Changes for page V3.5.1
Last modified by Erik Bakker on 2026/02/20 13:46
From version 7.1
edited by CarlijnKokkeler
on 2024/01/18 09:30
on 2024/01/18 09:30
Change comment:
There is no comment for this version
To version 57.1
edited by Erik Bakker
on 2026/02/20 13:44
on 2026/02/20 13:44
Change comment:
There is no comment for this version
Summary
-
Page properties (3 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -V 2.1.0 - Reverted1 +V3.5.1 - Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. CarlijnKokkeler1 +XWiki.ebakker - Content
-
... ... @@ -1,22 +1,27 @@ 1 1 {{container}} 2 2 {{container layoutStyle="columns"}}((( 3 3 4 -{{ warning}}This imagehas beenreverteddueto reportedissueswiththestart/stopflowoverviewwhilstdeployingthisnewimage.{{/warning}}4 +{{info}}Maintenance update where we primarily updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. 5 5 6 -Th esearethereleasenotesforthisruntimeimage.Oncea runtimeimageis released,everynew releasewillutilizethis runtime image asbaseforcreatingruntime imagesfor docker.For moreinformation on this pleasecheckout this [[microlearning>>doc:Main.eMagizAcademy.Microlearnings.Crash Course.CrashCoursePlatform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]].6 +This image will be available for all users. If you notice any changed behavior that you believe is caused by this new image, we encourage you to notify us.{{/info}} 7 7 8 - =====New features=====8 +These are the release notes for this runtime image. Once a runtime image is released, every new release will utilize this runtime image as a base for creating runtime images for Docker. For more information, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]]. 9 9 10 -New components to support a failover setup: 10 +* Updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. 11 +** With this Java update, several cipher suites have been disabled. This relates to the remainder of the TLS_RSA cipher suites, which were still enabled on the previous Java versions. eMagiz already did not allow these cipher suites for traffic to the eMagiz cloud (using our Carwash). Therefore, the potential impact of this change is limited to outgoing connectivity, and on-premises deployments. 12 +These 6 previously enabled cipher suites are now disabled: 11 11 12 -* Clustered lock registry: obtain a lock that can be shared over different containers 13 -* Leader initiator: Used to automatically start and stop roles based on whether they can obtain a cluster-wide lock 14 -* New & extended operations for controlling integration components 15 -** New: Start & stop all components in a specific role, so you can start and stop multiple components at the same time 16 -** New: List all roles and whether they support leadership 17 -** Extended: List flow components now also shows whether a component is configured to be in a role 14 +((((% border="2" cellpadding="10" cellspacing="10" style="width:1000px" %) 15 +|=(% style="width: 45px;" %)Java Cipher|=(% style="width: 241px;" %)OpenSSL 16 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA|(% style="width:241px" %) [[AES128-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA/||target="blank"]] 17 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA256|(% style="width:241px" %) [[AES128-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA256/||target="blank"]] 18 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_GCM_SHA256|(% style="width:241px" %) [[AES128-GCM-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_GCM_SHA256/||target="blank"]] 19 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA|(% style="width:241px" %) [[AES256-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA/||target="blank"]] 20 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA256|(% style="width:241px" %) [[AES256-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA256/||target="blank"]] 21 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_GCM_SHA384|(% style="width:241px" %) [[AES256-GCM-SHA384 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_GCM_SHA384/||target="blank"]] 22 +))) 18 18 19 - Deploy- Deploymentplan:to incorporatefailoveractionsduring deployment,twonewdeploymentsteptypesareintroducednamely“Group”and “Failover”.24 +* Restore transformation behavior for JSON payloads containing @ characters 20 20 21 21 )))((({{toc/}}))){{/container}} 22 22 {{/container}}