... | ... | @@ -8,21 +8,19 @@ Welcome to Stork 0.18.0, another monthly development release. The changes introd |
|
|
|
|
|
* **Better process detection** The process detection subsystem of the Stork agent has been refactored. It is now much more robust in detecting BIND 9 and Kea that are located in non-standard paths. The most immediate benefit of this change is that Stork is now able to detect BIND 9 when installed from packages provided by ISC. This change was tested with BIND 9.11, 9.16 and 9.17 on CentOS7 and Ubuntu 18.04 [#474].
|
|
|
|
|
|
* **Export TLS certificates** #515
|
|
|
* **Export TLS certificates** The stork-db-migrate tool has been renamed to stork-tool. In addition to the existing capabilities, it is now able to export TLS certificates, keys and tokens from the database [#515].
|
|
|
|
|
|
* **Grafana templates in RPM packages** #544
|
|
|
|
|
|
|
|
|
* **Testing** Kea statistics are now tested #439, automated qcow2 image generation #545
|
|
|
|
|
|
* **Bugfixes** listen-only flag on stork agent now works properly [#536]
|
|
|
* **Grafana templates in RPM packages** The RPM packages now include Grafana templates, which makes them easier to deploy [#544].
|
|
|
|
|
|
* **Bugfixes** The previously broken listen-only flag on Stork agent should now work properly [#536].
|
|
|
|
|
|
* **Testing** Several testing related areas have been improved. Kea statistics are now tested [#439], the qcow2 image generation is now automated, which makes changes deployment in the CI environment much easier [#545], several new tests have been added with regards to detecting various BIND 9 versions [#474].
|
|
|
|
|
|
Please see this link for known issues: https://gitlab.isc.org/isc-projects/stork/-/wikis/Known-issues.
|
|
|
|
|
|
* TODO: update status on this **Work in progress**: The team also made substantial progress on three new features which are expected to be available in the next release. The first feature is insight into the state of a host reservation: it will show whether the reserved address is available, in use, or expired, or if there is a conflict and someone else is currently using the address [#530]. The second feature is a more robust BIND 9 and Kea detection mechanism, which should cover cases like running in a non-standard location, on non-standard ports, etc. [#474]. The third feature is a Kea configuration browser. The current Stork version has views dedicated to the most common configuration elements: subnets, reservations, networks, etc. However, Kea has many more configuration options and thus a dedicated view is needed to show the whole configuration [#531].
|
|
|
## Incompatible Changes
|
|
|
|
|
|
Please see this link for known issues: https://gitlab.isc.org/isc-projects/stork/-/wikis/Known-issues.
|
|
|
* **stork-db-migrate replaced by stork-tool** The earlier tool (`stork-db-migrate`) has been replaced with `stork-tool`, which provides the same capabilities with regards to database migration, but also has additional new feature of exporting TLS certificates. If you use this tool in your automated deployment, make sure you update the tool name as well as the environment variable names. See manual page for `stork-tool` for details.
|
|
|
|
|
|
## Release Model
|
|
|
|
... | ... | |