1
0

0.10.4.rst 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. =========================
  2. Salt 0.10.4 Release Notes
  3. =========================
  4. :release: 2012-10-23
  5. Salt 0.10.4 is a monumental release for the Salt team, with two new module
  6. systems, many additions to allow granular access to Salt, improved platform
  7. support and much more.
  8. This release is also exciting because we have been able to shorten the release
  9. cycle back to under a month. We are working hard to keep up the aggressive pace
  10. and look forward to having releases happen more frequently!
  11. This release also includes a serious security fix and all users are very
  12. strongly recommended to upgrade. As usual, upgrade the master first, and then
  13. the minion to ensure that the process is smooth.
  14. Major Features
  15. ==============
  16. External Authentication System
  17. ------------------------------
  18. The new external authentication system allows for Salt to pass through
  19. authentication to any authentication system to determine if a user has
  20. permission to execute a Salt command. The Unix PAM system is the first
  21. supported system with more to come!
  22. The external authentication system allows for specific users to be granted
  23. access to execute specific functions on specific minions. Access is configured
  24. in the master configuration file, and uses the new access control system:
  25. .. code-block:: yaml
  26. external_auth:
  27. pam:
  28. thatch:
  29. - 'web*':
  30. - test.*
  31. - network.*
  32. The configuration above allows the user `thatch` to execute functions in the
  33. test and network modules on minions that match the web* target.
  34. Access Control System
  35. ---------------------
  36. All Salt systems can now be configured to grant access to non-administrative
  37. users in a granular way. The old configuration continues to work. Specific
  38. functions can be opened up to specific minions from specific users in the case
  39. of external auth and client ACLs, and for specific minions in the case of the
  40. peer system.
  41. Access controls are configured like this:
  42. .. code-block:: yaml
  43. client_acl:
  44. fred:
  45. - web\*:
  46. - pkg.list_pkgs
  47. - test.*
  48. - apache.*
  49. Target by Network
  50. -----------------
  51. A new matcher has been added to the system which allows for minions to be
  52. targeted by network. This new matcher can be called with the `-S` flag on the
  53. command line and is available in all places that the matcher system is
  54. available. Using it is simple:
  55. .. code-block:: bash
  56. $ salt -S '192.168.1.0/24' test.ping
  57. $ salt -S '192.168.1.100' test.ping
  58. Nodegroup Nesting
  59. -----------------
  60. Previously a nodegroup was limited by not being able to include another
  61. nodegroup, this restraint has been lifted and now nodegroups will be expanded
  62. within other nodegroups with the `N@` classifier.
  63. Salt Key Delete by Glob
  64. -----------------------
  65. The ability to delete minion keys by glob has been added to ``salt-key``. To
  66. delete all minion keys whose minion name starts with 'web':
  67. .. code-block:: bash
  68. $ salt-key -d 'web*'
  69. Master Tops System
  70. ------------------
  71. The `external_nodes` system has been upgraded to allow for modular subsystems
  72. to be used to generate the top file data for a highstate run.
  73. The `external_nodes` option still works but will be deprecated in the future in
  74. favor of the new `master_tops` option.
  75. Example of using `master_tops`:
  76. .. code-block:: yaml
  77. master_tops:
  78. ext_nodes: cobbler-external-nodes
  79. Next Level Solaris Support
  80. --------------------------
  81. A lot of work has been put into improved Solaris support by Romeo Theriault.
  82. Packaging modules (pkgadd/pkgrm and pkgutil) and states, cron support and user
  83. and group management have all been added and improved upon. These additions
  84. along with SMF (Service Management Facility) service support and improved
  85. Solaris grain detection in 0.10.3 add up to Salt becoming a great tool
  86. to manage Solaris servers with.
  87. Security
  88. ========
  89. A vulnerability in the security handshake was found and has been repaired, old
  90. minions should be able to connect to a new master, so as usual, the master
  91. should be updated first and then the minions.
  92. Pillar Updates
  93. --------------
  94. The pillar communication has been updated to add some extra levels of
  95. verification so that the intended minion is the only one allowed to gather the
  96. data. Once all minions and the master are updated to salt 0.10.4 please
  97. activate pillar `2` by changing the `pillar_version` in the master config to
  98. `2`. This will be set to `2` by default in a future release.