Skip to content

4.31.0

Compare
Choose a tag to compare
@cf-identity cf-identity released this 13 May 22:54
· 3942 commits to develop since this release

Breaking Changes

UAA BOSH Release should stop accepting http traffic from the public

  • Replaces “uaa.port” with “uaa.locahost_http_port” with a default value of 8080 -- this only allows access to the “healthz” endpoint from localhost
  • Requires any component communicating with UAA to configure that connection with HTTPS (may require changing ports and providing UAA’s server cert CA to that component)
  • See change cf-deployment for example

As a CF operator, I can configure UAA to ignore hostnames in server certificates for TLS connection to database

  • Removes old tls properties “uaadb.tls_enabled” and “uaadb.skip_ssl_validation”
  • Introduces new property “uaadb.tls” with default “enabled”
  • Valid values for “uaadb.tls” are “enabled,” “enabled_skip_hostname_validation,” “enabled_skip_all_validation” and “disabled”

As a Platform Operator, I want to use only BPM to manage the UAA process

  • Anyone who used to deploy UAA without co-locating BPM will see deployment failures after upgrading UAA
  • Anyone who was already deploying without mentioning bpm.enabled in their manifest (the default was false), or explicitly had bpm.enabled: false, will start using bpm after upgrading.
  • Anyone who was already deploying with the bosh property bpm.enabled set to true should be unaffected
  • The bosh property bpm.enabled used to enable BPM will be removed and operators and downstream teams who were using it can remove it from their manifest

Uaa-release sometimes fails to deploy with an error about /etc/ssl/certs/ca-certificates.crt

  • UAA no longer loads certificates added to the operating system trust store (i.e. /usr/local/share/ca-certificates) after its pre-start script begins.

Simplify the way uaa-release builds the java trust store (no longer adds them to the VM's truststore)

  • Certs added via the BOSH property uaa.ca_certs used to be loaded into the vm's trust store. This no longer happens. They also used to be loaded into the UAA's Java JVM's truststore, which still happens.

Upgrade to Log4j2 logging framework

  • Updated configuration variable CLOUD_FOUNDRY_CONFIG_PATH to CLOUDFOUNDRY_CONFIG_PATH.
  • To provide custom logging configuration, the UAA will still recognize logging.config as a path to a logging configuration file. However, this file must now be Log4j2 format.
  • The UAA will no longer recognize logging.file or logging.path as valid Log4j2 configuration variables.

Features

Bug Fixes