bug that caused KMS config request interval to fail if the Config Broker couldn’t be reached. Now an error message will be logged but the TSP will retry the request to the Config Broker on the next planned interval.
  • (db9325e6212a) Fixes behavior of TSP if the configuration/keys of a running container are revoked within the Config Broker. In this case the TSP will fully exit as it is no longer in an valid state.

v2.0.0

  • (145bc3064d7b) Add batch unwrap and wrap endpoints to the service.
  • (145bc3064d7b) Logging improvements.
  • (145bc3064d7b) Rewrite of the TSP in Rust for performance, stability, and binary size improvements

Note

Key leasing has been pushed to a later release once event logging is completed, 2.0.0 is production ready.

v2.0.0-beta.1

  • (d92361cb9c72) Add key leasing.

Warning

Don’t use in production until audit logging for leased keys is introduced, as tenant KMS logs won’t reflect how the keys are actually being used.

v2.0.0-beta.0

  • (5e7a0f3012c8) Add batch unwrap and wrap endpoints to the service.

v1.4.5

  • (67d1ddefcf67) Add retries on KMS configuration decrypts to cut down on intermittent issues impacting customers.

v1.4.4

  • (dbe1b50d97cb) Add extra logging traces for configuration decrypt calls that fail.

v1.4.3

  • (eee58fccb6ad) Fixed issue with Azure versioned keys.
  • NOTICE on upgrading to this version, any Azure EDEKs should be batch decrypted and re-encrypted to avoid future issues with Azure key versioning.

v1.4.2

  • (1e018f5c32d5) Improved error handling for some classes of Azure KMS authentication errors.

v1.4.1

  • (dc7d20ab52ea) Fixed a replay security vulnerability with API calls to the Config Broker.
  • (6a4f1213f68d) Dropped base image from Alpine 3.10 to Alpine 3.9 now that it is vulnerability free and since 3.10 was sometimes causing segfault problems.

v1.4.0

  • (a5acc4786755) Added additional error codes which provide better granularity about why requests to the tenants KMS failed to succeed. These new error codes are covered in more detail within the Tenant Security Client changelog.
  • (a5acc4786755) Added a single level of retry for when a KMS cannot be reached. If the network is down or some other networking problem occurs, the Proxy will automatically attempt a single retry of the request in case the network was only temporarily unreachable.
  • (f7a276a31e92) Dropped base image from Alpine 3.10 to Alpine 3.9 now that it is vulnerability free and since 3.10 was sometimes causing segfault problems.

v1.3.0

  • (cc1a117eb269) Add caching of KMS SDK clients to prevent authorization rate limiting errors. Clients credentials will be refreshed every time configurations are pulled from the Config Broker.
  • (649aa01c5ccb) Dropped base image from Alpine 3.10 to Alpine 3.9 now that it is vulnerability free and since 3.10 was sometimes causing segfault problems.

v1.2.0 (Unsupported)

  • (73122ce2d6c1) Renamed container to tenant-security-proxy.

Update

Support for this version was dropped due a vulnerability. See the 2019-10-30 entry in our security advisories list.

v1.1.0

  • Changed permissions for and moved PM2 to run within app directory.

v1.0.0

Initial release.

Versioning Policy

See our container versioning policy documentation.