https://github.com/cloudfoundry/uaa/releases/tag/4.35.0
I understand that there was a change made to logging in 4.31.0 - Upgrade to Log4j2 logging framework
What do I need to do to get logging back ? Do I need to create a log4j2 file ? If so, where do I need to save it.
Any help is appreciated.
Thanks,
Viraj
Please add the calendar appt from here: https://www.cloudfoundry.org/community-calendar.
CF-deployment v10.0 is now live. Please refer to the release notes for breaking changes: https://github.com/cloudfoundry/cf-deployment/releases/tag/v10.0.0
Let me know if you have any questions,
We are not using uaa-release, and we can control the protocol (https). Our issue is that the port number is forced to be 443 when we don't want that to happen.
Regards
Enrique
Pivotal is nominating Allen Duet for the Loggregator Project Lead in the Application Runtime PMC.
Allen is a Director of Product Management at Pivotal where he oversees Cloud Foundry products related to Observability and Automation. Allen joined Pivotal and Cloud Foundry in December 2015.
Prior to joining Pivotal, Allen was Chief Technology Officer at Swiftpage ACT!, a software company focused on CRM and email marketing products for businesses. Allen is located in Denver and enjoys hiking, skiing, and a variety of outdoor activities.
Please send any other nominations directly to me or in reply to this message no later than 11:59 PM PDT on Monday, May 20, 2019.
Thanks,
Eric Malm
Hi, everyone,
Fred Krone, the lead for the Loggregator project within the Application Runtime PMC, is stepping down from the project, as he has recently left Pivotal. We thank him for his service.
The Loggregator team, located in Denver, now has an opening for its project lead. Project leads must be nominated by a Cloud Foundry Foundation member. Please send nominations directly to me or in reply to this message no later than 11:59 PM PDT on Friday, Aug 2, 2019.
Also, if you have any questions about the role or the nomination process, as described in the CFF governance documents (https://www.cloudfoundry.org/governance/cff_development_operations_policy/), please let me know.
Thanks,
Eric Malm, CF Application Runtime PMC Lead
Fred Krone, the lead for the Loggregator project within the Application Runtime PMC, is stepping down from the project, as he has recently left Pivotal. We thank him for his service.
The Loggregator team, located in Denver, now has an opening for its project lead. Project leads must be nominated by a Cloud Foundry Foundation member. Please send nominations directly to me or in reply to this message no later than 11:59 PM PDT on Friday, Aug 2, 2019.
Also, if you have any questions about the role or the nomination process, as described in the CFF governance documents (https://www.cloudfoundry.org/governance/cff_development_operations_policy/), please let me know.
Thanks,
Eric Malm, CF Application Runtime PMC Lead
Release Highlights
- Gorouter is configurable to prune with TTL when using TLS to validate backend identity. This is a temporary mitigation of an issue where a route deregistration message is lost details
- gorouter_ctl runs correctly on Xenial stemcells details
- Operator can configure routing-api to support mTLS connections details
- Routing API provides a bosh link that route registrar consumes to enable mTLS with the routing api details
- Operator can configure route-registrar to communicate over mTLS to routing-api details
- gorouter consumes Routing-API Link for mtls properties details
- Operator can configure gorouter to fetch routes over mTLS from routing-api details
- TCP Router consumes Routing-API Link for mtls properties details
- Operator can configure tcp-router to communicate over mTLS to routing-api details
- Route registrar
route_registrar.routing_api.skip_ssl_validation
property is now correctly applied details - Operator can to configure gorouter with client certs for route services details
- cloudfoundry/routing-release #146: Deploy does not fail when required property
server_cert_domain_san
is not configured details
Manifest Property Changes
Job | Property | 0.188.0 Default | 0.189.0 Default |
---|---|---|---|
gorouter | router.route_services.cert_chain |
did not exist | undefined |
gorouter | router.route_services.private_key |
did not exist | undefined |
gorouter | routing_api.uri |
http://routing-api.service.cf.internal | https://routing-api.service.cf.internal |
gorouter | routing_api.port |
3000 | from routing_api link |
gorouter | routing_api.ca_certs |
did not exist | from routing_api link |
gorouter | routing_api.cert_chain |
did not exist | from routing_api link |
gorouter | routing_api.private_key |
did not exist | from routing_api link |
gorouter | router.prune_all_stale_routes |
did not exist | false |
gorouter | router.set_kernel_parameters |
did not exist | true |
route_registrar | route_registrar.logging_level |
did not exist | info |
route_registrar | route_registrar.routing_api.api_url |
http://routing-api.service.cf.internal:3000 | https://routing-api.service.cf.internal:3001 |
route_registrar | route_registrar.routing_api.client_cert |
did not exist | from routing_api link |
route_registrar | route_registrar.routing_api.client_private_key |
did not exist | from routing_api link |
route_registrar | route_registrar.routing_api.server_ca_cert |
did not exist | from routing_api link |
routing-api | routing_api.enabled_api_endpoints |
did not exist | “both” |
routing-api | routing_api.mtls_port |
did not exist | 3001 |
routing-api | routing_api.mtls_ca |
did not exist | generated by credhub |
routing-api | routing_api.mtls_server_cert |
did not exist | generated by credhub |
routing-api | routing_api.mtls_server_key |
did not exist | generated by credhub |
routing-api | routing_api.mtls_client_cert |
did not exist | generated by credhub |
routing-api | routing_api.mtls_client_key |
did not exist | generated by credhub |
routing-api | consul.servers |
http://127.0.0.1:8500 | removed property |
routing-api | routing_api.skip_consul_lock |
false | removed property |
tcp_router | routing_api.uri |
http://routing-api.service.cf.internal | https://routing-api.service.cf.internal |
tcp_router | routing_api.port |
3000 | from routing_api link |
tcp_router | routing_api.client_cert |
did not exist | from routing_api link |
tcp_router | routing_api.client_private_key |
did not exist | from routing_api link |
tcp_router | routing_api.ca_cert |
did not exist | from routing_api link |
We have an update on the scope for CF-Deployment v10.0. We are postponing BOSH Service discovery to the next major release. The changes require additional validation and will not be ready for v10 release. I have updated the scope doc accordingly.
https://docs.google.com/document/d/1qWaFHcquPUaWrVWndJuWt-W_niflN2p4aVqvqy2EyM4/edit#
Please let me know if you have any questions.
Hi
We are running UAA behind an ingress controller on Kubernetes. The connection to the ingress controller is https on a port other than 443 e.g. 8443. The connection to UAA pod is http.
The issue we are facing is that the URLs UAA will return to the browser during the OAuth handshake include http instead of https. When we set X-Forwarded-Proto to "https" at the ingress controller, then the returned URLs contain https, but the port is set to 443. We believe this is because of this line of code: https://github.com/cloudfoundry/uaa/blob/develop/server/src/main/java/org/cloudfoundry/identity/uaa/security/web/FixHttpsSchemeRequest.java#L44
Is there another way of doing this? Basically, instead of redirecting to http://url:8080, we want a redirection to https://url:8443. Currently, what we get is https://url with the X-Forwarded-Proto header set to "https".
Many thanks in advance
Enrique.
Reminder that the CAB call [0] for July 2019 is next Wednesday 17th @ 8a Pacific.
We will have regular highlights, QAs, as well as two planned talks:
1. External DNS Connector for Cloud Foundry [1] by David Grizzanti of Comcast
2. Stratos UI Update - now with Kubernetes support [2] by Neil MacDougall of SUSE
All other info in agenda [0]. Zoom soon. Best,
dr.max
ibm ☁
silicon valley, ca
maximilien.org
[0] https://docs.google.com/
[1] https://github.com/kubernetes-
We are running UAA behind an ingress controller on Kubernetes. The connection to the ingress controller is https on a port other than 443 e.g. 8443. The connection to UAA pod is http.
The issue we are facing is that the URLs UAA will return to the browser during the OAuth handshake include http instead of https. When we set X-Forwarded-Proto to "https" at the ingress controller, then the returned URLs contain https, but the port is set to 443. We believe this is because of this line of code: https://github.com/cloudfoundry/uaa/blob/develop/server/src/main/java/org/cloudfoundry/identity/uaa/security/web/FixHttpsSchemeRequest.java#L44
Is there another way of doing this? Basically, instead of redirecting to http://url:8080, we want a redirection to https://url:8443. Currently, what we get is https://url with the X-Forwarded-Proto header set to "https".
Many thanks in advance
Enrique.
Hi Lee,I'm forwarding your message along to the Pivotal security team to take a look.Thanks,EmilyOn Tue, Jul 2, 2019 at 12:05 AM Lee Porte via Lists.Cloudfoundry.Org <lee.porte=digital.cabinet-office.gov.uk@...> wrote:I've seen them on there too, but that's a bit more awkward to put automated monitoring in for.On Tue, 2 Jul 2019 at 07:28, Dr Nic Williams <drnicwilliams@...> wrote:Someone else may have a more comprehensive answer, but I’ve seen the CVEs announced on the #security channel on CF slack.
Nic
From: cf-dev@... on behalf of Lee Porte via Lists.Cloudfoundry.Org <lee.porte=digital.cabinet-office.gov.uk@...>
Sent: Monday, July 1, 2019 10:50 pm
To: Discussions about Cloud Foundry projects and the system overall.
Subject: [cf-dev] Security feed not updatingHi,
Has anyone else noticed that https://www.cloudfoundry.org/foundryblog/security-advisory/feed/ is not being updated with new security issues?
Has it moved? I've not spotted anything via the blog site to indicate either way. We use automated monitoring of this feed to alert us of potential CVEs we need to look at specifically on the platform.
Thanks
Lee--
--
I've seen them on there too, but that's a bit more awkward to put automated monitoring in for.On Tue, 2 Jul 2019 at 07:28, Dr Nic Williams <drnicwilliams@...> wrote:Someone else may have a more comprehensive answer, but I’ve seen the CVEs announced on the #security channel on CF slack.
Nic
From: cf-dev@... on behalf of Lee Porte via Lists.Cloudfoundry.Org <lee.porte=digital.cabinet-office.gov.uk@...>
Sent: Monday, July 1, 2019 10:50 pm
To: Discussions about Cloud Foundry projects and the system overall.
Subject: [cf-dev] Security feed not updatingHi,
Has anyone else noticed that https://www.cloudfoundry.org/foundryblog/security-advisory/feed/ is not being updated with new security issues?
Has it moved? I've not spotted anything via the blog site to indicate either way. We use automated monitoring of this feed to alert us of potential CVEs we need to look at specifically on the platform.
Thanks
Lee--
--
The first release of the Go buildpack after August 10, 2019 will no longer include Go versions 1.11.x These Go versions will no longer be supported upstream. Please migrate your Go apps to supported versions of Go before that time.
Note: Unless you are manually specifying a version of Go for the buildpack to use, or you have customized your Go buildpack, no action is required.
Thanks,
Elliott Shanks, CF Buildpacks PM
The first release of the PHP buildpack after August 10, 2019 will no longer include nginx versions 1.15.x. These nginx versions are no longer supported upstream. Please migrate your PHP apps to supported versions of nginx before that time.
In addition, the default version of nginx will be bumped to 1.17.x at this time.
Note: Unless you are manually specifying a version of nginx for the buildpack to use, or you have customized your PHP buildpack, no action is required.
Thanks,
Elliott Shanks, CF Buildpacks PM
The first release of the staticfile buildpack after August 10, 2019 will no longer include nginx versions 1.15.x. These nginx versions are no longer supported upstream. Please migrate your staticfile apps to supported versions of nginx before that time.
In addition, the default version of nginx will be bumped to 1.17.x at this time.
Note: Unless you are manually specifying a version of nginx for the buildpack to use, or you have customized your staticfile buildpack, no action is required.
Thanks,
Elliott Shanks, CF Buildpacks PM
The first release of the R buildpack after August 10, 2019 will no longer include R versions 3.4.x and 3.5.x. These R versions are no longer supported upstream. Please migrate your R apps to supported versions of R before that time.
Note: Unless you are manually specifying a version of R for the buildpack to use, or you have customized your R buildpack, no action is required.
Thanks,
Elliott Shanks, CF Buildpacks PM
The first release of the .NET Core buildpack after August 10, 2019 will no longer include dotnet-runtime versions 1.0.x and 1.1.x. These dotnet-runtime versions are no longer supported upstream. Please migrate your .NET Core apps to supported versions of dotnet-runtime before that time.
Note: Unless you are manually specifying a version of dotnet-runtime for the buildpack to use, or you have customized your .NET Core buildpack, no action is required.
Thanks,
Elliott Shanks, CF Buildpacks PM
Reminder that the CAB call [0] for July 2019 is next Wednesday 17th @ 8a Pacific.
We will have regular highlights, QAs, as well as two planned talks:
1. External DNS Connector for Cloud Foundry [1] by David Grizzanti of Comcast
2. Stratos UI Update - now with Kubernetes support [2] by Neil MacDougall of SUSE
All other info in agenda [0]. Zoom soon. Best,
dr.max
ibm ☁
silicon valley, ca
maximilien.org
[0] https://docs.google.com/document/d/1SCOlAquyUmNM-AQnekCOXiwhLs6gveTxAcduvDcW_xI
[1] https://github.com/kubernetes-incubator/external-dns/pull/955