Releases: cyberark/conjur-api-go
Releases · cyberark/conjur-api-go
v0.11.4
[0.11.4] - 2024-05-09
Security
- Rollback to Go 1.20 as a requirement to build conjur-cli-go as FIPS
compliant (CONJSE-1864)
v0.11.2
[0.11.2] - 2024-04-18
Changed
- Added validate policy (CNJR-4539)
Security
- Upgrade to Go 1.22 (CONJSE-1842)
v0.11.1
Changed
- Improved error message for failed JWT authentication
cyberark/conjur-api-go#169
Security
- Upgrade Go to 1.20 and golang.org/x/sys to 0.8.0
cyberark/conjur-api-go#175 - Upgrade ruby in bin/parse-changelog.sh from 2.5 to 3.1
cyberark/conjur-api-go#172
v0.11.0
Added
- Added support for Conjur's LDAP authenticator
cyberark/conjur-api-go#141 - Added support for Conjur's OIDC authenticator
cyberark/conjur-api-go#144 - Added
CONJUR_AUTHN_JWT_TOKEN
to support authenticating via authn-jwt with the contents of a JSON Web Token (JWT) cyberark/conjur-api-go#143 - Added new API method
CheckPermissionForRole
cyberark/conjur-api-go#153
Removed
- Remove all usage of Conjur v4
cyberark/conjur-api-go#139
Changed
- Resource IDs can now be partially-qualified, adhering to the form
[<account>:]<kind>:<identifier>
.
cyberark/conjur-api-go#153 - User and Host IDs passed to their respective API key rotation functions can
now be fully-qualified, adhering to the form[[<account>:]<kind>:]<identifier>
.
cyberark/conjur-api-go#166 - The Hostfactory id is no longer required to be a fully qualified id.
cyberark/conjur-api-go#164
Security
- Upgrade gopkg.in/yaml.v3 indirect dependencies to v3.0.1 and Dockerfile to golang:1.19.5
cyberark/conjur-api-go#158
v0.10.2
Fixed
- Fixed bug with
CONJUR_AUTHN_JWT_HOST_ID
environment variable not being read
cyberark/conjur-api-go#136
v0.10.1
Changed
- Update testify to 1.7.2
cyberark/conjur-api-go#133
v0.10.0
Added
- New
CONJUR_AUTHN_JWT_HOST_ID
environment variable for authn-jwt cyberark/conjur-api-go#130
v0.9.0
Changed
- Update Dockerfile to use Go 1.17 base image
cyberark/conjur-api-go#126
Added
- New
CONJUR_AUTHN_JWT_SERVICE_ID
&JWT_TOKEN_PATH
environment variables as configuration to support authn-jwt
cyberark/conjur-api-go#124
v0.8.1
v0.8.0
Changed
- RetrieveBatchSecretsSafe method is updated to use the
Accept-Encoding
header
instead ofAccept
, consistent with recent updates on the Conjur server.
cyberark/conjur-api-go#99
Added
- New check in RetrieveBatchSecretSafe method which will return an error if the
Content-Type
header
is not set in the response (this indicates Conjur is out of date with the client).
cyberark/conjur-api-go#104