Puppet Server 6.6.0
Released 17 September 2019
New features
-
Puppet Server no longer hardcodes Java’s egd parameter. Users may manage the value via JAVA_ARGS or JAVA_ARGS_CLI in the defaults file. SERVER-2602
-
RedHat 7 FIPS mode packages are now available for
puppetserver. SERVER-2555 -
Puppet Server now lists plan content from your modules, just as it does task content. SERVER-2543
-
You can now enable sending a list of all the Hiera keys looked up during compile to PuppetDB, via the
jruby-puppet.track-lookupssetting inpuppetserver.conf. This is currently only used by CD4PE. SERVER-2538
-Added the /puppet-admin-api/v1/jruby-pool/thread-dump endpoint, which returns a thread dump of running JRuby instances, if jruby.management.enabled has been set to true in the JVM running Puppet Server. See Admin API: JRuby Pool for details. SERVER-2193
-
Puppet Server now runs with JRuby 9.2.8.0. SERVER-2388
-
The
puppetserver ca importcommand now initializes an empty CRL for the intermediate CA if one is not provided in thecrl-chainfile. SERVER-2522
Resolved issues
- Puppet Server can now be reloaded and run with multiple JRuby instances when running under Java 11. This change affects the packaging of Puppet Server. If you are running Puppet Server from source, you must add
facter.jar, provided by thepuppet-agentpackage, to the classpath when starting Puppet Server with Java. SERVER-2423
-Puppet Server’s CA can now handle keys in the PKCS#8 format, which is required when running in FIPS mode. SERVER-2019
Puppet Server 6.5.0
Released 22 July 2019
New features
- The default for the
cipher-suitessetting in the webserver section ofwebserver.confhas been updated. Previously, the defaults included 11 cipher suites, including 4TLS_RSA_*cipher suites. Now the defaults include all cipher suites usable on a RHEL 7 FIPS-enabled server, our target platform for FIPS certification, except forTLS_RSA_*ciphers. Additionally, Puppet Server emits warnings if anyTLS_RSA_*ciphers are explicitly enabled in thecipher-suitessetting.
To avoid potentially breaking clients that can use only TLS_RSA_* ciphers, the webserver.conf file now includes an explicit cipher-suites setting that adds the previously enabled TLS_RSA_* ciphers to the new implicit cipher-suites setting. This has three effects:
- Older clients that require the
TLS_RSA_*ciphers will continue to work. - Puppet Server generates warnings in the logs that the
TLS_RSA_*ciphers are enabled. - Puppet Server generates warnings in the logs if ciphers enumerated in the
cipher-suitessetting are not available on that specific OS. These warnings can be safely silenced by editing thecipher-suitessetting and removing the unavailable ciphers.
A future version of Puppet Server will remove the cipher-suites setting in webserver.conf. This will break any clients that still require the TLS_RSA_* ciphers.
In advance of this change, update any clients that still require the TLS_RSA_* ciphers to clients that can use more recent ciphers, and remove the cipher-suites setting in webserver.conf.
This update also removes the so-linger-seconds configuration setting. This setting is now ignored and a warning is issued if it is set. See Jetty’s so-linger-seconds for removal details.
See SERVER-2576 for further details.
-
You can now specify a
--certnameflag with thepuppetserver ca listcommand, which limits the output to information about the requested cert and logs an error if the requested cert does not exist in any form. SERVER-2589 -
You can now specify a log level for the logs collected by the new catalog compilation endpoint during compilation. See the catalog endpoint docs for information. SERVER-2520
-
In this release, performance in
puppetservercommands is improved. Runningpuppetserver gem,puppetserver irb, and other Puppet Server CLI commands are 15-30 percent faster to start up. Service starting and reloading should see similar improvements, along with some marginal improvements to top-end performance, especially in environments with limited sources of entropy. -
Building Puppet Server outside our network is now slightly easier.
-
Prior to this release, an unnecessary and deprecated version of Facter was shipped in the
puppetserverpackage. This has been removed. -
Cert and CRL bundles no longer need to be in any specific order. By default, the leaf instances still come first, descending to the root, which are last. SERVER-2465
Puppet Server 6.4.0
Released 19 April 2019
New features
- This release adds a new API endpoint to
/puppet/v3/environment_transports. This endpoint lists all of the available network transports from modules and is for use with the Agentless Catalog Executor. SERVER-2467
Puppet Server 6.3.0
Released 26 March 2019
New features
- Puppet Server has a new endpoint for catalog retrieval, allowing more options than the previous endpoint. This endpoint is controlled by
tk-auth, and by default is not generally accessible. It is an API that integrators can use to provide functionality similar topuppet master --compile. For details on the API, see the Puppet API catalog. This endpoint is intended for use by other Puppet services. SERVER-2434
Enhancements
- The CA’s
certificate_statusendpoint now returns additional information for custom integration. SERVER-2370
Puppet Server 6.2.1
Released 20 February 2019.
This release contains resolved issues.
Resolved issues
- This release upgrades Bouncy Castle to version 1.60 for security updates.
Puppet Server 6.2.0
Released 23 January 2019.
This release contains new features and resolved issues.
New features
- The EZBake configs now allow you to specify
JAVA_ARGS_CLI, which is used when usingpuppetserversubcommands to configure Java differently from what is needed for the service. This was used by the CLI before, but as an environment variable only, not as an EZBake config option. SERVER-2399
Resolved issues
- A dependency issue caused puppetserver 6.1.0 to fail with OpenJDK 11. This has been fixed and Puppet Server packages can now start under Java 11. SERVER-2404
Puppet Server 6.1.0
Released 18 December 2018
Enhancements
- Puppet Server 6.1.0 upgrades to JRuby 9.2.0.0. This version implements the Ruby 2.5 interface. It is backwards compatible, but will issue a warning for Ruby language features that have been deprecated. The major warning that users will see is
warning: constant ::Fixnum is deprecated. Upgrading to this version of JRuby means that the Ruby interface has the same version as the Puppet agent. This version of JRuby is faster than previous versions under certain conditions. SERVER-2381 - Puppet Server now has experimental support for Java 11 for users that run from source or build their own packages. This has been tested with low level tests but does not work when installed from official packages. Consequently, we consider this support “experimental”, with full support coming later in 2019 for the latest long term supported version of Java. SERVER-2315.
- The
puppetserver cacommand now provides useful errors on connection issues and returns debugging information. SERVER-2317 - The
puppetserver catool now prefers theserver_listsetting inpuppet.conffor users that have created their own high availability configuration using this feature. SERVER-2392
Resolved issues
- The
puppetserver cacommand no longer has the wrong default value for the$serversetting. Previously thepuppetserver catool defaulted to$certnamewhen connecting to the server, while the agent defaulted topuppet. Thepuppetserver catool now has the same default for$serveras the agent. It will also honor the settings within the agent section of thepuppet.conffile. SERVER-2354 - Jetty no longer reports its version. TK-473
Puppet Server 6.0.5
Released 16 July 2019
Bug fixes
-
In this release, performance in puppetserver commands is improved. Running
puppetserver gem,puppetserver irb, and other Puppet Server CLI commands are 15-30 percent faster to start up. Service starting and reloading should see similar improvements, along with some marginal improvements to top-end performance, especially in environments with limited sources of entropy. -
Building Puppet Server outside our network is now slightly easier.
-
Prior to this release, an unnecessary and deprecated version of Facter was shipped in the
puppetserverpackage. This has been removed. -
Cert and CRL bundles no longer need to be in any specific order. By default, the leaf instances still come first, descending to the root, which are last. SERVER-2465
Puppet Server 6.0.4
Released 26 March 2019
Bug fixes
- Updated bouncy-castle to 1.60 to fix security issues. SERVER-2431
Puppet Server 6.0.3
Released 15 January 2019.
This release contains new features.
New Features
- The
puppetserver catool now respects theserver_listsetting inpuppet.conffor those users that have created their own high availability configuration using that feature. SERVER-2392 - The EZBake configs now allow you to specify
JAVA_ARGS_CLI, which is used when usingpuppetserversubcommands to configure Java differently from what is needed for the service. This was used by the CLI before, but as an environment variable only, not as an EZBake config option. SERVER-2399
Puppet Server 6.0.2
Released 23 October 2018
New features
- The CA service and the CA proxy service (in PE) now have their own entries in the status endpoint output and can be queried as “ca” and “ca-proxy” respectively. SERVER-2350
Puppet Server 6.0.1
Released 2 October 2018
New features
-
Puppet Server now creates a default
ca.conffile when installed, both in open source Puppet and Puppet Enterprise. CA settings such asallow-subject-alt-namesshould be configured in thecertificate-authoritysection of this file. (SERVER-2372) -
The
puppetserver ca generatecommand now has a flag--ca-clientthat will generate a certificate offline – not using the CA API – that is authorized to talk to that API. This can be used to regenerate the master’s host cert, or create certs for distribution to other CA nodes that need administrative access to the CA, such as the ability to sign and revoke certs. This command should only be used while Puppet Server is offline, to avoid conflicts with cert serials. (SERVER-2320) -
The Puppet Server CA can now sign certificates with IP alt names in addition to DNS alt names (if signing certs with alt names is enabled). (SERVER-2267
Puppet Server 6.0.0
Released 18 September 2018
This Puppet Server release provides a new workflow and API for certificate issuance. By default, the server now generates a root and intermediate signing CA cert, rather than signing everything off the root. If you have an external certificate authority, you can generate an intermediate signing CA from it instead, and a new puppetserver ca subcommand puts everything into its proper place.
New features
-
There is now a CLI command for setting up the certificate authority, called
puppetserver ca. See Puppet Server: Subcommands for more information. (SERVER-2172) -
For fresh installs, the Puppet master’s cert is now authorized to connect to the
certificate_statusendpoint out of the box. This allows the new CA CLI tool to perform CA tasks via Puppet Server’s CA API. (SERVER-2308) Note that upgrades will need to instead whitelist the master’s cert for these endpoints, see Puppet Server: Subcommands#ca. -
Puppet Server now has a setting called
allow-authorization-extensionsin thecertificate-authoritysection of its config for enabling signing certs with authorization extensions. It is false by default. (SERVER-2290) -
Puppet Server now has a setting called
allow-subject-alt-namesin thecertificate-authoritysection of its config for enabling signing certs with subject alternative names. It is false by default. (SERVER-2278) -
The
puppetserver caCLI now has animportsubcommand for installing key and certificate files that you generate, for example, when you have an external root CA that you need Puppet Server’s PKI to chain to. (SERVER-2261) -
We’ve added an infrastructure-only CRL in addition to the full CRL, that provides a list of certs that, when revoked, should be added to a separate CRL (useful for specifying special nodes in your infrastructure like compile masters). You can configure Whether this special CRL or the default CRL are distributed to agents. (SERVER-2231)
-
Puppet Server now bundles its
JRuby jarinside the main uberjar. This means theJRUBY_JARsetting is no longer valid, and a warning will be issued if it is set. (SERVER-2157) -
Puppet Server 6.0 uses JRuby 9K, which implements Ruby language version 2.3 Server-side gems that were installed manually with the
puppetserver gemcommand or using thepuppetserver_gempackage provider might need to be updated to work with JRuby 9K. Additionally, ifReservedCodeCacheorMaxMetaspacesizeparameters were set inJAVA_ARGS, they might need to be adjusted for JRuby 9K. See the known issues for more info. -
The version of semantic_puppet has been updated in Puppet Server to ensure backwards compatibility in preparation for future major releases of Puppet Platform. (SERVER-2132)
-
Puppet Server 6.0 now uses JRuby 9k. This implements version 2.3 of the Ruby language. (SERVER-2095)
Resolved issues
- We’ve made server-side fixes for fully supporting intermediate CA capability. With this, CRL chains will be persisted when revoking certs. SERVER-2205 For more details on the intermediate CA support in Puppet 6, see Puppet Server: Intermediate CA.