Skip to content

Releases: netbirdio/netbird

v0.17.0

26 Apr 15:32
6fec0c6
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v0.16.0...v0.17.0

v0.16.0

17 Apr 08:27
1803cf3
Compare
Choose a tag to compare

Release Notes

This release brings performance improvements to userspace-based NetBird agents (any platforms that don't support kernel WireGuard, e.g., macOS, Windows, and old Linux). The implementation uses a custom wireguard-go Bind interface, eliminating the need for a local proxy that was decreasing performance dramatically.

Client

  • Bind implementation (#779)

Full Changelog: v0.15.3...v0.16.0

v0.15.3

12 Apr 07:43
0343c5f
Compare
Choose a tag to compare

Release Notes

Due to performance reasons, this release reverts rego policy evaluation from the regular network map update that is sent to peers. We will review the policy specification and how to improve performance.

Management

  • Use UTC to store date time data (#778)
  • Fix network map fetch when adding a peer (#800)
  • Rollback simple ACL rule processing (#803)

Client

  • Update calculate server state (#796)

Misc

  • Fix export path for certificate files (#794)

v0.15.2

06 Apr 16:48
0aad916
Compare
Choose a tag to compare

Client

  • Fix nil pointer exception on management connection failure (#790)

Misc

  • Add scope and id token environment variables (#785)

v0.15.1

05 Apr 15:51
32b3459
Compare
Choose a tag to compare

Release Notes

Management

  • Support remote scope and use id token configuration (#784)

Misc

  • Configurable port defaults from setup.env (#783)

v0.15.0

04 Apr 16:27
fe1ea4a
Compare
Choose a tag to compare

Release Notes

The new version introduces Personal Access Tokens.

Personal Access Tokens (PATs) can be used to authenticate against Netbird’s Public API (coming soon).

Users can create as many tokens for themself as they need. Each token requires the user to set how long the token will be valid, we support token expiration between 1 and 365 days; after that, the token will be rejected.

All users can now access the Personal Settings section under the Dashboard > Settings tab. This section shows an overview of all the Personal Access Tokens belonging to a user, when they were created, when they were last used to authenticate, and when they will expire.

image

When adding a new token, you must provide a name and specify how long the token should be valid.

image

After successfully creating the token you will see the token in plain text to copy and store in a secure location. Once you close the window, there is no way to retrieve the plain token again.

image

You can use the new token to send API requests to the management API by adding the header Authorization: Token NEW_TOKEN, below you have an example of a request to the peer's endpoint of our Public API:

curl 'https://api.wiretrustee.com/api/users' -X GET -H "Authorization: Token nbp_61efTM2ZvmiLpaOa5mpx1MLnL5zXc13bcMhm”

More API documentation will come soon!

Management

  • Add API authentication with PATs (#774)
  • Add activity events (#776)
  • Add disable let's encrypt and traefik template (#747)
  • Add token source and device flow audience variables (#780)
  • Check multiple audience values (#781)

Client

  • Add single line installer (#775)
  • Fix connection listener (#777)

Dashboard

Big thanks to our new contributors

v0.14.6

01 Apr 11:16
5dc0ff4
Compare
Choose a tag to compare

What's Changed

  • Add custom ice stdnet implementation by @pappz in #754
  • Add ipv6 test for stdnet pkg by @pappz in #761
  • Add fqdn and address for notification listener by @pappz in #757
  • Fix nil pointer exception when create config by @pappz in #765
  • Refactor the authentication part of mobile exports by @pappz in #759
  • Add OnDisconnecting service callback by @pappz in #767
  • Fix slice bounds out of range in msg decryption by @pappz in #768
  • Fix pre-shared key query name for android wg configuration by @mlsmaycon in #773
  • Feature/add rest endpoints for pat by @pascal-fischer in #766
  • Fix broken auto-generated Rego rule by @gigovich in #769

Full Changelog: v0.14.5...v0.14.6

v0.14.5

24 Mar 10:23
a27fe43
Compare
Choose a tag to compare

Key Release Notes

Management

  • Introduce a new ACL engine based on Rego (Open Policy Agent) for firewall control (#700)
  • Personal access tokens generation as a first iteration toward public API release (#725 and #745)
  • Add Keycloak support as an IDP manager (#746)

Agent

  • Introduce a Firewall interface to apply granular access control (e.g., connection direction, port, or protocol level) (#740)
  • Make the agent run on Android (mobile support) (#735)

Changelog

New Contributors

Full Changelog: v0.14.4...v0.14.5

v0.14.4

10 Mar 16:55
2219344
Compare
Choose a tag to compare

Release Notes

Bug fixes & refactor

Management

  • Fix: send remote agents updates when peer re-authenticates (#737)

v0.14.3

09 Mar 11:09
9ce8056
Compare
Choose a tag to compare

Release Notes

Bug fixes & refactor

Management

  • Fix peer network map distribution that caused 0/0 peers to connect (#731)
  • Remove Management close steps, in defer doing it already (#729)
  • Report offline peers to agents (#728)
  • Update ICE to version 2.3.1 (#720)

Agent

  • Update ICE to version 2.3.1 to resolve TURN TLS issues (#720)