X-Road v7.4.0 Release Notes
Release Info
Version number | 7.4.0 |
---|---|
Release date | 21.12.2023 |
Supported versions |
|
Supported platforms | Central Server
Configuration Proxy
Security Server
|
Official documentation | |
Source code | |
Software license |
Changes in This Release
Summary
Support for distributing global configuration over HTTPS.
Support for rotating global configuration sign keys on the Central Server without having to distribute a new version of the configuration anchor.
Support for changing the Security Server address in the Security Server web interface.
Make it possible to disable a subsystem temporarily on the Security Server.
Support for mapping LDAP groups to X-Road roles so that the Central Server and Security Server web interface users can be centrally managed via LDAP.
Configurable minimum supported communication partner Security Server version.
Support for enforcing new key creation when generating a certificate sign request (CSR) for authentication and signing keys on the Security Server.
Support for managing the registration and management service TLS key and certificate using the Central Server UI and management REST API.
Replace Akka with gRPC for inter-process communication between Security Server and Central Server components.
Replace the SHA-1 hashing algorithm with SHA-256.
Minimum supported JAVA version bumped to version 17.
For RHEL7 systems, manual steps are required.
The Java 17 installation instructions for RHEL7 are available in the Security Server Installation Guide for RHEL.
Minimum supported PostgreSQL version bumped to version 12.
For RHEL7 systems, a manual update is required. The steps to migrate are available in the Knowledge Base.
Minor enhancements and bug fixes based on user feedback.
Both the Security Server and Central Server have been updated to the latest version of Spring Boot, which also upgrades the Jetty version used. This means that backups created prior to version 7.4.0 can not be used to restore the configuration on the newer version.
On the Central Server, restarting Nginx automatically may fail when upgrading to version 7.4.0. In that case, please restart Nginx manually (sudo systemctl restart nginx
) once the upgrade process has been completed.
Completed Issues
Issue ID | Type | Summary |
---|---|---|
New | Make it possible to disable a subsystem temporarily on a Security Server. Disabling a subsystem temporarily enables the Security Server administrator to disable a subsystem so that all the services added under the subsystem cannot receive requests. If the same subsystem is registered on multiple Security Servers, disabling the subsystem on one Security Server doesn’t affect the others. Disabling a subsystem doesn’t change any configuration items regarding the subsystem or its services, it just makes the association between the Security Server and subsystem invisible to other Security Servers so that they cannot send requests to it. Similarly, a disabled subsystem cannot be used as a service client either. Note 1: When a subsystem is disabled, all the services under it stop receiving service requests immediately. However, the Security Server may receive service requests targeted to the services under the disabled subsystem for a couple of minutes after a subsystem has been disabled until the change is propagated to all the Security Servers. In that case, the requests are not forwarded to the service provider information systems by the Security Server. Instead, all service requests received during that time period fail and an error message is returned to the service consumer. Note 2: The Central Server Administrator must refresh the management services WSDL on the management Security Server(s) and configure access rights for the new management service. | |
New | Make it possible to change the Security Server address in global configuration from the Security Server administrator UI and management REST API. The change is approved automatically by the Central Server, and it doesn’t require a manual approval from the Central Server administrator. By default, the change becomes visible to all the Security Servers in the ecosystem within a couple of minutes. Note 1: When changing the Security Server address, the address visible on top of the Security Server UI is updated only after logging out and logging back in to the UI. Note 2: The Central Server Administrator must refresh the management services WSDL on the management Security Server(s) and configure access rights for the new management service. | |
Improvement | Replace the SHA-1 hashing algorithm with SHA-256. The change is fully backwards compatible and therefore, it doesn't apply to the authentication certificate hash in global configuration V2 and querying OCSP responses between the Security Servers. | |
Improvement | Add support for enforcing new key creation when generating a certificate sign request (CSR) for authentication and signing keys on the Security Server. The feature is enabled by default which means that it’s not possible to generate a new CSR for a key that already has an existing certificate. The feature can be disabled by setting the | |
New | Add support for managing the registration and management service TLS key and certificate using the Central Server UI and management REST API. Starting from version 7.4.0, the registration and management service TLS key and certificate can be recreated and downloaded using the Central Server UI and management REST API. Also, it's possible to create a certificate sign request (CSR) and upload a certificate issued by a trusted Certificate Authority (CA). The filenames are change from Note: When the key and certificate are rotated, and mTLS is enabled between the management Security Server and the management services, the new certificate must be updated to the management Security Server. | |
Improvement | Introduce updated version of the global configuration to support upcoming features. New global configuration version is V3. Also global configuration V2 remains supported for backwards compatibility. Security Servers older than version 7.4.0 use global configuration V2 while Security Servers starting from version 7.4.0 use global configuration V3. Global configuration V3 is extensible and it provides a capability to add new optional elements without breaking backwards compatibility. | |
Improvement | Update store names on the Security Server web interface to be in line with the recommended naming convention with Pinia. | |
Improvement | Introduce mapping groups to X-Road system groups to support central management of the Central Server and Security Server web interface users via LDAP. The Central Server and Security Server administrator user permissions are managed using X-Road-specific Linux groups that are mapped to X-Road user roles. An administrator must be a member of the X-Road-specific groups in order to access the management UI. Starting from version 7.4.0, it’s possible to map additional Linux groups to X-Road user roles using the /etc/xroad/conf.d/local.ini[proxy-ui-api.complementary-user-role-mappings]
XROAD_SECURITY_OFFICER=group1,group2
XROAD_SERVICE_ADMINISTRATOR=group3,group4 More information about the properties is available in the X-Road System Parameters User Guide. | |
New | Make it possible to define what the minimum supported version of a communication partner's Security Server is allowed to be. Starting from version 7.4.0, service providers are able to configure a minimum required X-Road software version for client Security Servers. It means that client Security Servers older than the configured version are not able to access services anymore. Service providers can configure the required minimum version using the X-Road Operators may set this value in the country-specific meta packages, e.g., Estonia and Finland are setting the value to three latest versions which means that requests that are originating from client Security Servers older than version 7.2.0 are not accepted anymore in the Estonian and Finnish X-Road ecosystems. The value is rolling which means that it changes for every X-Road minor version, e.g., when version 7.5.0 is released, the minimum supported version is 7.3.0. | |
Improvement | Improve the Security Server proxy components logging so that it logs a warning if it was unable to connect to a node of a clustered Security Server. Only log an error if connecting to all nodes failed. | |
Fix | Update the Central Server web interface from Vue 2 to Vue 3. | |
Fix | Improve timestamping service recovery on the Security Server so that it is able to correctly recover on all nodes of the cluster when the service becomes available again. | |
Improvement | Migrate ASIC container hash-chain verification utility from Ruby to JAVA. | |
Improvement | Improve signer components test coverage in preparation of migrating it to gRPC. | |
Fix | Deprecate old rate-limiting configuration parameters on the Security Server so that we only use one method for configuring them on both the Security Server and Central Server. The deprecated parameters are:
The following parameters should be used instead:
Please see the System Parameters Guide for details. | |
Fix | Improve role checks on the Security Server frontend so that certain roles don't mistakenly try to request data they don't have access to. | |
Fix | Fix and issue on the Security Server frontend that caused the "Add localngroup" dialog to not correctly close in case of errors. | |
Fix | Fix potential replay attack issue with the initialization flow of the Central Server. | |
Fix | Fix localization issues on the Security Server and Central Server web interfaces. | |
Improvement | Make it possible to navigate from member details to Security Server details using the owned servers table in the Central Server web interfaces member details view. | |
Improvement | Allow the user to input more than 25 characters as the search criteria in the member and Security Server table views on the Central Server web interface. | |
Improvement | Improve the usability of filter fields on the Central Server web interface so that the user wouldn't need to double click the field to search. | |
Fix | Fix issue with the service client URL not being validated correctly when edited on the Security Server. | |
Fix | Fix issue where the add client service access rights default view would send the incorrect empty value for filtering. | |
Fix | Update the Security Server web interface from Vue 2 to Vue 3. | |
Improvement | Show a help text in the Security Server UI when the enforce-token-pin-policy property has been enabled and the strict PIN policy rules are enforced. The help text contains the rules so that the user knows what are the complexity requirements for the PIN code. | |
Improvement | Migrate the signer component interactions from Akka to gRPC. Note: Any Akka-related system properties are not supported anymore starting from version 7.4.0, e.g., | |
Improvement | Disable showing Liquibase banner during installations to make the installation output less cluttered. | |
Fix | Fix an issue that enabled registering Security Servers with duplicate codes on the Central Server under certain conditions. | |
Improvement | Introduce a safer way to add new unique constraints on existing database fields on the Central Server, which also runs checks to verify the state of the database beforehand. | |
Fix | Fix an issue that caused the new Central Server backups to exclude the Nginx configurations for management and registration services. | |
Fix | Fix an issue that caused the automatically re-created configuration anchor not to contain the new signing key after new signing key creation on the Central Server. | |
Improvement | Improve messagelog addons test coverage in preparation of migrating it to gRPC. | |
Improvement | Improve op-monitor addons test coverage in preparation of migrating it to gRPC. | |
Improvement | Improve proxymonitor addons test coverage in preparation of migrating it to gRPC. | |
Improvement | Improve environmental monitoring components test coverage in preparation of migrating it to gRPC. | |
Fix | Fix incorrect file name when downloading the Security Server's OpenAPI description via the API. | |
Fix | Fix an issue with the edit Security Server address field not showing the current address on the Central Server web interface. | |
Improvement | Migrate the proxymonitor and xroad-monitor addon interactions from Akka to gRPC. Note: Any Akka-related system properties are not supported anymore starting from version 7.4.0, e.g., | |
Improvement | Migrate the environmental monitoring component interactions from Akka to gRPC. Note: Any Akka-related system properties are not supported anymore starting from version 7.4.0, e.g., | |
Improvement | Migrate op-monitor addong interactions from Akka to gRPC. Note: Any Akka-related system properties are not supported anymore starting from version 7.4.0, e.g., | |
New | Introduce a way to include dynamic values in metapackage build process. Introduce automatic minimum supported version setting to the Estonian and Finnish metapackages syncing it with the minimum supported version of time of release. | |
New | Migrate X-Road components to JAVA 17. Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and RHEL8 platforms are migrated automatically from Java 11 to Java 17. Instead, the RHEL7 platform requires manual configuration steps. The Java 17 installation instructions for RHEL7 are available in the Security Server Installation Guide for RHEL. | |
Fix | Update the Security Server and Central Server management services to Spring Boot 3. As a part of the upgrade, bump the minimum supported PostgreSQL version to version 12. For the RHEL7 platform, a manual upgrade is required. The instructions for the migration are available in the Knowledge Base. | |
New | Make it possible to configure the Central Server to use HTTPS with a trusted CA for publishing global configuration. A new private key and a self-signed TLS certificate are created automatically when installing a new Central Server or upgrading an existing installation from an older version. After the installation or upgrade, the Central Server Administrator is required to manually apply for a TLS certificate from a trusted Certificate Authority (CA) and then configure the certificate. More information about configuring a trusted TLS certificate is available here. This step is required, because the Security Server does not trust the new automatically generated self-signed certificate by default. The Security Server supports disabling certificate verification, but it is not recommended to disable it in production environments. Starting from version 7.4.0, the global configuration will be available on the Central Server ports 80 and 443. The old HTTP endpoint on port 80 guarantees that older Security Servers that do not support downloading global configuration over HTTPS continue to work normally. Also, the new Security Servers that support downloading global configuration over HTTPS will fall back to HTTP if the TLS certificate of the new HTTPS endpoint is not properly configured. Changes in the global configuration download ports may cause changes to firewall configuration on the Central Server since inbound traffic from the Security Servers to port 443 must be allowed. Note: When upgrading the Central Server from version < 7.4.0 to version >= 7.4.0, the configuration anchor must be re-generated, distributed to all the Security Server administrators through an external channel (e.g., email) and imported to each Security Server to enable downloading global configuration over HTTPS. Without the new configuration anchor Security Servers will continue to download global configuration over HTTP. | |
New | Make it possible to configure the Configuration Proxy to use HTTPS with a trusted CA for publishing global configuration. A new private key and a self-signed TLS certificate are created automatically when installing a new Configuration Proxy or upgrading an existing installation from an older version. After the installation or upgrade, the Configuration Proxy Administrator is required to manually apply for a TLS certificate from a trusted Certificate Authority (CA) and then configure the certificate. More information about configuring a trusted TLS certificate is available here. This step is required, because the Security Server does not trust the new automatically generated self-signed certificate by default. The Security Server supports disabling certificate verification, but it is not recommended to disable it in production environments. Starting from version 7.4.0, the global configuration will be available on the Configuration Proxy ports 80 and 443. The old HTTP endpoint on port 80 guarantees that older Security Servers that do not support downloading global configuration over HTTPS continue to work normally. Also, the new Security Servers that support downloading global configuration over HTTPS will fall back to HTTP if the TLS certificate of the new HTTPS endpoint is not properly configured. Changes in the global configuration download ports may cause changes to firewall configuration on the Configuration Proxy since inbound traffic from the Security Servers to port 443 must be allowed. Note: When upgrading the Configuration Proxy from version < 7.4.0 to version >= 7.4.0, the configuration anchor must be re-generated, distributed to all the Security Server administrators through an external channel (e.g., email) and imported to each Security Server to enable downloading global configuration over HTTPS. Without the new configuration anchor Security Servers will continue to download global configuration over HTTP. | |
New | Make it possible for the Security Server to use global configuration provided by a new HTTPS endpoint that uses a TLS certificate issued by a trusted CA. By default, the Security Server tries to download the global configuration over HTTPS and verify the global configuration download endpoint's TLS certificate. If the verification fails or the HTTPS endpoint is not available for some other reason, the Security Server uses the old HTTP endpoint. Also, the Security Server supports disabling certificate verification, but it is not recommended to disable it in production environments. The global configuration download TLS certificate verification can be enabled/disabled using the Changes in the global configuration download ports may cause changes to firewall configuration on Security Server since outbound traffic to the Central Server and Configuration Proxy port 443 must be allowed. Note: To enable downloading global configuration over HTTPS, a configuration anchor generated using the Central Server version 7.4.0 or later must be imported to the Security Server. | |
New | Add ACME server URL and IP address properties to CA entity's configuration in global configuration V3 schema. The new properties are not used for anything yet. Instead, they will be used by the ACME support scheduled for version 7.5.0. | |
Improvement | Migrate the messagelog addon interactions from Akka to gRPC. Note: Any Akka-related system properties are not supported anymore starting from version 7.4.0, e.g., | |
Improvement | Improve the API key management security so that the user is only able to create API keys with the roles that they themselves have. Only a user with the “System Administrator” role is able to create API keys with the “Management Services” role. | |
Fix | Fix issue where adding management and registration service keys during Central Server installation could fail silently. Now a warning is logged if there was an issue. | |
Improvement | Add support for rotating global configuration sign keys on the Central Server without having to distribute a new version of the configuration anchor. Starting from version 7.4.0, the Central Server sign keys are included in the global configuration. Thanks to this, rotating the sign keys is possible without importing a new version of the configuration anchor to each Security Server. Instead, the Security Server gets the sign key from the global configuration directly and applies it immediately. Importing the configuration anchor to the Security Server manually is also possible, but it's required only when the Security Server is initialised for the first time. Note 1: When rotating the global configuration sign key, the new sign key must not be activated immediately. Instead, please wait for at least a couples of minutes before activating it so that there's enough time for the new sign key to be propagated to all the Security Servers. By default, the Central Server regenerates the global configuration files once per minute and the Security Servers download the global configuration once per minute. Therefore, it may take a couple of minutes before the new key has reached all the Security Servers. Also, if the default interval values have been changed, the required time may be longer. Note 2: If a Security Server has been offline / turned off when the global configuration sign key has been rotated, an updated version of the configuration anchor including the new sign key must be manually uploaded to the Security Server. Note 3: When federation is used, after rotating the global configuration sign key, a new configuration anchor must be generated, shared with the operators of federated X-Road ecosystems and uploaded to the federated ecosystems' Central Servers and Configuration Proxies. Otherwise, Security Servers registered to a federated ecosystem after the key rotation, do not trust the new key when they try to download the federated ecosystem's global configuration. | |
Improvement | Add support for publishing REST services using the OpenAPI 3.1 service description. The supported OpenAPI versions are now 3.0 and 3.1. | |
New | Change the default client information system inbound communication ports are from 80 to 8080 and from 443 to 8443 on Ubuntu-based Security Servers. In this way, the default ports are consistent regardless of the hosting operating system. The change is applied to new installations only and existing installations are not affected by it. Also, if custom ports have been configured locally by the Security Server administrator, they are not affected. X-Road Operators may set the default port values in the country-specific meta packages. The Estonian ecosystem continues to use ports 80 and 443 by default for new installations after the change. | |
Improvement | Add support for adding a new OCSP service without a certificate to the Central Server. If an OCSP service uses a certificate that's issued by the root certificate of the CA that the OCSP service is associated with and the root certificate is uploaded to the Central Server, uploading the OCSP service's certificate to the Central Server is not mandatory. | |
Fix | Set maximum length for the Security Server username and password. | |
Improvement | Implement the SameSite cookie on the Security Server. | |
Fix | Fix a problem that caused the Edit token view to crash on the Security Server when refreshing the page. | |
Fix | Update the /var/log/xroad/proxy_ui_api_access.log log file rolling policy so that the configuration is consistent with other Security Server components. | |
Fix | Minor fixes to Central Server permissions. |
Issue types: fix (bug fix or technical debt), improvement (improvement to an existing feature), new (a new feature).
New/Updated Dependencies
Dependency | Old Version | New Version | Notes |
---|---|---|---|
Java | 11 | 17 | |
Spring Boot | 2.7.12 | 3.1.5 | |
Jetty | 9.4.51.v20230217 | 11.0.17 | |
Tomcat | 9.0.75 | 10.1.13 | |
Hibernate | 5.6.15 | 6.2.9 | |
Log4j2 | 2.17.2 | 2.20.0 | |
Akka | 2.1.13 | - | Akka was replaced with gRPC |
gRPC | - | 1.58.0 | |
Vue | 2.6.14 | 3.3.4 | |
Vuetify | 2.6.10 | 3.3.19 |
Contributors
The following developers have contributed to the development of this release version. A contribution means at least one Git commit that is included in the release. The full list of contributors of different X-Road® versions is available here.
Other Notes
Package Repositories
Repository | URL |
---|---|
Bionic | deb https://artifactory.niis.org/xroad-release-deb focal-7.4.0 main |
Focal | deb https://artifactory.niis.org/xroad-release-deb jammy-7.4.0 main |
RPM / RHEL7 | https://artifactory.niis.org/xroad-release-rpm/rhel/7/7.4.0/ |
RPM / RHEL8 | https://artifactory.niis.org/xroad-release-rpm/rhel/8/7.4.0/ |
Docker |
Repository Sign Key Details
Download URL | |
---|---|
Hash | 935CC5E7FA5397B171749F80D6E3973B |
Fingerprint | A01B FE41 B9D8 EAF4 872F A3F1 FB0D 532C 10F6 EC5B |
3rd party key server |
Packages
Focal
Package | SHA256 checksum |
---|---|
xroad-addon-hwtokens_7.4.0-1.ubuntu20.04_amd64.deb | 774fd490720630c05ce8983f6b6ffa4f4c3ae8ddc6aa224f7947397d9db7afbc |
xroad-addon-messagelog_7.4.0-1.ubuntu20.04_all.deb | f16fc78c945a54cd37fdb935686335373912f4c6ebd7ded2a99c26e3f1a3c366 |
xroad-addon-metaservices_7.4.0-1.ubuntu20.04_all.deb | b9c2cb716d41b034f39acaf8c78cc4329d62525a89c062ab6d63ec31b910252f |
xroad-addon-opmonitoring_7.4.0-1.ubuntu20.04_all.deb | 593ef8ed631696f6ca3290fc92edcaa21e5479a354eb269e76560313031dacbb |
xroad-addon-proxymonitor_7.4.0-1.ubuntu20.04_all.deb | 60d87312c12583c99c8351c529e53ffc5f4a64eb174205287ef6e71a9b6fa988 |
xroad-addon-wsdlvalidator_7.4.0-1.ubuntu20.04_all.deb | 9137d9fce055250a538a3cf2e81b3f413862702736334aaf1c343466a5e182b8 |
xroad-autologin_7.4.0-1.ubuntu20.04_all.deb | a1ce304245cc6753e689cc6fee9cd63b54ddbe0d9919653af76a05761f2d3b37 |
xroad-base_7.4.0-1.ubuntu20.04_amd64.deb | 2ff637432a5ea5ab1eac2487624426a241ffe82cfb617f954bf757b38c112481 |
xroad-center_7.4.0-1.ubuntu20.04_all.deb | fee129b0c0e1803df3310c28b25fb59aa7e1cd9f6b70e0bb2acb75b87f585938 |
xroad-center-management-service_7.4.0-1.ubuntu20.04_all.deb | 4a16e6b77436d25cb76e1926c94ec4e597036d7e2cc303dce36358bf069363b0 |
xroad-center-registration-service_7.4.0-1.ubuntu20.04_all.deb | 7a8b9762bd80ae15c42be51cc8438e5041f1b8e38bf7d6473467b58a4db1d4fe |
xroad-centralserver_7.4.0-1.ubuntu20.04_all.deb | 94d8f26c6b4bae3138ed4bb2b7fb52b98125d7e77acd3ad597eeb95e264d77c2 |
xroad-centralserver-monitoring_7.4.0-1.ubuntu20.04_all.deb | 84acbabb33b6f6ca5cb4de0905a6644123770fa6f5df1d49fdb3114047299179 |
xroad-confclient_7.4.0-1.ubuntu20.04_amd64.deb | af15bc92e96d65c7025c38537d9547e260a62f682fd7240601a59744834dea56 |
xroad-confproxy_7.4.0-1.ubuntu20.04_all.deb | 97d7e56a98ab7d32c5fd5b4b46027a09785215f26365a4021923c58d36007488 |
xroad-database-local_7.4.0-1.ubuntu20.04_all.deb | 782b513d4b90b35b3329b0fe5bf166e6b1f8d898c7ad502fb57e4c1d18fbd98c |
xroad-database-remote_7.4.0-1.ubuntu20.04_all.deb | 012ae0456473a32cd57f2a0aff9a5fce760f8497dbc92f6d0700167b004cf698 |
xroad-monitor_7.4.0-1.ubuntu20.04_all.deb | 85806822fe9f86294e481e178ee61cf693b3ec3607b34bfa2c43b403c6227133 |
xroad-nginx_7.4.0-1.ubuntu20.04_amd64.deb | b0d186e08940f9f31bdf2de9582879f16ea10a0e07edb482310afb2e5ff949fc |
xroad-opmonitor_7.4.0-1.ubuntu20.04_all.deb | d90ee5a11cd590456a2924d5208ddb7c7143aea7d47d41c6ba46ce762b9ed1f5 |
xroad-proxy_7.4.0-1.ubuntu20.04_all.deb | b694f7f955e3999d40932d218ddd95b6953b54561fa6493841abf1c9eb54f4c9 |
xroad-proxy-ui-api_7.4.0-1.ubuntu20.04_all.deb | 2afab8e473f7b37e23bd05b61f7ae41229346f92721f50537e87b5e52b167bbc |
xroad-securityserver_7.4.0-1.ubuntu20.04_all.deb | 54895d5f33e66ab45361883e1fc22d44b75f891d5ffe9a80cec62f05901cc3e2 |
xroad-securityserver-fi_7.4.0-1.ubuntu20.04_all.deb | 1084f8fe7b51747a26039021dd31bc6c27e71968aa77a45c30cfcf53699df395 |
xroad-securityserver-ee_7.4.0-1.ubuntu20.04_all.deb | 74b1faa66d1b4b3b5d9fdb731b9f857d1c5766f760c0d4ec05a08d983d6b934f |
xroad-securityserver-is_7.4.0-1.ubuntu20.04_all.deb | 355c836958b41655b36a4ddbada663a6abd9b56f33473b1241ee8fb084863adb |
xroad-securityserver-fo_7.4.0-1.ubuntu20.04_all.deb | 1f22f462268ae02187c8000f15e026cdd68afd9f65433c382930dc76c95fd899 |
xroad-signer_7.4.0-1.ubuntu20.04_amd64.deb | ca90a60cc8885863291e076c545360264fbb7c46a6b0aa2e778a56293a526e1a |
Jammy
Package | SHA256 checksum |
---|---|
xroad-addon-hwtokens_7.4.0-1.ubuntu22.04_amd64.deb | 1cd33c2d3e2bbf928b135e6df5734fc439dca9f6e78f799daa396b3b94253517 |
xroad-addon-messagelog_7.4.0-1.ubuntu22.04_all.deb | 62dd9af0404f5f6ed10ec640fb8093667e3a7132811275afd3e1f28adba59e89 |
xroad-addon-metaservices_7.4.0-1.ubuntu22.04_all.deb | 67a23af243f099a4adbff28b8e8e69b75924ae2780d49372f448806ed0532515 |
xroad-addon-proxymonitor_7.4.0-1.ubuntu22.04_all.deb | e497a25c7887ddc6f449d7158e490e9cec00679862e2cc2727319fc840f4e657 |
xroad-addon-opmonitoring_7.4.0-1.ubuntu22.04_all.deb | 354f48e4600bf5b07a24c743ad685387b7758431dedb4f9d0851d6edbf043e54 |
xroad-addon-wsdlvalidator_7.4.0-1.ubuntu22.04_all.deb | d69e0eb1625f3173e08ca463a09e108244413f6e8a994ab131fc9e3a6b32dfa5 |
xroad-autologin_7.4.0-1.ubuntu22.04_all.deb | d6664067b0c6064b8d996beec0ce33e0acbcc2854e07fdbb817412a130ea6903 |
xroad-base_7.4.0-1.ubuntu22.04_amd64.deb | eeb1c63902180bbadca0b6c7f65ceb462df4ec301dafc0f2b0385a61837e26da |
xroad-center_7.4.0-1.ubuntu22.04_all.deb | 84c26417efe68e12f623617c9aaae570247b09af509e2851840dabdf3072564b |
xroad-center-management-service_7.4.0-1.ubuntu22.04_all.deb | a0fa3db9b55b2b10bcb3d1a75b5df0881e37ed9f634aa8125b33b16cc28fc6a7 |
xroad-center-registration-service_7.4.0-1.ubuntu22.04_all.deb | f219165c4e029619975d26e8647fff96daf04d079472c71f2a9b4fd58f6f71f9 |
xroad-centralserver-monitoring_7.4.0-1.ubuntu22.04_all.deb | ad8e3d9f0bafa1199eae80fed8efb58cc4b64c8636b74e5db4315898c0a9f79c |
xroad-centralserver_7.4.0-1.ubuntu22.04_all.deb | 10c0f8e7210366c926573c9f08553d7dd14eb4049a107e22a6e14ef3beb668f1 |
xroad-confclient_7.4.0-1.ubuntu22.04_amd64.deb | d2aedbbc035394061367bc900df53ba22b0b402a83d403c94e5b949ace5cbc2f |
xroad-confproxy_7.4.0-1.ubuntu22.04_all.deb | 0668e94290b72d2decbd3a4ca6fa4fb3c56d2475b671ef738037f32358a07c91 |
xroad-database-local_7.4.0-1.ubuntu22.04_all.deb | a60a885a81650dc7d34e6fa4c3555dd849a838a49f4bd028f40ace95e0783217 |
xroad-database-remote_7.4.0-1.ubuntu22.04_all.deb | 397950938967cffc2b85e66516375543b253c429fcc3990595aefe43ff47e938 |
xroad-monitor_7.4.0-1.ubuntu22.04_all.deb | 6483b9991697ac6e2456b144a55c5df81d9e60662dfb463acafc736c30a20bcf |
xroad-nginx_7.4.0-1.ubuntu22.04_amd64.deb | f9135a8ad23e2e556952f66b067b065c11aca8d7ae4f76be62d475034f77fe40 |
xroad-opmonitor_7.4.0-1.ubuntu22.04_all.deb | 9e6e2cd6135efa9ef55daa6df631c4ca7bec8648b742e2549bff6f37512c8e5c |
xroad-proxy_7.4.0-1.ubuntu22.04_all.deb | 403b25c3ce4d3e766818ec15afcd4b04eb15d39607771182ce39ede8d8c4cc7a |
xroad-proxy-ui-api_7.4.0-1.ubuntu22.04_all.deb | c3c9e0fd6e102975e8579fbdb8be7ba76aadda41782f09e778d958efebec290b |
xroad-securityserver_7.4.0-1.ubuntu22.04_all.deb | ede66ecab297e5249e743c68557876e619464f9825e3c36fbb4786bbe4b7e967 |
xroad-securityserver-fi_7.4.0-1.ubuntu22.04_all.deb | 3e8910d4efd2bfdb4f9bd79abc7c69f9fb7925089fae94ef3aa65b2174c1411a |
xroad-securityserver-ee_7.4.0-1.ubuntu22.04_all.deb | 42f652a57c51d0b61923d8e4d3d019307ed5c8749d1ad7c92b78a50b65bea86e |
xroad-securityserver-fo_7.4.0-1.ubuntu22.04_all.deb | 2822ca3085741172da59a192e87ecc1dd5049be7f8c06e1508b6500d004cf4b7 |
xroad-securityserver-is_7.4.0-1.ubuntu22.04_all.deb | 3edb9cd61f865c098a5095544778077a2714d5ffe41ac7d1c6cbf308df0ee472 |
xroad-signer_7.4.0-1.ubuntu22.04_amd64.deb | e5ce6579b329cd0ec3ea3639fe288189ec50275176b64713c175551433b67e49 |
RPM / RHEL7
Package | SHA256 checksum |
---|---|
xroad-addon-messagelog-7.4.0-1.el7.x86_64.rpm | d901aa27e89726f6fe6fc765c93d25860c4639a104d745fa15e824a5c18d116b |
xroad-addon-metaservices-7.4.0-1.el7.x86_64.rpm | 5c5166e225f4dcd98d6d0038a518f40ff98843918e4ee567e203bc3baa6455ce |
xroad-addon-opmonitoring-7.4.0-1.el7.x86_64.rpm | 1066ff2bc2fa251782f1b3ab2862babecc009f00e4dc336c2eb54538c7459d92 |
xroad-addon-proxymonitor-7.4.0-1.el7.x86_64.rpm | e7ca53ef508d0111c5f6f56375be3a2251e33398fcd8284a0d58886d1296eb0a |
xroad-addon-wsdlvalidator-7.4.0-1.el7.x86_64.rpm | 545d91913738187403b49fe6c8e65ab21f5a799fa39f802b805efb1fb937633b |
xroad-autologin-7.4.0-1.el7.noarch.rpm | fb087f087e430b7bac68d22ee5d5b4a65f427b8d106c66a3a2c5d430efc88080 |
xroad-base-7.4.0-1.el7.x86_64.rpm | e4c851b92f123cae912e03aa1832c1a5b4a5b7839cf2d9a633ea3962eb9b7fdb |
xroad-confclient-7.4.0-1.el7.x86_64.rpm | f3e98c77422da93c13eabc0fc7dc9d5905fee425f93cbd0c02a668f35158ef4b |
xroad-database-local-7.4.0-1.el7.noarch.rpm | c23b39b684d8ff9076983061698155db779b790b6baa7db1bcf5e20079dff816 |
xroad-database-remote-7.4.0-1.el7.noarch.rpm | d01435bc9d6f94a75e1ad92711caafdbefe9b5dcc98079e5465efcc893088de0 |
xroad-monitor-7.4.0-1.el7.x86_64.rpm | 2d73108331a98cfa5b656705ff743e942eb471f3ea0ac570dcfc576395a07b51 |
xroad-opmonitor-7.4.0-1.el7.x86_64.rpm | 440cb738f695f9a3318c7f3eda2070f0612232c06eb91e681b3ab20a92df809e |
xroad-proxy-7.4.0-1.el7.x86_64.rpm | 5642b62324ffd0c594179133344320e39929f2fab03106006a8801e22f645b81 |
xroad-proxy-ui-api-7.4.0-1.el7.x86_64.rpm | ccfc677da1e1579f6adb51312e409aea25e7b383311c3a689bdc9d83b79e3640 |
xroad-securityserver-7.4.0-1.el7.noarch.rpm | 7b6a85e90b319c83e2b4417880ed345cd78a8cec138614ef6a866d426b838649 |
xroad-securityserver-fi-7.4.0-1.el7.noarch.rpm | 2deb2bd640e324b671807153520c3b79b382c224aa13fe9cc9ba8914e7f6a1e3 |
xroad-securityserver-fo-7.4.0-1.el7.noarch.rpm | 179e5e0e2f6c5578f3f6f8f14c2daca7d3b62cb92b362c87dd9015e177078e71 |
xroad-securityserver-is-7.4.0-1.el7.noarch.rpm | 0b9524b2be53309cc9d7791881f61c21ef3367161d106eb80261034b7c8d4c09 |
xroad-signer-7.4.0-1.el7.x86_64.rpm | 0af14a4efbfa294c806a3117ea1d1cb9646856ae6eabeb56f86b7df3fb627eb2 |
RPM / RHEL8
Package | SHA256 checksum |
---|---|
xroad-addon-messagelog-7.4.0-1.el8.x86_64.rpm | 9732dd84be6e2d68f63f25dee75560651d61d9bdde4965fa212750f7030dceaa |
xroad-addon-metaservices-7.4.0-1.el8.x86_64.rpm | 35bbfd3652e722bb7f5defc296dec09f326fdabb9f68c813516445c927dc31c6 |
xroad-addon-opmonitoring-7.4.0-1.el8.x86_64.rpm | 687cad26ce705f6b997638427202a8bd7eb667f0943f1f3c00c226c40799ec64 |
xroad-addon-proxymonitor-7.4.0-1.el8.x86_64.rpm | 758056b6af06f5efbbd542d288ecc0f4b015a4c483dbf7935a8f37778a4c1ecf |
xroad-addon-wsdlvalidator-7.4.0-1.el8.x86_64.rpm | 39f019af7fb841433640c7905c370056f687ba997a5e47cd4365875362d6f8ee |
xroad-autologin-7.4.0-1.el8.noarch.rpm | 77c3c42329d8e870cfa565fe7692cf40a8ab670681e852e778b7e464e176523c |
xroad-base-7.4.0-1.el8.x86_64.rpm | d3a77a4559943c6e07ebcf63f60971ef8693833bc26a250471c1148cbaf0beeb |
xroad-confclient-7.4.0-1.el8.x86_64.rpm | b39ba9c9874d543e4567f7ace46ee3dec8676576e7a0b1170bc2aafd7a1d063d |
xroad-database-local-7.4.0-1.el8.noarch.rpm | 7ab2696c24ac0313b415f45442ea2f590e0a58f45170455d2201d93e80ac5ac3 |
xroad-database-remote-7.4.0-1.el8.noarch.rpm | aa5fd4650ce84bf748e65d98ee8a140a38dd18b6d643ad47dac4a676d2ea58e3 |
xroad-monitor-7.4.0-1.el8.x86_64.rpm | 6e74668b491d731fc139dc66d432eb98538da6d57e3beac3ff5396941e2b2234 |
xroad-opmonitor-7.4.0-1.el8.x86_64.rpm | 5deb4f8cb4cbdd1743321436c87c1ae5d3e4c4f53f6f0db9c1c84452dcb073cf |
xroad-proxy-7.4.0-1.el8.x86_64.rpm | 1c969f31d00b2e03eff1b55abf245225a268d385a40d0d9796cac69a65fc28a4 |
xroad-proxy-ui-api-7.4.0-1.el8.x86_64.rpm | 3b503dc59515a5b7621db72f9f5723b6c22f4537491e879f09d0ffae463e0b61 |
xroad-securityserver-7.4.0-1.el8.noarch.rpm | c597905efbf8f0e2091a9308d34f72d17de464b51353619106fc95746bcfc5f8 |
xroad-securityserver-fi-7.4.0-1.el8.noarch.rpm | 82777982f4373852e463096f9c5a06afe750e2319da4049ef8e4c3bfec2ae6d3 |
xroad-securityserver-fo-7.4.0-1.el8.noarch.rpm | 7d124b112c6091b006e8e30802d9bd80ffd54ab1961218f59f8b92fdcfb40c3d |
xroad-securityserver-is-7.4.0-1.el8.noarch.rpm | 4b802efbceee6e5126687b6a0e91da9e0050a33368d5277fb2d98eb203a857d8 |
xroad-signer-7.4.0-1.el8.x86_64.rpm | 0bc2fc2d90acca2069d8311c9b1283a47db28dbe3d45aa43666b621b4a9f7827 |