salt/doc/topics/releases/0.10.4.rst

136 lines
4.3 KiB
ReStructuredText
Raw Normal View History

2012-10-19 04:26:13 +00:00
=========================
Salt 0.10.4 Release Notes
=========================
:release: 2012-10-23
Salt 0.10.4 is a monumental release for the Salt team, with two new module
systems, many additions to allow granular access to Salt, improved platform
support and much more.
This release is also exciting because we have been able to shorten the release
cycle back to under a month. We are working hard to keep up the aggressive pace
and look forward to having releases happen more frequently!
This release also includes a serious security fix and all users are very
strongly recommended to upgrade. As usual, upgrade the master first, and then
the minion to ensure that the process is smooth.
2012-10-19 04:26:13 +00:00
Major Features
==============
External Authentication System
------------------------------
2012-10-22 22:09:45 +00:00
The new external authentication system allows for Salt to pass through
authentication to any authentication system to determine if a user has
permission to execute a Salt command. The Unix PAM system is the first
supported system with more to come!
The external authentication system allows for specific users to be granted
access to execute specific functions on specific minions. Access is configured
in the master configuration file, and uses the new access control system:
.. code-block:: yaml
external_auth:
pam:
thatch:
- 'web*':
- test.*
- network.*
2012-10-22 22:53:21 +00:00
The configuration above allows the user `thatch` to execute functions in the
test and network modules on minions that match the web* target.
2012-10-22 22:09:45 +00:00
2012-10-19 04:26:13 +00:00
Access Control System
---------------------
2012-10-22 22:09:45 +00:00
All Salt systems can now be configured to grant access to non-administrative
users in a granular way. The old configuration continues to work. Specific
functions can be opened up to specific minions from specific users in the case
of external auth and client ACLs, and for specific minions in the case of the
2012-10-22 22:09:45 +00:00
peer system.
Access controls are configured like this:
.. code-block:: yaml
client_acl:
fred:
- web\*:
- pkg.list_pkgs
- test.*
- apache.*
Target by Network
-----------------
A new matcher has been added to the system which allows for minions to be
targeted by network. This new matcher can be called with the `-S` flag on the
command line and is available in all places that the matcher system is
available. Using it is simple:
.. code-block:: bash
$ salt -S '192.168.1.0/24' test.ping
$ salt -S '192.168.1.100' test.ping
Nodegroup Nesting
-----------------
Previously a nodegroup was limited by not being able to include another
nodegroup, this restraint has been lifted and now nodegroups will be expanded
within other nodegroups with the `N@` classifier.
2012-10-22 22:09:45 +00:00
Salt Key Delete by Glob
-----------------------
2012-10-22 22:53:21 +00:00
The ability to delete minion keys by glob has been added to ``salt-key``. To
delete all minion keys whose minion name starts with 'web':
2012-10-22 22:09:45 +00:00
.. code-block:: bash
$ salt-key -d 'web*'
2012-10-19 04:26:13 +00:00
Master Tops System
------------------
2012-10-22 22:09:45 +00:00
The `external_nodes` system has been upgraded to allow for modular subsystems
to be used to generate the top file data for a highstate run.
The `external_nodes` option still works but will be deprecated in the future in
favor of the new `master_tops` option.
Example of using `master_tops`:
.. code-block:: yaml
master_tops:
ext_nodes: cobbler-external-nodes
2012-10-19 04:26:13 +00:00
Next Level Solaris Support
--------------------------
2012-10-22 22:09:45 +00:00
A lot of work has been put into improved Solaris support by Romeo Theriault.
Packaging modules (pkgadd/pkgrm and pkgutil) and states, cron support and user
and group management have all been added and improved upon. These additions
along with SMF (Service Management Facility) service support and improved
Solaris grain detection in 0.10.3 add up to Salt becoming a great tool
2012-10-22 23:25:29 +00:00
to manage Solaris servers with.
2012-10-22 22:09:45 +00:00
2012-10-19 04:26:13 +00:00
Security
========
2012-10-22 22:53:21 +00:00
A vulnerability in the security handshake was found and has been repaired, old
minions should be able to connect to a new master, so as usual, the master
should be updated first and then the minions.
2012-10-19 04:26:13 +00:00
Pillar Updates
--------------
The pillar communication has been updated to add some extra levels of
verification so that the intended minion is the only one allowed to gather the
2012-10-19 04:26:13 +00:00
data. Once all minions and the master are updated to salt 0.10.4 please
activate pillar `2` by changing the `pillar_version` in the master config to
2014-12-11 03:34:32 +00:00
`2`. This will be set to `2` by default in a future release.