Skip to content

Releases: cloudfoundry/routing-release

0.174.0

15 Mar 00:15

Choose a tag to compare

Release Highlights

  • When a connection to a TLS enabled backend fails, Gorouter tries to send a request to another backend of the app before returning a response to the client. In an environment where some backends are TLS enabled and some are not, if the Gorouter first chooses a TLS enabled backend and fails, and if it subsequently chooses a non TLS backend, then it will appropriately use a plain text request. details

Manifest Property Changes

  • No manifest property changes

0.173.0

13 Mar 19:39

Choose a tag to compare

Release Highlights

  • Previously if an operator sets router.disable_http: true in the Gorouter manifest, requests for a route bound to a route service running as an app on the platform would return a 502. This has now been fixed, route services will work as expected when router.disable_http: true details
  • Golang version updated from 1.9.1 to 1.9.4 details

Manifest Property Changes

  • No manifest property changes

0.172.0

13 Feb 20:31

Choose a tag to compare

Release Highlights

0.171.0

20 Jan 01:36

Choose a tag to compare

Release Highlights

  • Gorouter now supports websocket connections to backend applications for routes registered with tls_ports details
  • routing-release now enables operators to expose available UAA clients via BOSH links in cf-deployment details
  • We see a performance degradation in this release, on further investigation we are confident this is not related to routing-release changes or stemcell changes. This strongly suggests it might be due to underlying IaaS performance. We see a 10% decrease in peak latency from 4150 requests/s to 3750 requests/s and an increase in latency at throughput above 2750 requests/s.

Manifest Property Changes

  • No manifest property changes

0.170.0

16 Jan 23:11

Choose a tag to compare

Release Highlights

  • Fix for RATs failure with CF CLI 6.33.1 details
  • The performance report included with this release shows a performance degradation since the last release. This can be attributed to the hypervisor patches on AWS and the BOSH stemcell patch for Meltdown. On our test environment we observed less than a 5% decrease in peak throughput from 4300 requests/s to 4150 requests/s, and latency increased marginally at throughput levels of 3500 requests/s and more.

Manifest Property Changes

  • No manifest property changes

0.169.0

15 Dec 00:37

Choose a tag to compare

Release Highlights

  • Gorouter now emits a metric total_dropped_messages that gives the total number of messages dropped by the NATs client details
  • Gorouter now emits a metric buffered_messages that gives the size of the number of messages in the NATs client buffer details
  • In 0.168.0 support was added to Gorouter for three configurable behaviors regarding validation of client certificates. In this release the default was changed from none to request details

Manifest Property Changes

router

0.168.0 0.169.0 Default Value
'router.client_cert_validation` default changed Changed to request from none

0.168.0

28 Nov 22:32

Choose a tag to compare

Release Highlights

  • Gorouter now immediately prunes backends registered with tls_port when TLS handshake fails because backend doesn't support TLS details
  • Gorouter now supports three configurable behaviors regarding validation of client certificates: validation disabled, validate if present but not required, and client cert required details

Manifest Property Changes

router

0.167.0 0.168.0 Default Value
did not exist router.client_cert_validation none. The default will be changed to request in the next version.

0.167.0

16 Nov 22:38

Choose a tag to compare

Release Highlights

  • Routing Acceptance Tests no longer leak verbose-level output details
  • Routes registered with tls_port and server_cert_domain_san are only pruned when validation of application identity (using server_cert_domain_san) fails details
  • Route registrar now supports registration of backends with TLS; this causes Gorouter to initiate TLS sessions with backends details
  • README updated with documentation explaining log levels details
  • Operator may now disable writing access logs locally using the router.write_access_logs_locally property details
  • Gorouter now depends on the bosh logrotate cron job details

Manifest Property Changes

router

0.166.0 0.167.0 Default Value
router.logrotate.freq_min removed
router.logrotate.rotate removed
router.logrotate.size removed
did not exist router.write_access_logs_locally true

route-registrar

0.166.0 0.167.0 Default Value
route_registrar.routes Objects in the routes array now support optional fields tls_port and server_cert_domain_san

0.166.0

31 Oct 20:12

Choose a tag to compare

Release Highlights

  • Routing API can now be backed up and restored using BOSH Backup & Restore (epic)
  • Routing API now supports TLS to database details
  • Routing API no longer supports migration from etcd details
  • Gorouter now logs a 499 status code when client connection disconnected before response sent details
  • Route Integrity (In progress) (epic)

Manifest Property Changes

routing_api

0.165.0 0.166.0 Default Value
routing_api.etcd.servers no longer supported
routing_api.etcd.client_cert no longer supported
routing_api.etcd.client_key no longer supported
routing_api.etcd.ca_cert no longer supported
routing_api.etcd.require_ssl no longer supported
did not exist routing_api.sqldb.ca_cert
did not exist routing_api.admin_port 15897
did not exist release_level_backup false

0.165.0

20 Oct 04:47

Choose a tag to compare

Release Highlights

  • Routing components upgraded to golang 1.9.1 details, details
  • TCP Router now provides BOSH link details
  • Gorouter performance improved with logging optimization details
  • Routing components now use uaa for DNS host check instead of consul, enabling removal of consul-agent in environments where BOSH DNS is enabled details

Increased availability / TLS with backends (in Progress)

  • When backends.enable_tls:true Gorouter doesn't prune routes with tls_port when ttl expires details
  • When backends.enable_tls:true Gorouter prunes routes with tls_port when ttl expires and request fails details
  • Gorouter now uses server_cert_domain_san field from NATS message field to validate app identity details

Bosh Backup and Restore (In progress) details

Manifest Property Changes

bbr_routing

0.164.0 0.165.0 Default Value
did not exist username routing-api
did not exist password
did not exist host sql-db.service.cf.internal
did not exist port 3306
did not exist adapter mysql
did not exist database_name routing-api
did not exist tables ["router_groups"]
did not exist release_level_backup true

gorouter

0.164.0 0.165.0 Default Value
router.dns_health_check_host uaa.service.cf.internal

routing-api

0.164.0 0.165.0 Default Value
dns_health_check_host uaa.service.cf.internal

tcp_router

0.164.0 0.165.0 Default Value
dns_health_check_host uaa.service.cf.internal