Skip to content

Releases: TykTechnologies/tyk

Tyk Gateway v5.0.14, Tyk Dashboard v5.0.14

18 Sep 15:55
3e3e879
Compare
Choose a tag to compare

Tyk Gateway 5.0.14

Fixed

  • We have introduced two new options in the Gateway configuration that will enforce prefix and/or suffix matching when Tyk performs checks on whether middleware or other logic should be applied to a request.
    enable_path_prefix_matching ensures that the start of the request path must match the path defined in the API definition
    enable_path_suffix_matching ensures that the end of the request path must match the path defined in the API definition
    combining enable_path_prefix_matching and enable_path_suffix_matching will ensure an exact (explicit) match is performed
    These configuration options provide control to avoid unintended matching of paths from Tyk's default wildcard match. Use of regex special characters when declaring the endpoint path in the API definition will automatically override these settings for that endpoint.
    Tyk recommends that exact matching is employed, but both options default to false to avoid introducing a breaking change for existing users.
  • Fixed an issue when using granular Path-Based Permissions in access policies and keys that led to authorization incorrectly being granted to endpoints if an invalid regular expression was configured in the key/policy. Also fixed an issue where path-based parameters were not correctly handled by Path-Based Permissions. Now Tyk's authorization check correctly handles both of these scenarios granting access only to the expected resources.
  • Fixed an issue where a parameterized endpoint URL (e.g. /user/{id}) would be invoked if a request is made that omits the parameter. For example, a request to /user/ will now be interpreted as a request to /user and not to /user/{id}.
  • Enhanced Tyk Gateway synchronization with MDCB to ensure reliable policy and API loading. Implemented synchronous initialization process to prevent startup failures and potential service disruptions.

Tyk Dashboard 5.0.14

Fixed

  • We fixed the issue with 429 status codes not being shown on the
    Activity Overview page
  • We fixed the portal graphs when using Postgres This was done by adding
    a default resolution to the query (grouping by “day” by default)
  • The Error Breakdown was having some issues regarding dates, it's been fixed by adjusting date parameters

v5.7.0-alpha4

17 Oct 11:58
Compare
Choose a tag to compare
v5.7.0-alpha4 Pre-release
Pre-release
More unused constants

Tyk Gateway 5.5.0 and Tyk Dashboard 5.5.0

12 Aug 14:16
b8f10fb
Compare
Choose a tag to compare

Tyk Gateway v5.3.2, Tyk Dashboard v5.3.2

01 Aug 19:43
a5719ff
Compare
Choose a tag to compare

Fixed

  • Fixed Dashboard Analytics for PostgreSQL

    Resolved an issue in the api/usage endpoint where the Dashboard with PostgreSQL integration returned unfiltered results when one valid tag was used. Corrected the need for duplicating the same parameter as a workaround for filtering by multiple tags. Results are now properly filtered as expected, improving the accuracy and reliability of analytics data.

  • Enhanced Password Reset security

    Modified default OPA rules to prevent unauthorized admins from modifying other admins' passwords, mitigating potential 'rogue admin' behavior. Tyk Dashboard clients using custom OPA rules should update their rule set accordingly. Contact your assigned Tyk representative for assistance.

  • Fixed Universal Data Graph Schema Editor Import Issue

    Resolved an issue in the GQL schema editor for Data Graphs, where users couldn't utilize the 'Import Schema' button. Now, it's possible to import files containing GQL schemas into the Dashboard.

  • Enhanced Dashboard UI language

    Adjusted wording in Tyk's Dashboard UI to ensure inclusivity and clarity, removing any potentially oppressive language.

  • API Template not associated with Tyk Organization

    Fixed an issue where API Templates were not correctly assigned to Tyk Organizations allowing the potential for accidental sharing of secret data between Organizations through use of the incorrect template.

  • Added control over access to context variables from middleware when using Tyk OAS APIs

    Addressed a potential issue when working with Tyk OAS APIs where request context variables are automatically made available to relevant Tyk and custom middleware. We have introduced a control in the Tyk OAS API definition to disable this access if required.

  • Resolved PostgreSQL Dashboard Analytics issue

    Fixed an issue in the api/usage endpoint where Dashboard+Postgres returned unfiltered results with one valid tag, requiring duplication of the parameter as a workaround for multiple tags. Analytics now correctly filter results as expected.

Tyk Gateway v5.3.4, Tyk Dashboard v5.3.4

26 Aug 15:55
4e82e7d
Compare
Choose a tag to compare

Tyk Dashboard 5.3.4

Fixed

  • Resolved an issue where Dashboard running on PostgreSQL setup didn't displayed logs for EDP users.

Tyk Gateway 5.3.4

No changes

Tyk Gateway v5.3.3, Tyk Dashboard v5.3.3

01 Aug 20:42
4e82e7d
Compare
Choose a tag to compare

Tyk Gateway 5.3.3

Fixed

  • Resolved an issue encountered in MDCB environments where changes to custom keys made via the Dashboard were not properly replicated to dataplanes.
  • Resolved an issue, when a key was created or reset, the key creation sequence was erroneously repeated for every API in the access list.
  • Resolved an issue where a Server Side Event (SSE) streaming response would be considered for caching. As caching needs to buffer the response, this also prevented SSE from correctly being proxied.
  • Resolved an issue where Host and Latency fields (Total and Upstream) were not correctly reported for edge gateways in MDCB setups. The fix ensures accurate Host values and Latency measurements are now captured and displayed in analytics data.

Tyk Dashboard 5.3.3

Fixed

  • Fixed bug where Dashboard UI would display blank page while creating Key with certificate
  • Addressed an issue where the Dashboard displayed an empty page when accessing Activity by Endpoint information after upgrading to Tyk 5.3.1. Users can now see all necessary information.
  • Fixed issue in SSO where user permissions were not applied, ensuring visibility of Save API button in Dashboard UI

Tyk Gateway 5.4.0 and Tyk Dashboard 5.4.0

03 Jul 08:56
9b62c31
Compare
Choose a tag to compare

Add RSA-PSS Support

24 Jun 16:23
Compare
Choose a tag to compare
Add RSA-PSS Support Pre-release
Pre-release
v5.5.0-rc1

Add support for RSAPSS signed JWTs

Tyk Gateway 5.0.13 and Tyk Dashboard 5.0.13

04 Jul 14:54
26167e8
Compare
Choose a tag to compare

Tyk Gateway 5.0.13

Fixed

  • Resolved an issue encountered in MDCB environments where changes to custom keys made via the Dashboard were not properly replicated to dataplanes.

Tyk Dashboard 5.0.13

  • No changes only version bump

Tyk Gateway 4.0.16 and Tyk Dashboard 4.0.16

20 May 19:06
6b05675
Compare
Choose a tag to compare

Tyk Gateway 4.0.16

Fixed

  • Fixed a bug where gateway logs were not honouring enable_key_logging setting
  • Fixed a bug where enforced timeout values wouldn't be correct on a per-request basis. As we enforced timeouts only on the transport level, and created the transport only once within max_conn_time, the timeout in effect was not deterministic.
  • Fixed a minor issue with Go Plugin virtual endpoints where a runtime log error was produced from a request, even if the response was successful. Thanks to @uddmorningsun for spotting this and proposing a fix.
  • Fixed a bug where, when using MongoDB, Tyk could incorrectly grant access to an API using a key after that API had been deleted from a policy.
  • Fixed a bug where Tyk could return the wrong error code when a websocket upstream responds with error
  • Fixed a bug where keys linked to multiple policies become unusable if one of the policies is removed.
  • Remove the extra chunked transfer encoding that was added to rawResponse analytics
  • Updated the default Hybrid Pump RPC pool size from 20 to 5 connections in order to reduce default CPU and memory footprint
  • Fixed a bug where the Gateway did not correctly close idle upstream connections (sockets) when configured to generate a new connection after a configurable period of time (using the max_conn_time configuration option).
  • Fixed a bug where the URL Rewrite middleware did not correctly handle escaped characters in the URL.
  • Fixed a potential performance issue related to high rates of Gateway reloads (when the Gateway is updated due to a change in APIs and/or policies)
  • Fixed a memory leak that occurred when setting the strict routes option to change the routing to avoid nearest-neighbour requests on overlapping routes (TYK_GW_HTTPSERVEROPTIONS_ENABLESTRICTROUTES)
  • Fixed one Critical and six High CVEs reported in the Plugin Compiler.
  • Fixed automated token trimming in Redis, ensuring efficient management of OAuth tokens by implementing a new hourly job within the Gateway and providing a manual trigger endpoint.
  • Fixed a bug that was introduced in the fix applied to the URL Rewrite middleware.

Tyk Dashboard 4.0.16

Fixed

  • Fixed a bug where, if you created a Key which provided access to an inactive or draft API, you would be unable to subsequently modify that Key (via the Dashboard or directly via the Tyk Gateway API)
  • Fixed a bug where Dashboard would take too long loading Policies to the Gateway
  • Fixed a bug where the Dashboard could timeout while loading policies at startup. Added connection_timeout configuration option (defaults to 30 seconds)
  • Adjusted the description for the Policy states, so that it reflects the actual behaviour of the policy, when attached to a key.
  • Optimised the loading and re-loading of APIs and Policies for complex scenarios
  • Fixed a bug where searching for a User in the Tyk Dashboard didn't match partial user names.
  • Moved all HTML inline scripts to their own script files, to accommodate the Content security policies that have been enabled, to increase security.