Octopus January Release 2018.1

Shaun Marx

This January release of Octopus Deploy is primarily a security release driven by Octopus Cloud and will also benefit each of our customers running Octopus Deploy on-premises. We highly recommend upgrading.

You'll also notice our new versioning strategy: what would normally have been Octopus 4.2 is actually 2018.1. Read more about why we changed.

In this post

Octopus Cloud

One of our big drivers for this year is to bring our hosted Octopus offering to market, called Octopus Cloud. We are kicking off a closed Alpha program in the next few days - thank you to everyone who registered!

The next opportunity to start using Octopus Cloud will be during our open Beta program in March 2018. You can register your interest in Octopus Cloud today!

Following the open Beta we will launch Octopus Cloud officially, and later in the year we will launch our Data Centre edition.

Learn more about Octopus Cloud.

We've changed our versioning strategy

Read more about why we changed which also dives into our continuing evolution as a software product company.

Security enhancements

In preparation for Octopus Cloud we've performed penetration testing and a security audit. No major issues were found but uncovered a few smaller issues we wanted to fix. You may have seen several security fixes in recent patches. This feature release rolls up all of those patches, along with some extra enhancements you can use to make your Octopus Server more secure than ever.

New built-in roles and permissions

Octopus ships with several built-in teams and user roles, one of which is the Octopus Administrators team with the System Administrator role granting the rights to do anything and everything in your Octopus installation.

In Octopus 2018.1 we have effectively split the Octopus Administrators team and its System Administrator user role into two parts:

  • We've kept the existing Octopus Administrators team and System Administrator role which behave exactly the same as today
  • We've added a new Octopus Managers team and System Manager role which can do everything, except certain system-level functions reserved for system administrators

This makes a lot of sense for Octopus Cloud:

  • Our team needs to configure how your Octopus Server is hosted - we'll be members of the Octopus Administrators team.
  • We don't want you to inadvertently break your Octopus Server by changing its hosting configuration - you'll be added to the Octopus Managers team.

This new division makes sense for larger installations of Octopus, where you want to have a clearer distinction between teams and their responsibilities.

New permissions

The underpinning of these changes are a couple of new permissions which you may use in your own Octopus installation:

  • UserEdit was added to fill a gap in our existing permission structure for editing users directly - this previously required the AdministerSystem permission
  • ConfigureServer for configuring things like Authentication, SMTP, and HTTP Security Headers

Upgrade experience

When you upgrade your existing Octopus Server, or start a brand new installation of Octopus Server:

  • the System Administrator user role will be automatically granted the new permissions (this is the same process we've used when adding new permissions in the past)
  • the Octopus Managers team and System Manager role will be automatically created and granted the appropriate permissions

Actively preventing escalation of privileges (CVE-2018-5706)

CVE-2018-5706

The built-in user roles are sufficient for most common scenarios. In larger scale installations of Octopus people tend to tailor these user roles, or create their own user roles from scratch. The permissions system in Octopus is very powerful, but with great power comes additional complexity... and great responsibility. In earlier versions of Octopus, if you configured these roles incorrectly you might have accidentally granted a team the ability to escalate their own privileges.

Octopus 2018.1 has an additional layer of security which actively prevents any user from escalating their own or another user's privileges beyond the scope of their current scope of privileges.

Learn more about this issue.

Step package requirement

By default, Octopus performs package acquisition immediately before the first step in a deployment that requires packages. Steps can now be configured to run before or after package acquisition. The step condition Run this step has been replaced by Package requirement:

Previous: Step condition - Run this step

New: Step condition - Package requirement

The new Package requirement allows a more explicit configuration of when a step should run with respect to package acquisition. There are three options to choose from:

  • Let Octopus Decide (default): Packages may be acquired before or after this step runs - Octopus will determine the best time
  • After package acquisition: Packages will be acquired before this step runs
  • Before package acquisition: Packages will be acquired after this step runs

This option is hidden when it does not make sense, for example, when a script step is configured to run after a package step (packages must be acquired by this point).

These options provide more flexibility when configuring complex parallel deployment processes to ensure that packages are acquired at the desired time. You can now configure a parallel block of steps that generate packages and use the option Before package acquisition to ensure that the packages can be consumed by subsequent package steps.

Breaking Changes

We've made two behavioral changes to Octopus which may impact certain customers.

Upgrading

As usual steps for upgrading Octopus Deploy apply. Please see the release notes for further information.

Wrap up

That’s it for this month. We hope you had a fantastic festive season and find the new features useful. Feel free leave us a comment and let us know what you think! Go forth and deploy!


Tagged with: Product
Loading...