Added Fixed Security

KeyCloud - Changelog: v13.8.17

1 month ago

🚀 ADDED

  • standalone project now uses platform toolset v143 to match sdk lib toolchain and avoid linker mismatch
  • forward declaration for env_or_default in standalone main for clean release builds
  • sdk download() now auto-detects encrypted artifacts via /meta and decrypts at runtime using app secret
  • backend upload flow now supports encryption toggle without requiring manual encryption_key
  • server-side app secret lookup for encrypted file storage path
  • files/modules upload modal now auto-calculates sha256 from selected file (browser-side) and displays it in-step
  • files/modules upload modal now includes optional manual sha256 override input for operator use
  • standalone downloader now asks for manual sha256 override only when explicitly requested; default flow is automatic
  • files upload modal now auto-extracts scope encryption key from selected app and shows it directly in step 1
  • added 'Extract Key' button in upload modal to copy the scope encryption key to clipboard

🛠️ FIXED

  • sdk download path now reports "transport policy blocked url" explicitly instead of empty request-failed fallback
  • sdk no longer resets http status to 0 on local write-open failure (preserves real http status context)
  • sdk download error handling no longer replays a second diagnostic GET when the first response was already http 2xx
  • sdk download now reports "local write failed" for 2xx responses that fail at local file write step (prevents huge binary payload in error dialogs)
  • sdk download requests now include explicit user-agent and accept headers to satisfy backend ua checks
  • rebuilt sdk + standalone release binaries after user-agent patch
  • backend request_user_agent now falls back to x-keycloud-sdk-client
  • rebuilt and redeployed live auth service container with UA fallback patch
  • sdk now sends x-keycloud-sdk-client header on json and binary download requests
  • sdk now sets CURLOPT_USERAGENT explicitly for both json and binary requests (libcurl-level ua)
  • removed manual passphrase/sha requirement from normal encrypted download path
  • removed upload requirement for manual encryption key entry in the files/modules modal when encryption is enabled
  • rebuilt standalone sample after download-flow patch so the new prompt behavior is active in release binary
  • removed live modal requirement to manually type an encryption key before continuing
  • deployed new dashboard build to vps and synced updated static assets so the dashboard uses the new modal
  • dashboard/index.html now points to /dashboard/assets/index-AaqffFsG.js (new modal build with Extract Key)