Skip to content

Releases: cloudfoundry/cf-networking-release

2.26.0

02 Dec 18:56
Compare
Choose a tag to compare

2.25.0

26 Sep 17:29
Compare
Choose a tag to compare

2.24.0

02 Dec 19:21
Compare
Choose a tag to compare

Release Highlights

  • Upgrade cf-cli bosh release to v1.16 for latest fixes details
  • Clients of policy server external API receive a strict-transport-security header on HTTP requests details
  • Policy Server External API can be configured to listen using TLS details

Manifest Property Changes

Job Property 2.22.0 Default 2.23.0 Default
policy-server enable_tls did not exist false
policy-server server_cert did not exist
policy-server server_key did not exist

2.23.0

17 Jun 18:49
Compare
Choose a tag to compare

Release Highlights

  • golang version bumped to 1.12.6 story
  • golang version is now discoverable in docs story
  • Default values for database connections have been updated to reduce pressure on the database story
  • Dynamic Egress ping tests can be disabled when running Networking Acceptance Tests to support environments that prevent ping requests story
  • Increase timeout for fixture apps to start in Networking Acceptance Tests to better support small footprint environments story
  • Policy Server API now returns X-XSS-Protection header story

Manifest Property Changes

Job Property 2.22.0 Default 2.23.0 Default
policy-server max_idle_connections 200 10
policy-server-internal max_idle_connections 200 10

2.22.0

20 Feb 18:00
Compare
Choose a tag to compare

This release includes no new features. This release was cut in tandem with silk-release v2.22.0 which has a bug fix.

Tested with silk-release v2.22.0

2.21.0

13 Feb 21:37
Compare
Choose a tag to compare

This release includes the following features:

  • Continued work towards achieving parity between Dynamic Egress Policy Configuration with ASGs
  • General maintenance and continued work towards Istio/Envoy integration
  • New vxlan-policy-agent-windows job, with limited support for dynamic egress (c2c policy is WIP)
  • operator no longer needs to specify the VIPCIDR range in the bosh-dns-adapter. It can now be retrieved from a bosh-link provided by the Cloud Controller.

Tested with silk-release v2.21.0

Significant Changes

Istio/Envoy integration

Dynamic Egress Policy Configuration parity with ASG

Miscellaneous

2.20.0

12 Dec 17:57
Compare
Choose a tag to compare

This release includes the following feature:

  • Continued work towards achieving parity between Dynamic Egress Policy Configuration with ASGs
  • General maintenance and continued work towards Istio/Envoy integration

Tested with silk-release v2.20.0

Significant Changes

Istio/Envoy integration

Dynamic Egress Policy Configuration parity with ASG

Miscellaneous

2.19.0

15 Nov 19:15
Compare
Choose a tag to compare

Significant Changes

  • We finished our proof of concept for putting envoy in the data path 🎉🎉🎉. To try out this experimental feature use the enable-sidecar-egress-proxying.yml opsfile in addition to the other istio opsfiles.
  • We have finished making the dynamic egress destination and dynamic egress policy endpoints idempotent. This should make it easier to script adding dynamic egress policies. See docs for how to use these endpoints.

Envoy in the data path Features (experimental)

Dynamic Egress Features (experimental)

Metric Features

Other Features

Bug Fixes

Chores


Tested with silk-release v2.19.0

2.18.0

31 Oct 17:59
Compare
Choose a tag to compare

This release includes the following features

  • Update destination object API is now available for configuring dynamic egress policy configuration
  • Service accounts can now be used to access the policy server APIs
  • Policy server can now connect to databases on Google or Azure clouds with TLS enabled
    Tested with silk-release v2.18.0

Significant Changes

Manifest changes

  • An optional parameter has been added to the bosh-dns-adapter job to allow for internal service mesh domains. Routes created with these domains will be proxied through the sidecar envoy. This is a part of istio integration. Defaults to []
    • internal_service_mesh_domains
  • An optional parameter has been added to the policy-server job to skip host name validation when using ssl validation. The policy-server-internal uses the same configuration applied to policy-server via bosh links.
    • database.skip_hostname_validation

Dynamic Egress Policy Configuration

TLS connection from policy server

Allow service accounts to access policy server APIs

Miscellaneous

2.17.0

09 Oct 17:34
Compare
Choose a tag to compare

This release includes the following features

  • You can now configure egress policies from app/space without having to restart the app. This release contains an experimental feature that can be activated with a feature flag in the bosh manifest. This has new network policy APIs to configure destination objects for external services and manage egress policies to them at the app and space levels (Currently done through Application Security Groups). You can find more instructions on our Github page.
    Tested with silk-release v2.17.0

Significant Changes

Dynamic Egress Policy Configuration

DB Open Connection Metrics