Changes for page V3.5.1
Last modified by Erik Bakker on 2026/02/20 13:46
From version 16.1
edited by CarlijnKokkeler
on 2024/04/08 11:43
on 2024/04/08 11:43
Change comment:
There is no comment for this version
To version 62.1
edited by Erik Bakker
on 2026/02/20 13:46
on 2026/02/20 13:46
Change comment:
There is no comment for this version
Summary
-
Page properties (3 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -V3. 0.01 +V3.5.1 - Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. CarlijnKokkeler1 +XWiki.ebakker - Content
-
... ... @@ -1,37 +1,25 @@ 1 1 {{container}} 2 2 {{container layoutStyle="columns"}}((( 3 3 4 - These are the releasenotesfor this runtimeimage. Oncea runtimeimageisreleased,everynewrelease willutilizethis runtimeimageasbaseforcreatingruntime imagesfordocker. Formoreinformationonthis pleasecheck out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.CrashCourse.CrashCoursePlatform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]].4 +{{info}}Maintenance update where we primarily updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. 5 5 6 - =====Major changes=====6 +This image will be available for all users. If you notice any changed behavior that you believe is caused by this new image, we encourage you to notify us.{{/info}} 7 7 8 -* Updated our Java runtime version from Java 8 (8u352-b08) to Java 17 (17.0.10_7). 9 -* Updated Spring boot version from 2.7 to 3.2: 10 -** Updated Spring Framework from 5 to 6 11 -** Updated Java EE 8 to Jakarta EE 10 12 -* SSL version support changes: 13 -** TLS version 1.1 is no longer supported. We have kept support for TLS version 1.1 for an extended time to support legacy systems, and feel it is appropriate to remove support as we see negligible traffic still using this TLS version. 14 -** TLS version 1.3 is now the default (was TLS version 1.2). TLS version 1.2 will remain supported. 15 -* OAuth2 authorization no longer supports the previously deprecated implicit grant type. 16 -* SOAP webservices: For webservices outbound gateways, the default hostname verifier was changed from browser compatible to strict. No major impact is expected here as the strict behavior is considered to be industry default. Only webservers that provide a server certificate with a wildcard may be affected (e.g. having a Common Name such as *.emagizcloud.com), and only if the endpoint that is being called is on a deeper level than the certificate (e.g. webservice.api.emagizcloud.com) AND the server certificate does not contain that endpoint (as a Subject Alternative Name). 17 -* Data pipelines: Spring has changed the database schema used for data pipelines operations. When the default H2 database is used for data pipelines, we automatically migrate your database schema to the new flavor. Note: this does block you from moving back to a previously activated release, unless the image is re-built. 18 -* JDBC Data source support: The BoneCP data source support object has been removed and replaced by the Hikari data source support object. eMagiz will generate a Hikari data source in every flow containing a BoneCP data source, after which you should verify the settings, replace the data source references and remove the BoneCP support object before deploying. 19 -* Several components have small changes in their configurations which require a new flow version to be included in your release. eMagiz will create new flow versions for these changes, which you need to manually include in your release. These affects any flow that has any of the following components: 20 -** Data pipelines: 21 -***‘simple job launcher’ → eMagiz will push a new flow version which replaces this with ‘task executor job launcher’ 8 +These are the release notes for this runtime image. Once a runtime image is released, every new release will utilize this runtime image as a base for creating runtime images for Docker. For more information, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]]. 22 22 23 -‘job explorer’ → eMagiz will push a new flow version which adds a ‘data source’. 10 +* Updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. 11 +** With this Java update, several cipher suites have been disabled. This relates to the remainder of the TLS_RSA cipher suites, which were still enabled on the previous Java versions. eMagiz already did not allow these cipher suites for traffic to the eMagiz cloud (using our Carwash). Therefore, the potential impact of this change is limited to outgoing connectivity, and on-premises deployments. These 6 previously enabled cipher suites are now disabled: 12 +*** ((((% border="2" cellpadding="10" cellspacing="10" style="width:1000px" %) 13 +|=(% style="width: 45px;" %)Java Cipher|=(% style="width: 241px;" %)OpenSSL 14 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA|(% style="width:241px" %) [[AES128-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA/||target="blank"]] 15 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA256|(% style="width:241px" %) [[AES128-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA256/||target="blank"]] 16 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_GCM_SHA256|(% style="width:241px" %) [[AES128-GCM-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_GCM_SHA256/||target="blank"]] 17 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA|(% style="width:241px" %) [[AES256-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA/||target="blank"]] 18 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA256|(% style="width:241px" %) [[AES256-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA256/||target="blank"]] 19 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_GCM_SHA384|(% style="width:241px" %) [[AES256-GCM-SHA384 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_GCM_SHA384/||target="blank"]] 20 +))) 24 24 25 - Httpmessage sender: HttpComponentsMessageSender→eMagizwillreplace thiswith HttpComponents5MessageSender22 +* Restore transformation behavior for JSON payloads containing @ characters 26 26 27 -SOAP webservices: Web service outbound gateway → eMagiz will push a new version to keep the resulting code compatible. No functional changes 28 - 29 -Credentials 30 - 31 -SFTP session factory → eMagiz will push a new flow version to keep the resulting code compatible. 32 - 33 -Secured channels support object, used by API gateways with OAuth2 security, is removed → eMagiz will push a new flow version where this is migrated to the ‘HTTP security’ support object instead. 34 -=====Minor changes===== 35 - 36 36 )))((({{toc/}}))){{/container}} 37 37 {{/container}}