Releases: enclaver-io/enclaver
Releases · enclaver-io/enclaver
v0.6.1
What's Changed
- Remove docs/ in favor of enclaver.io docs
- Bump dependencies
- Generate SLSA provenance
- Output image sources info
Full Changelog: v0.6.0...v0.6.1
v0.6.0
What's Changed
- Print enclave CID on startup
- move credentials get to avoid stale tokens
- fix(kms): Include
SharedSecretplaintext in response toDeriveSharedSecretby @joshdoman - Bump dependencies by
- Fix generate data key pair
- Switch to enclaver.io registry
New Contributors
- @joshdoman made their first contribution in #222
Full Changelog: v0.5.0...v0.6.0
v0.5.0
- This is a maintenance release that updates a number of dependencies.
- A number of dependencies, in particular aws-* and hyper, were major version bumps and required many modifications to the codebase.
v0.4.3
- Default egress proxy port changed
- If you used the default proxy port (9000), make sure to rebuild the images with this version of the Enclaver before running them.
- The new port is 10000, changed to avoid a conflict with nitro-cli heartbeat port
- Fixed a docker image pull error from some registries
- Updated dependencies
v0.4.2
Security
- Update dependencies to address GHSA-q6cp-qfwq-4gcv and GHSA-6g7w-8wpp-frhj (#187)
v0.4.1
Security
- Update dependencies to address GHSA-8r5v-vm4m-4g25 and GHSA-r24f-hg58-vfrw (#186)
v0.4.0
Security
- Update dependencies to address GHSA-8qv2-5vq6-g2g7 (#174)
- Update dependencies to address GHSA-c827-hfw6-qwvm (#174)
Features
v0.3.1
Security
- Update dependencies to address GHSA-8qv2-5vq6-g2g7 (#174)
- Update dependencies to address GHSA-c827-hfw6-qwvm (#174)
v0.3.0
Security
- Use EdgeBit to scan repository for vulnerabilities (#158)
- Update dependencies to address GHSA-g98v-hv3f-hcfr (#161)
- Update dependencies to address GHSA-8qv2-5vq6-g2g7 (#162)
Features
- Added
--verboseflag for controlling the amount of logging output (#160)
Documentation Updates
- Run Your First Enclave
New guide for running an example application within an enclave
Internal Development
v0.2.0
Features
- Reduced container image sizes by using builder images (PR #118)
- Improved logging of errors that occur on startup (Fixes #75)
- Improved automatic update management of internal dependencies (PR #110)
- CloudFormation for EKS node groups to use Enclaver images (PR #113)
Documentation Updates
-
Using the KMS proxy
New guide to using the KMS proxy with Go, NodeJS, Ruby, and Python to automatically attach the attestation document to API requests. -
Deploy on Kubernetes
For Kubernetes users, a provided CloudFormation allows for easy creation of EKS node groups. The documentation contains an example Deployment/Pods that install and run secure enclaves alongside your other Kubernetes applications. -
Embedded videos for the AWS, Kubernetes and No-Fly-List guides
-
Various updates to the Architecture document