173 lines
6.7 KiB
Markdown
173 lines
6.7 KiB
Markdown
**Experimental**: This is a new format for release notes. The format and availability is subject to change.
|
|
|
|
## 2021.6.0
|
|
### Bug Fixes
|
|
- Fixes a http2 transport (the new default for Named Tunnels) to work with unix socket origins.
|
|
|
|
|
|
## 2021.5.10
|
|
### Bug Fixes
|
|
- Fixes a memory leak in h2mux transport that connects cloudflared to Cloudflare edge.
|
|
|
|
|
|
## 2021.5.9
|
|
### New Features
|
|
- Uses new Worker based login helper service to facilitate token exchange in cloudflared flows.
|
|
|
|
### Bug Fixes
|
|
- Fixes Centos-7 builds.
|
|
|
|
## 2021.5.8
|
|
### New Features
|
|
- When creating a DNS record to point a hostname at a tunnel, you can now use --overwrite-dns to overwrite any existing
|
|
DNS records with that hostname. This works both when using the CLI to provision DNS, as well as when starting an adhoc
|
|
named tunnel, e.g.:
|
|
- `cloudflared tunnel route dns --overwrite-dns foo-tunnel foo.example.com`
|
|
- `cloudflared tunnel --overwrite-dns --name foo-tunnel --hostname foo.example.com`
|
|
|
|
## 2021.5.7
|
|
### New Features
|
|
- Named Tunnels will automatically select the protocol to connect to Cloudflare's edge network.
|
|
|
|
## 2021.5.0
|
|
|
|
### New Features
|
|
- It is now possible to run the same tunnel using more than one `cloudflared` instance. This is a server-side change and
|
|
is compatible with any client version that uses Named Tunnels.
|
|
|
|
To get started, visit our [developer documentation](https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/run-tunnel/deploy-cloudflared-replicas).
|
|
- `cloudflared tunnel ingress validate` will now warn about unused keys in your config file. This is helpful for
|
|
detecting typos in your config.
|
|
- If `cloudflared` detects it is running inside a Linux container, it will limit itself to use only the number of CPUs
|
|
the pod has been granted, instead of trying to use every CPU available.
|
|
|
|
## 2021.4.0
|
|
|
|
### Bug Fixes
|
|
|
|
- Fixed proxying of websocket requests to avoid possibility of losing initial frames that were sent in the same TCP
|
|
packet as response headers [#345](https://github.com/cloudflare/cloudflared/issues/345).
|
|
- `proxy-dns` option now works in conjunction with running a named tunnel [#346](https://github.com/cloudflare/cloudflared/issues/346).
|
|
|
|
## 2021.3.6
|
|
|
|
### Bug Fixes
|
|
|
|
- Reverted 2021.3.5 improvement to use HTTP/2 in a best-effort manner between cloudflared and origin services because
|
|
it was found to break in some cases.
|
|
|
|
## 2021.3.5
|
|
|
|
### Improvements
|
|
|
|
- HTTP/2 transport is now always chosen if origin server supports it and the service url scheme is HTTPS.
|
|
This was previously done in a best attempt manner.
|
|
|
|
### Bug Fixes
|
|
|
|
- The MacOS binaries were not successfully released in 2021.3.3 and 2021.3.4. This release is aimed at addressing that.
|
|
|
|
## 2021.3.3
|
|
|
|
### Improvements
|
|
|
|
- Tunnel create command, as well as, running ad-hoc tunnels using `cloudflared tunnel -name NAME`, will not overwrite
|
|
existing files when writing tunnel credentials.
|
|
|
|
### Bug Fixes
|
|
|
|
- Tunnel create and delete commands no longer use path to credentials from the configuration file.
|
|
If you need ot place tunnel credentials file at a specific location, you must use `--credentials-file` flag.
|
|
- Access ssh-gen creates properly named keys for SSH short lived certs.
|
|
|
|
|
|
## 2021.3.2
|
|
|
|
### New Features
|
|
|
|
- It is now possible to obtain more detailed information about the cloudflared connectors to Cloudflare Edge via
|
|
`cloudflared tunnel info <name/uuid>`. It is possible to sort the output as well as output in different formats,
|
|
such as: `cloudflared tunnel info --sort-by version --invert-sort --output json <name/uuid>`.
|
|
You can obtain more information via `cloudflared tunnel info --help`.
|
|
|
|
### Bug Fixes
|
|
|
|
- Don't look for configuration file in default paths when `--config FILE` flag is present after `tunnel` subcommand.
|
|
- cloudflared access token command now functions correctly with the new token-per-app change from 2021.3.0.
|
|
|
|
|
|
## 2021.3.0
|
|
|
|
### New Features
|
|
|
|
- [Cloudflare One Routing](https://developers.cloudflare.com/cloudflare-one/tutorials/warp-to-tunnel) specific commands
|
|
now show up in the `cloudflared tunnel route --help` output.
|
|
- There is a new ingress type that allows cloudflared to proxy SOCKS5 as a bastion. You can use it with an ingress
|
|
rule by adding `service: socks-proxy`. Traffic is routed to any destination specified by the SOCKS5 packet but only
|
|
if allowed by a rule. In the following example we allow proxying to a certain CIDR but explicitly forbid one address
|
|
within it:
|
|
```
|
|
ingress:
|
|
- hostname: socks.example.com
|
|
service: socks-proxy
|
|
originRequest:
|
|
ipRules:
|
|
- prefix: 192.168.1.8/32
|
|
allow: false
|
|
- prefix: 192.168.1.0/24
|
|
ports: [80, 443]
|
|
allow: true
|
|
```
|
|
|
|
|
|
### Improvements
|
|
|
|
- Nested commands, such as `cloudflared tunnel run`, now consider CLI arguments even if they appear earlier on the
|
|
command. For instance, `cloudflared --config config.yaml tunnel run` will now behave the same as
|
|
`cloudflared tunnel --config config.yaml run`
|
|
- Warnings are now shown in the output logs whenever cloudflared is running without the most recent version and
|
|
`no-autoupdate` is `true`.
|
|
- Access tokens are now stored per Access App instead of per request path. This decreases the number of times that the
|
|
user is required to authenticate with an Access policy redundantly.
|
|
|
|
### Bug Fixes
|
|
|
|
- GitHub [PR #317](https://github.com/cloudflare/cloudflared/issues/317) was broken in 2021.2.5 and is now fixed again.
|
|
|
|
## 2021.2.5
|
|
|
|
### New Features
|
|
|
|
- We introduce [Cloudflare One Routing](https://developers.cloudflare.com/cloudflare-one/tutorials/warp-to-tunnel) in
|
|
beta mode. Cloudflare customer can now connect users and private networks with RFC 1918 IP addresses via the
|
|
Cloudflare edge network. Users running Cloudflare WARP client in the same organization can connect to the services
|
|
made available by Argo Tunnel IP routes. Please share your feedback in the GitHub issue tracker.
|
|
|
|
## 2021.2.4
|
|
|
|
### Bug Fixes
|
|
|
|
- Reverts the Improvement released in 2021.2.3 for CLI arguments as it introduced a regression where cloudflared failed
|
|
to read URLs in configuration files.
|
|
- cloudflared now logs the reason for failed connections if the error is recoverable.
|
|
|
|
## 2021.2.3
|
|
|
|
### Backward Incompatible Changes
|
|
|
|
- Removes db-connect. The Cloudflare Workers product will continue to support db-connect implementations with versions
|
|
of cloudflared that predate this release and include support for db-connect.
|
|
|
|
### New Features
|
|
|
|
- Introduces support for proxy configurations with websockets in arbitrary TCP connections (#318).
|
|
|
|
### Improvements
|
|
|
|
- (reverted) Nested command line argument handling.
|
|
|
|
### Bug Fixes
|
|
|
|
- The maximum number of upstream connections is now limited by default which should fix reported issues of cloudflared
|
|
exhausting CPU usage when faced with connectivity issues.
|