You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: security/zero_trust_workload_identity_manager/zero-trust-manager-release-notes.adoc
+184-2Lines changed: 184 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,8 +11,190 @@ The {zero-trust-full} leverages Secure Production Identity Framework for Everyon
11
11
12
12
These release notes track the development of {zero-trust-full}.
13
13
14
-
:FeatureName: Zero Trust Workload Identity Manager
15
-
include::snippets/technology-preview.adoc[]
14
+
[id="zero-trust-manager-release-notes-1-0-0"]
15
+
== {zero-trust-full} 1.0.0 (General Availability)
16
+
17
+
Issued: 2025-12-17
18
+
19
+
This release of the {zero-trust-full} introduces new capabilities focused on enterprise readiness, security, and operational flexibility. Key features include SPIRE federation support for cross-cluster identity, PostgreSQL database support for production persistence, and enhanced security controls implemented through stricter Security Context Constraints (SCCs) and comprehensive API validation.
20
+
21
+
{zero-trust-full} supports the following components and versions:
The Operator now includes support for SPIRE federation, enabling workloads across distinct trust domains to securely communicate and authenticate with each other.
51
+
52
+
* Key capabilities:
53
+
54
+
** Configuration of bundle endpoints using `https_spiffe` (mTLS) or `https_web` (Web PKI) profiles.
55
+
** Automatic certificate management via the ACME protocol (e.g., Let's Encrypt).
56
+
** Automatic {product-title} route creation for federation endpoints.
57
+
** Ability to configure relationships with multiple federated trust domains.
58
+
59
+
* Customer Action Required:
60
+
61
+
** Review the `federation` configuration within the `SpireServer Custom Resource (CR).
62
+
** Ensure proper DNS resolution and network connectivity to federated trust domains.
==== Configurable agent socket path and Container Storage Interface (CSI) plugin name
66
+
67
+
The SPIRE Agent socket path and the SPIFFE CSI Driver plugin name are now configurable, providing operational flexibility for environments with specific directory requirements or co-existence with multiple SPIFFE deployments.
68
+
69
+
* Key configuration points:
70
+
71
+
** `SpireAgent.spec.socketPath`
72
+
** `SpiffeCSIDriver.spec.agentSocketPath`
73
+
** `ApiffeCSIDriver.spec.pluginName`
74
+
75
+
* Customer action required:
76
+
77
+
** Ensure consistency between `socketPath` in the `SpireAgent` CR and `agentSocketPath` in the `SpiffeCSIDriver` CR.
A new API has been introduced to configure kubelet certificate verification for workload attestation, enhancing security and supporting various OpenShift configurations.
==== Configurable Certificate Authority and JSON Web Token key types
92
+
93
+
Administrators can now configure the cryptographic key types used for the SPIRE Server Certificate Authority (CA) and JSON Web Token (JWT) signing, ensuring compliance with organizational security policies.
* The Operator and all associated operands can now be deployed within a custom namespace, providing flexibility for organizations with specific namespace governance requirements.
SPIRE Server now supports PostgreSQL as an external database backend, accommodating production deployments that necessitate enterprise-grade data persistence and high availability.
Comprehensive Common Expression Language (CEL) validation has been integrated into all Custom Resource Definitions (CRDs) to prevent configuration errors during admission control.
134
+
135
+
* Key validations:
136
+
137
+
** All Operator CRDs are enforced as singletons (must be named `cluster`).
138
+
** Immutable Fields: Fields including `trustDomain`, `clusterName`, `bundleConfigMap`, federation `bundleEndpoint`, and all `Persistence` settings (`size`, `accessMode`, and `storageClass`) are now immutable after initial creation.
139
+
140
+
* Customer action required:
141
+
142
+
** Review existing CR configurations to ensure compliance with the new validation rules.
* Standard configuration options (`labels`, `resources`, `affinity`, `tolerations`, `nodeSelector`) are now standardized across all operand CRs via a shared `CommonConfig` structure.
* Before this update, daemonset, deployment, and `statefulsets`` were not properly reverted to their original form in all valid scenarios due to an oversight in the update logic. As a consequence, user data loss or inconsistency occurred in valid scenarios. With this release, the update logic has been corrected, ensuring all valid scenarios revert to their original form. (link:https://issues.redhat.com/browse/SPIRE-248[SPIRE-248])
194
+
195
+
* Before this update, the SPIRE OpenID Connect (OIDC) discovery provider pod did not restart after a configuration change due to the lack of an automatic restart. As a consequence, end users experienced persistent authentication issues with the SPIRE OIDC. With this release, the SPIRE OIDC discovery provider restarts automatically after `configmap` changes via the custom resource (CR), improving seamless service updates for end users. (link:https://issues.redhat.com/browse/SPIRE-225[SPIRE-225])
196
+
197
+
* Before this update, the Spire-controller manager 'ConfigMap' reconciliation failed due to an unhandled edge case in the previous implementation. As a consequence, users experienced configuration inconsistencies. With this release, the Spire-controller manager `ConfigMap` reconciliation issue has been resolved. (link:https://issues.redhat.com/browse/SPIRE-195[SPIRE-195])
0 commit comments