PE release notes
These are the new features, enhancements, resolved issues, and deprecations in this version of Puppet Enterprise (PE).
Security and vulnerability announcements are posted at https://puppet.com/docs/security-vulnerability-announcements.
PE 2021.7.8
Released May 2024
For information about upgrading from 2019.8.z to 2021.7 (and earlier 2021.y series release notes), see What's new since PE 2019.8 and Upgrading Puppet Enterprise.
For information about upgrading to 2023, see Upgrading Puppet Enterprise in the 2023.y documentation.
New features
- Experience the full value of Puppet Enterprise
- If you have installed Puppet Enterprise, you can
separately install and use Security Compliance Management
(formerly Puppet Comply®) and Continuous Delivery, which are both now covered by
your Puppet Enterprise license. You can also contact our sales team to enable the following additional
premium features:
- Security Compliance Enforcement (formerly CEM)
- Advanced Impact Analysis capabilities within Continuous Delivery
Enhancements
- Feature toggle for lockless code deploys
- If you have enabled Code Manager, you can now
turn the lockless code deploys feature on or off by running a
puppet infra
plan on your primary server. See Toggle lockless code deploys on or off. - Disaster recovery workflows improved
- This release includes improvements to disaster recovery workflows for standard and large installations. The enhancements help to ensure smooth failover to your primary server replica, and minimize potential for disruption in cases where replica promotion is required. See Configuring disaster recovery.
- Correct CA directory automatically set up during upgrade
- Starting in 2021.7.8 and 2023.7, when you upgrade PE, the installer checks that your
certificate authority (CA) directory is set up at
/etc/puppetlabs/puppetserver/ca
and if necessary, the installer automatically migrates the CA to this directory. This enhancement mitigates the risk of certificate collisions during disaster recovery procedures. - Enhanced logging of schema validation
- In the Puppet Server version bundled with PE 2021.7.8, validation messages in the logs have been improved to provide more context about failed schemas.
- Default to find reports generated within the last 30 minutes on the Events screen in the PE Console
- In order to make the page load faster and be more efficient, the Events screen in the PE console has changed the default period from Events from the last run to Events in the last 30 minutes.
Platform support
- Agent platforms added
- This release adds support for the Puppet
agent on the following operating system platforms:
- Amazon Linux 2023 amd64
- Amazon Linux 2023 aarch64
- Debian 11 aarch64
- Debian 12 amd64
- Debian 12 aarch64
- macOS 14 ARM
- macOS 14 x86_64
- FIPS 140-2 compliant Red Hat Enterprise Linux (RHEL) 9 x86_64
- Client tools platforms added
- Support has been added for PE client
tools on the following operating system platforms:
- Amazon Linux 2023 amd64
- macOS 14 ARM
- Solaris 11 packages now verified with GPG
- Starting with PE 2021.7.8 and
2023.7, Solaris 11 agent packages are no
longer signed with a DigiCert code signing certificate. Instead, you can
verify the package's authenticity by using GPG-based verification with
the provided
.asc
file.
Resolved issues
- Replica promotion no longer corrupts file sync when lockless code deployment is enabled
- In PE versions 2021.7.2 through 2021.7.7, and 2023.0 through 2023.6, if the lockless code deployment feature was enabled, using the disaster recovery workflow to promote a replica could lead to file sync corruption and code deployment failures. The issue is resolved in PE 2021.7.8 and 2023.7.
- Fixed issue affecting
recover_configuration
cron job - In PE versions 2021.7.7 and 2023.6, the
recover_configuration
cron job could sometimes cause a Puppet Server restart, which in turn could cause an in-process provisioning of a replica to fail. The issue is resolved in PE 2021.7.8 and 2023.7. - Node-pinning issue fixed
- In earlier versions of the Puppet Enterprise console, when a node group was set to match any rule, pinning a node resulted in the pinned node rule being incorrectly displayed in the main rules section rather than in the pinned nodes section. This issue is resolved in PE 2021.7.8.
- Backup and restore commands automatically use Puppet binary path
- In 2021.7.7, the
puppet backup create
andpuppet backup restore
commands would fail if the PATH variable didn't include the directory with the Puppet binary. This could occur, for example, when running the backup command from a cron job. Now, the full path to the Puppet binary is used automatically by thepuppet backup create
andpuppet backup restore
commands. - Security fixes
- Addressed the following CVEs:
- CVE-2024-22871
- CVE-2024-1597
- CVE-2024-25710
- CVE-2024-26308
- CVE-2023-42503
- CVE-2024-46218
PE 2021.7.7
Released February 2024
For information about upgrading from 2019.8.z to 2021.7 (and earlier 2021.y series release notes), see What's new since PE 2019.8 and Upgrading Puppet Enterprise.
For information about upgrading to 2023, see Upgrading Puppet Enterprise in the 2023.y documentation.
Enhancements
- Upgraded logback
- To address CVE-2023-6378, logback is upgraded to version 1.3.14. If you
want to use a customized setting for the
logappender
variable, see Upgrade cautions for information about avoiding disruptions in logging.
Platform support
- Added agent platforms
- Support is added for the following operating system platforms:
Resolved issues
- Upgraded
concurrent-ruby
to resolve issue that could cause Puppet Server memory leak - A known issue in the
concurrent-ruby
version packaged with PE 2021.7.5 and 2021.7.6 could cause Puppet Server memory leaks, resulting in gradual degradation of Puppet Server performance until the service crashed or was restarted. To resolve this issue,concurrent-ruby
is updated to version 1.2.2. - Restoring PE from a backup no longer
fails when
puppet agent
is running - Previously, when running
puppet-backup restore
, if a Puppet run was either already in progress or started during the restore process, the restore operation could fail with an error. This issue is fixed in PE 2021.7.7. - Restoring PE from a backup no longer fails if lockless code deployments are enabled
- In previous PE versions, running
puppet-backup restore
resulted in a fatal error if thepuppet_enterprise::profile::master::versioned_deploys
parameter was set totrue
. The issue is fixed in PE 2021.7.7. - Setting the
classifier_host
parameter no longer causes failure inpuppet-backup restore
process - In previous versions, the
puppet-backup restore
process could fail in cases where thepuppet_enterprise::profile::master::classifier_host
parameter was defined. The issue is fixed in PE 2021.7.7. - Security fixes
- Addressed the following CVEs:
- CVE-2023-6378
- CVE-2023-40167
- CVE-2023-36479
- CVE-2023-41900
- CVE-2023-5869
- CVE-2024-20952
- CVE-2024-20918
- CVE-2023-44487
- CVE-2023-5072
- CVE-2024-20932
- CVE-2023-38546
PE 2021.7.6
Released November 2023
For information about upgrading from 2019.8.z to 2021.7 (and earlier 2021.y series release notes), see What's new since PE 2019.8 and Upgrading Puppet Enterprise.
For information about upgrading to 2023, see Upgrading Puppet Enterprise in the 2023.y documentation.
Enhancements
- Updated common PQL queries in console
- When configuring Puppet runs in the console, you can choose from a range of common Puppet Query Language (PQL) queries to target nodes for jobs and tasks. Because legacy facts are deprecated in Puppet 7, common queries that used legacy facts have been updated to use equivalent structured facts.
Platform support
- Added agent platforms
- Support is added for the following operating system platforms:
Resolved issues
- Installing packages with Ubuntu’s Advanced Packaging Tool (APT) no longer causes restarts
of
pe-puppetserver
andpe-orchestration-services
- On Ubuntu 22.04, if you use the
apt
orapt-get
commands to install new packages, the needrestart app no longer triggers unexpected restarts ofpe-puppetserver
andpe-orchestration-services
. - Security fixes
- Addressed the following CVEs:
- CVE-2023-40175
- CVE-2023-38545
- CVE-2023-36478
- CVE-2023-44487
- CVE-2023-4759
- CVE-2023-30589
- CVE-2023-5309
PE 2021.7.5
Released September 2023
For information about upgrading from 2019.8.z to 2021.7 (and earlier 2021.y series release notes), see What's new since PE 2019.8 and Upgrading Puppet Enterprise.
For information about upgrading to 2023, see Upgrading Puppet Enterprise in the 2023.y documentation.
Enhancements
- Classifier service flags unmappable legacy facts in node group rules
- Legacy facts are deprecated in Puppet 7, which is the Puppet version included in this release, and are removed in Puppet 8, which is the Puppet version introduced in PE 2023.4. To support the transition away from legacy facts to structured facts, the classifier service in PE 2021.7.5 analyzes your node group rules and generates warning messages in the logs to flag uses of certain legacy facts that do not map to equivalent structured facts in Puppet 8. For more information about the removal of deprecated legacy facts in Puppet 8, see Puppet upgrade in 2023.4.
- Orchestrator HTTP-client limits can be configured to match infrastructure requirements
- You can now specify HTTP-client connection limit parameters in the
puppet_enterprise::profile::orchestrator
class. You can set connection limits for authenticated and unauthenticated clients by specifying an integer value for the following parameters:max_connections_per_route_authenticated
max_connections_total_authenticated
max_connections_per_route_unauthenticated
max_connections_total_unauthenticated
- Orchestrator socket timeout is configurable
- By default, whenever no data is available on the socket, the
orchestrator waits for a maximum of 120,000 milliseconds before closing
the HTTP connection. Now you can specify the maximum time before socket
timeout by changing the default value of the
socket_timeout
parameter in thepuppet_enterprise::profile::orchestrator
class. - Improvements to error logging for the
puppet backup
command - Previously, error messages returned by the
puppet backup
command were generic in many cases. Now, descriptive error messages are displayed both in the terminal and in the log file, and you can use a--debug
flag withpuppet backup
to extend error logging to all underlying Puppet commands.
Platform support
- Added primary server platforms
- Red Hat Enterprise Linux (RHEL) 9 x86_64
- Added agent platforms
- macOS 13 ARM and x86_64
- Added client tools platform
- macOS 13 ARM and x86_64
- Added patch management platforms
- Red Hat Enterprise Linux (RHEL) 9 x86_64
With this release, support was removed for several previously deprecated platforms. Before upgrading to PE 2021.7.5, review the following list of removed platforms and the important information about removed platforms in Platforms removed in 2021.0 and later.
- Removed agent platforms
- CentOS 7 aarch64
- Removed client tool platforms
- macOS 10.15
Deprecations and removals
- Removed platforms
- For information about platforms removed in this release, see the Platform support section.
Resolved issues
- Installing Windows agent through the console no longer fails when option to test connections is selected
- In PE 2021.7.2 and later, when installing Windows agents in the console’s Install agent on nodes screen, checking the Test Connections checkbox before clicking Add nodes caused the process to hang indefinitely. The issue is resolved in PE 2021.7.5.
PE 2021.7.4
Released June 2023
For information about upgrading from 2019.8.z to 2021.7 (and earlier 2021.y series release notes), see What's new since PE 2019.8 and Upgrading Puppet Enterprise.
For information about upgrading to 2023, see Upgrading Puppet Enterprise in the 2023.0 documentation.
Resolved issues
- Security fix
- Addressed CVE-2023-2530
PE 2021.7.3
Released May 2023
For information about upgrading from 2019.8.z to 2021.7 (and earlier 2021.y series release notes), see What's new since PE 2019.8 and Upgrading Puppet Enterprise.
For information about upgrading to 2023, see Upgrading Puppet Enterprise in the 2023.0 documentation.
Enhancements
- Improved performance when querying PuppetDB
- This enhancement helps to improve performance for PuppetDB queries that contain large arrays, for example, if many nodes are enumerated or many terms are joined by a single "and" or "or" element.
- Improved performance for the
each
,map
, andfilter
functions in the Puppet language - Previously, the Puppet language built-in
functions
each
,map
, andfilter
showed poor performance and consumed unnecessary resources when run on JRuby software. The issue was resolved to enhance performance. - Puppet Server provides more reliable warnings when it cannot check for an update
- By default, Puppet Server periodically checks whether a new version of Puppet Server is available. Previously, if Puppet Server could not connect to the update server, users were not provided with adequate information about the error. Starting with Puppet Server 7.10.1, a warning about the error is available in the log file.
Deprecations and removals
- Deprecated PSON
- In previous releases, Pure JavaScript Open Notation (PSON) was used in
Puppet to serialize data for
transmission.
PSON is deprecated in Puppet 7 and will be removed in Puppet 8.
Resolved issues
- Tasks page is available following a software update
- After upgrading PE from 2019.8 to 2021.7.1, the Tasks overview page in the PE console sometimes failed to load because of a timeout error. The issue is fixed in PE 2021.7.3 and 2023.1.
- Enabling the lockless code deploy feature no longer causes performance issues in PuppetDB catalog compilation
- When the
versioned_deploys
setting is enabled, Puppet previously reported the full directory path to the environment after resolving symbolic links as the source for resources in a catalog. Puppet now reports the path to the resource before resolving symbolic links in the environment path to help prevent instability of the PuppetDB instance. - Performance issue with Puppet agent runtimes is resolved
- After an upgrade from PE 2019.8.12 to PE 2021.7.1, some users saw a significant increase in Puppet agent runtimes. The increase was caused by Facter 4, which was not using cached information to resolve facts. As a result, facts were resolved multiple times. The issue is now resolved to normalize the performance of the Puppet agent.
- Certificates and keys can be backed up and restored by specifying the
certs
scope - Previously, if you ran the
puppet-backup create
command and specified a scope ofcerts
, the command failed to back up the certificate authority root key and certificates. This issue occurred because Puppet 7 introduced a new default path for the certificate authority (CA) directory (/etc/puppetlabs/puppetserver/ca
), but thepuppet-backup create
command failed to locate the new directory. Similarly, if you ran thepuppet-backup restore
command with a scope ofcerts
, the restore operation failed. The CA directory issue is resolved so that backup and restore operations can run successfully. - Updates implemented to help users enter valid URLs
- In previous versions of PE, the
role-based access control (RBAC) service permitted the entry of invalid
URLs when users specified the Organizational URL
setting. Login attempts would then fail with the following error
message:
'Invalid settings: organization_not_enough_data'
In PE 2021.7.3 and 2023.1, the RBAC service is updated to enforce valid URLs when users create or update a connection to a Security Assertion Markup Language (SAML) identity provider, and the PE console displays a warning if the user enters an invalid URL for the Organizational URL setting.
- Timeouts can be specified for SAML authentication
- Previously, when users configured the PE
console to specify
session-timeout
andsession-maximum-lifetime
values, the settings were applied to Lightweight Directory Access Protocol (LDAP) tokens and local login tokens. However, the specified settings were not applied to SAML tokens, which are used for authentication with a SAML identity provider. The issue is corrected to ensure that the specified settings also apply to SAML session lifetimes. - User-defined temporary directory is honored during PE restore operations
- After you back up your PE infrastructure,
you can use the
puppet-backup restore
command to restore the backup. Previously, if you set the—tmpdir
flag or theTMPDIR
environment variable to specify a temporary directory for restore operations, the directory was not honored, and the default/tmp
directory was used in some cases. In addition, some files were not cleaned up after the restore operation. This issue is corrected to ensure that the user-specified directory is used and all temporary files are removed after the restore operation. - Issue that caused an unexpected increase in CPU usage is resolved
- In PE 2021.7.1, 2021.7.2, and 2023.0, an issue with Puppet Server caused an unexpected increase in central processing unit (CPU) usage in some environments. CPU usage continued to grow and some operations took longer than expected until the Puppet Server service was restarted. This issue is resolved in PE 2023.1 and 2021.7.3.
- Security fixes
- Addressed CVE-2023-1894 and CVE-2023-26048.
PE 2021.7.2
Released January 2023
For information about upgrading from 2019.8.z to 2021.7 (and earlier 2021.y series release notes) go to What's new since PE 2019.8 and Upgrading Puppet Enterprise.
For information about upgrading to 2023.0, go to Upgrading Puppet Enterprise in the 2023.0 documentation.
Enhancements
-
recover_configuration
command recreatesnodes
files - Previously, the
puppet infrastructure recover_configuration
command merged new values into thenodes
files (at/etc/puppetlabs/enterprise/conf.d/nodes
) instead of overwriting the files. This process caused problems if you deleted a value relevant to one or more nodes, because the deleted value would remain in these files and continue to be applied. - Improved performance when regenerating agent certificates for multiple agents
- The
puppet infrastructure run regenerate_agent_certificate
action is now faster when you Regenerate agent certificates for multiple agents. You can also now use theagent_pdb_query
parameter to run a PDB query to generate a list of agents for which you want to regenerate certificates. - Specify Code Manager worker cache cleanup interval
- The
deploy-pool-cleanup-interval
parameter specifies how often workers pause to clean their on-disk caches. Learn more about this setting in Code Manager parameters.
Platform support
- Agent platforms
- Solaris 10 (SPARC, i386)
- Client tools platforms
- Solaris 10 (SPARC, i386)
Resolved issues
-
Code Manager respects
full_deploy
setting in Hiera - The
full_deploy
parameter is now correctly applied when you Customize Code Manager configuration in Hiera. - Certain plans correctly restore
puppet
service to pre-plan state - Due to a bug introduced in PE 2021.6,
some plans that must stop the
puppet
service while the plans run were not restoring thepuppet
service to its pre-plan state after the plan finished running. - PuppetDB database user can purge reports
- An issue was fixed to help ensure that the PuppetDB database user can purge reports.
- Corrected fact list handling in some PE console UI components
- Some user interface (UI) components in the PE console use fact lists. A recent change caused these components to use the entire list of fact names. This process caused performance problems in environments with many facts. The handling of fact lists was updated to fix this issue and improve performance.
- Orchestrator code directories excluded from
puppet-backup create --scope=config
- When Customize scope of backup and restore, the orchestrator
code directories (specifically
opt/puppetlabs/server/data/orchestration-services/data-dir
andopt/puppetlabs/server/data/orchestration-services/code
) are excluded when you specify theconfig
scope. - Garbage collection log fixes
- The introduction of Java 11 resulted in two issues pertaining to garbage collection logs. The issues are now fixed:
- Security fixes
- Addressed CVE-2022-41946 and CVE-2022-41404.
PE 2021.7.1
Released October 2022
For those awaiting the new STS, we're still getting things ready for the first release in that series. We thank you for your patience.
New features
- Stop in-progress plans
- Use POST /command/stop_plan to stop an orchestrator plan job that is currently running.
Platform support
Deprecated and removed platforms are listed under Deprecations and removals.
- Agent platforms
- Fedora 36
- Patch management platforms
- Fedora 36
Deprecations and removals
- Deprecated agent platforms
- Debian 9
- Deprecated patch management platforms
- Debian 9
Resolved issues
- Deactivated scheduled jobs could still run.
- If you deactivate a recurring scheduled job, the inactive job no longer
continues to run after restarting
pe-orchestration-services
. - Orchestrator didn't properly periodically prune jobs
- Fixed a calculation error introduced in PE 2021.5 that caused job records to be stored beyond the
job_prune_threshold
limit. -
regenerate_agent_certificate
couldn't verify node type if client tools were installed through apackage
resource - When you run the
puppet infra run regenerate_agent_certificate
command, the plan can now verify that a node isn't an infrastructure node if thepe-client-tools
package was installed on the node through apackage
resource. - RBAC API
command/config/remove-disclaimer
endpoint erroneously requiredContent-Type
header - The POST /command/config/remove-disclaimer endpoint no longer requires a
Content-Type
header, because requests to this endpoint have no body content. - Internal task jobs shared primary task thread pool
- Internal task jobs (such as tasks that force stop other tasks) no longer run on the same thread pool as your user-initiated tasks. This allows internal tasks to queue separately from other tasks. For example, requests to POST /command/stop don't get stuck waiting if the regular task queue is full.
- Improved PuppetDB disaster recovery sync performance
- The PuppetDB disaster recovery sync process transferred more reports than necessary when syncing reports, which sometimes caused timeouts.
- Empty task metadata files prevented you from running tasks in the console
- Loading empty task metadata files no longer cause errors.
- Some
puppet infrastructure
commands failed when restarting thepuppet
service - Previously, several
puppet infrastructure
commands failed when restarting thepuppet
service at the end of the action. While the service had successfully restarted, the effected actions couldn't properly detect the restart, which caused them to fail. This has been fixed.
PE 2021.7.0
Released August 2022
If you're preparing to upgrade or looking for earlier 2021.y release notes, go to What's new since PE 2019.8.
New features
- Force stop in-progress Puppet runs
- By default, POST /command/stop
prevents new runs from starting, but allows in-progress runs to finish.
Now you can use the
force
option to block new runs and stop in-progress runs. This is useful, for example, if you need to stop a task that is hanging. -
pe_status_check
module bundled with PE - The
pe_status_check
module helps keep your PE installation in an ideal state. Read About the pe_status_check module to learn how the module works and how to get the module's reports.Important: If you have previously specified a version of this module, from the Forge or other sources, in your code, we recommend removing this version before upgrading to allow the version bundled with PE to be asserted. - New Orchestrator scheduling API
- This release includes a new scheduling API for the orchestrator, which
introduces several new
scheduled_jobs
endpoints and deprecates the previous scheduling API's endpoints (for a list of deprecated endpoints, see Deprecations and removals for this release, below). - Use the RBAC API to set the disclaimer text on the console login page
- You can use the RBAC API v1 Disclaimer endpoints to configure the disclaimer text that appears on the PE console login page.
- Automatically sync LDAP user details and group membership
- Prior to this release, user details and group membership for LDAP-based users only refreshed when users logged in. Now, LDAP group bindings, user names, and descriptions update automatically every 30 minutes (by default) for every LDAP user in the system. If a user is no longer present in LDAP or has no group bindings, all user-group associations are removed from the user and all of the user's known tokens are revoked.
- Stop LDAP users from logging in if they have no group membership
- You can use the
exclude-groupless-ldap-users
setting to prevent LDAP users with no group memberships from logging in. This setting is off by default. To learn how to enable this setting, go toRequire LDAP group membership to log in. - Metrics API v2 documentation
- The Metrics API v2 uses the Jolokia library to query Orchestrator service metrics. This version of the API has been available for some time, but it was only described in the open source Puppet documentation.
- Disaster recovery support for FIPS platforms
- Disaster recovery is now supported for FIPS 140-2 compliant Red Hat Enterprise Linux (RHEL) 7 and 8.
Enhancements
- Orchestrator API endpoints return
"total": 0
if there are no jobs -
Orchestrator API v1 endpoints that return
pagination
containing the total number of jobs (such as GET /jobs, GET /scheduled_jobs (deprecated), and GET /plan_jobs) now return"total": 0
, instead of"total": null
, when there are no jobs. - Activity service API
/v2/events
endpoint returns more information for orchestrator events - Responses from GET /v2/events containing
information about orchestrator events (Puppet agent runs and
task
runs) now report additional information about the job start time, end time, duration, and status. - Upgraded JRuby
- We are now shipping JRuby 9.3.4.0.
- Addressed CVEs
- We updated the PostgreSQL driver in some PE component to address CVE-2022-31197. The application was not vulnerable to exploit prior to this update.
Platform support
Ubuntu 16.04 is no longer a supported agent platform.
- Agent
- macOS 12 M1
- Client tools
- Ubuntu (General Availability kernels) 22.04 x86_64
- Patch management
- Ubuntu (General Availability kernels) 22.04 x86_64
Deprecations and removals
Ubuntu 16.04 is no longer a supported agent platform.
- GET /scheduled_jobs (deprecated)
- Replaced by GET /scheduled_jobs/environment_jobs and GET /scheduled_jobs/environment_jobs/<job-id>
- DELETE /scheduled_jobs/<job-id> (deprecated)
- Replaced by PUT /scheduled_jobs/environment_jobs/<job-id>
- POST /command/schedule_deploy (deprecated)
- Replaced by POST /scheduled_jobs/environment_jobs
- POST /command/schedule_plan (deprecated)
- Replaced by POST /scheduled_jobs/environment_jobs
- POST /command/schedule_task (deprecated)
- Replaced by POST /scheduled_jobs/environment_jobs
Resolved issues
-
full-deploy
didn't override--incremental
-
Code Manager's
full-deploy
option, used for Configuring module deployment scope, now correctly overrides the default--incremental
deploy behavior. - Code Manager couldn't fetch code on FIPS platforms
- On FIPS platforms running PE versions
2021.5 or 2021.6, Code Manager and r10k couldn't fetch code from your code
repo due to
libssh
attempting to use algorithms that are not allowed on FIPS. In PE 2021.7, the disallowed algorithms are disabled inlibssh
, allowing Code Manager and r10k to successfully fetch code. - An unreachable replica consumed all of the primary server's disk space
- Previously, if a provisioned replica became unreachable, the associated primary server could quickly run out of disk space, causing a complete interruption to PE services. In larger installations, an outage could occur in under an hour. Excessive disk usage was caused by the PE-PostgreSQL service on the primary server retaining change logs that the replica hadn't acknowledged.
- Orchestrator ignored
_noop
when passed torun_task()
through a plan - When a plan passed the
_noop
flag to therun_task()
function, the PE Orchestrator now correctly acknowledges the_noop
flag. - Some RBAC endpoints returned an incorrect
Content-Type
- Responses for the following endpoints now return the correct
Content-Type
: POST /users/<uuid>/password/reset, POST /auth/reset, and PUT /users/current/password. - LDAP with anonymous binding sometimes prevented Console Services from starting or restarting
- Previously, if you use anonymous binding, or another configuration with a zero-length password, Console Services sometimes couldn't start or restart. This could cause upgrade failures when upgrading to PE version 2021.4 through 2021.6 from a version earlier than 2021.4. This is resolved.
- Orchestrator doesn't restart unexpectedly during the
convert_legacy_compiler
plan - Previously, when running the
enterprise_tasks::convert_legacy_compiler
plan, the hosts in thepcp-brokers
array could change order. This caused thepe-orchestration-services
service to restart (as a result of detecting a presumed configuration change) and, ultimately, caused the plan to fail. - Some SSO configuration fields weren't marked as required
- The Organization and Contacts fields on the SSO Configuration page are now correctly marked as required.
- Orchestrator couldn't run tasks within modules named
tasks
orscripts
- You can now successfully run tasks that are within modules named
tasks
orscripts
. - Incorrect
run-time
for splayed agent runs - In previous PE versions, when agent runs
were splayed, the
run-time
reported in the PE console was incorrect. - Sensitive parameters sometimes exposed in cleartext in job results
- Sensitive plan parameters from Bolt plans that execute actions over PCP transport are no longer stored in the orchestrator database and, therefore, are properly masked in the job results.