X-Road v7.0.0 Release Notes
Changes in This Release
Summary
- New X-Road 7 look and feel for the Security Server UI.
- Security improvements on the Security Server:
- Encrypt backup files (opt-in)
- Verify integrity of backup files on restore.
Remove executable files from backups.
- Improvements in Security Server message logging:
- Encrypt message payload in message log database (opt-in)
- Encrypt message log archives (opt-in)
- Group message log archives by subsystem (opt-in)
- Support for fully disabling message logging.
- Change PIN code on the Security Server.
- Return REST API type (OPENAPI3 / REST) and API endpoints in REST metaservice responses.
- Run the Security Server on Java 11 by default.
- Make Security Server more modular by enabling installation without a local Postgres server
- Version compatibility check for version upgrades - it is no longer possible to update from an unsupported version.
- Official Docker support added to the Security Server with the Security Server Sidecar images.
- Other enhancements and bug fixes.
The following blog posts provide additional information about the biggest changes in X-Road 7.0.0:
- https://www.niis.org/blog/2021/9/28/get-ready-for-x-road-7
- https://www.niis.org/blog/2021/9/29/configuration-changes-in-x-road-7
- https://www.niis.org/blog/2021/9/29/message-logging-in-x-road-7
- https://www.niis.org/blog/2021/10/2/protecting-data-at-rest-in-x-road-7
The X-Road 7 migration guide is available here
Upgrade to version 7.0.0 is supported from version 6.26.0 only. In case you're running an older version, please upgrade to version 6.26.0 first, and then to version 7.0.0.
Completed Issues
Issue ID | Type | Summary |
---|---|---|
Improvement | Update the timestamping service URL automatically on the Security Server when the URL is updated on the Central Server. The feature is disabled by default. To enable it, add the following configuration to /etc/xroad/conf.d/local.ini [proxy-ui-api] auto-update-timestamp-service-url=true When the timestamping URL is updated by the Security Server there is an info level log entry in the following file: When there are multiple timestamping services with the same name and the URL and one of those is updated on the Central Server, the Security Server does not perform the update because it's not able to distinguish between the services. Instead it adds a warning level log entry. | |
XRDDEV-427 | Improvement | Add "x-forwarded-for" HTTP header to the Security Server proxy access log ("/var/log/xroad/clientproxy_access.log"). If a client information system connects to the Security Server through a proxy, the header contains the original IP address of the client. |
Improvement | Diagnostics now correctly reports if it is unable to verify the OCSP response due to an application level problem, e.g., invalid OCSP responder certificate. If the response verification fails and other responders are available, those will be also tried. If there are configuration changes affecting available OCSP responders, obsolete OCSP responders will be removed from the diagnostics view. Previously that required restarting signer. Fixes a vulnerability that caused the OCSP responder certificate not being verified properly. Before the fix, it wasn't verified that the OCSP responder certificate was signed by the CA that issued the certificate. | |
Improvement | Diagnostics now correctly reports if it is unable to verify the timestamp returned by a TSA due to an application level problem, e.g., invalid TSA certificate. Previously a successful simple connection check masked all application level errors. TSA diagnostics now shows both connection and application level failures from batch timestamping attempts. | |
Improvement | Invalidate the internal key cache in the Security Server immediately when the internal TLS key or certificate changes instead of waiting for the cache to expire. In this way, the changes become effective immediately. | |
New | Add support to install the Security Server and Central Server without a local PostgreSQL server. If a remote database is used, it's not necessary to install a local PostgreSQL server. Installing with a local database works like before - installing xroad-securityserver and xroad-centralserver packages install a local PostgreSQL server. Installing the local PostgreSQL server can be skipped by explicitly installing the xroad-database-remote package, e.g.: apt/yum install xroad-database-remote xroad-securityserver The relevant documentation is available here:
| |
New | Add support to the Security Server management API to allow changing the software token pin code. | |
New | Add support to the signer console to allow changing the software token pin code. | |
New | Add support to the Security Server UI to allow changing the software token pin code. | |
Improvement | Clarify the error messages that are returned when the TLS handshake between two Security Servers fails and when the connection between the provider Security Server and a service fails due to a certificate error. Before, the same error message was returned in both cases. After the change, different error messages are returned. | |
XRDDEV-1351 | Improvement | Improve permission handling in the new Security Server UI to make it more resilient to issues. |
XRDDEV-1397 | New | Create a shared UI library for the Security Server and new Central Server. |
New | Implement the new X-Road 7 look and feel in the Security Server UI. | |
Fix | Fix a bug in the Security Server management API that caused inconsistencies in how certificate-related permissions were handled. | |
XRDDEV-1468 | Fix | Remove the "Please enter soft token PIN" link from global alerts in the Security Server UI if the user does not have the required permission to carry out the action. |
XRDDEV-1469 | Fix | Fix the Security Server UI keys and certificates filtering to include both the friendly name and ID so that both of them can be used for filtering. |
XRDDEV-1470 | Fix | Fix the Security Server UI Add Services dialog in the Service Clients wizard so that long lists of services don't hide the dialog action buttons. |
XRDDEV-1471 | Improvement | Various small improvements to the Security Server UI code so that it follows best practices. |
XRDDEV-1477 | Improvement | Improve the usability of Security Server UI's Local Group Add Members dialog and Service Access Rights dialog. |
New | Add a check that prevents version upgrades from an unsupported X-Road version. X-Road’s current lifecycle policy is to support the latest version plus two previous versions. The supported versions are defined on MAJOR.MINOR level so the release of patch versions (MAJOR.MINOR.PATCH) does not effect on the support. Also, version upgrades are supported and tested between the supported versions. However, with X-Road 7.0.0, there's one exception – upgrade to version 7.0.0 is supported from version 6.26.0 only. If you're running an older version of X-Road, upgrade to version 6.26.0 is required first before upgrading to version 7.0.0. More information about how to upgrade in steps is available here:
| |
Improvement | Improve the Security Server UI keys and certificates table to provide better visual feedback about different key and certificate statuses. | |
Improvement | Improve the way message log records are updated in the database to better handle cases where multiple nodes might be trying to update the same records, e.g., a Security Server cluster with an external load balancer uses a shared message log database between the nodes. | |
Improvement | Improve the way the Security Server handles control characters in identifiers so that they don't cause issues on the frontend or management API level. | |
Fix | Fix a bug in the Security Server UI certificate details page where updating the page caused some information to be missing from the UI. | |
XRDDEV-1559 | Improvement | Improve the Add Client wizard on the Security Server. Enable sending a client registration request only if the client to be registered has valid sign certificate with a good OCSP response. |
Improvement | Add Java version information to the Security Server UI diagnostics page. | |
Improvement | Make the OpenAPI description of the Security Server management REST API available on the Security Server. The API description is now available on the Security Server at: "https://<hostname/ip>:4000/api/v1/openapi.yaml" | |
Fix | Fix an issue in the Central Server UI that caused the System Settings view to break when the member owning the management services Security Server was deleted. | |
Improvement | Improve the "getOpenAPI" metaservice so that the host part is removed from the server URL when an OpenAPI description is returned. After the change, the behavior is consistent with the "getWsdl" metaservice for SOAP services. This changes the current behaviour of the metaservice for getting the OpenAPI descriptor in the following way when handling the "server.url" parameters inside the description:
For example:
| |
New | Update the Security Server to run on JAVA 11 by default. | |
New | Add support to encrypt Security Server backups. The feature is opt-in and is disabled by default. Details on how to configure and enable backup encryption can be found in the Security Server user manual: | |
Fix | Fix the Security Server UI diagnostics view timestamping service column name to be "Previous update" instead of "Next update" to correctly label the data. | |
New | Add integrity verification of Security Server backup files on restore. Further details about the feature are available in the Security Server user manual: | |
New | Remove executable files from the Central Server and Security Server backups. The change requires manual migration if local configuration overrides have been defined in ""/etc/xroad/services/local.conf". The X-Road 7 migration guide is available here This changes the current backup and restore mechanism in a considerable way so please review your usage to make sure you update your settings to work with the new restrictions.
Please note that the backups are incompatible between X-Road 6 and X-Road 7. | |
XRDDEV-1626 | Improvement | Add a basic certificate profile that doesn't contain a hard-coded country code and therefore, is not connected to any specific country. The basic profile can be used to get started with X-Road. The profile can be used by setting the below CertificateProfileInfo value on the Central Server. CertificateProfileInfo value ee.ria.xroad.common.certificateprofile.impl.BasicCertificateProfileInfoProvider |
Fix | Fix a XSS vulnerability in the Central Server UI system settings view, where users could add executable Javascript code into the description of a member class, which would be executed on page load. | |
Improvement | Increase the maximum width of the Security Server UI views to better use the available screen space. | |
Improvement | Overhaul the Security Server UI keys and certificates view to provide a better user experience. | |
New | Add support to group message log archives by member or subsystem. Grouping is opt-in and is not enabled by default.
More information about the message log configuration can be found in the Security Server user manual: | |
Improvement | Improve the page not found error page design in the Security Server UI. | |
Improvement | Improve the verification of the Security Server's internal TLS certificate when a new certificate is uploaded. After the change, the Security Server verifies that the certificate belongs to the Security Server's internal TLS key, otherwise an error message is returned. | |
Improvement | Restart the relevant Security Server services after a country-specific metapackage install so that the configuration overrides are picked up automatically without a manual restart. | |
New | Move the message log archiving to a separate process to improve the fault tolerance of the Security Server. This change introduces a new X-Road java process (systemd unit: xroad-addon-messagelog.service) that logs to "/var/log/xroad/messagelog-archiver.log". systemctl start xroad-addon-messagelog | |
Fix | Fix the profile of the SSL certificate used by the Security Server UI and management API so that curl is able to validate the certificate. | |
New | Change X-Road specific configuration properties to start with the prefix "XROAD_" on the Central Server, Security Server and Configuration Proxy. The change requires manual migration if local configuration overrides have been defined in ""/etc/xroad/services/local.conf". The X-Road 7 migration guide is available here More information about the configuration properties in X-Road 7 is available at: | |
New | Add a permission denied page to the Security Server UI to give better visual feedback in case users try to visit a page their role does not allow them to. | |
New | Add an option to install the Security Server with the message log addon disabled. When the message log addon is disabled, no messages are logged and no timestamping service is needed. This is an optional step during the installation, but default the addon is still installed. Information on how to disable the addon is available at:
| |
New | Add support to encrypt message log archives files on the Security Server. This feature is opt-in and is disabled by default. More information on how to configure the feature is available in the Security Server user manual: | |
New | Add support to encrypt the message log database records on the Security Server. This feature is opt-in and is disabled by default. More information on how to configure the feature is available in the Security Server user manual: | |
Improvement | Update the message log archive file names to be deterministic. In practice, it means that given the same input (grouping, message records, previous archive linking info digest), the output (file name and contents) is the same after possible encryption is removed. More information on the archive file names is available in the Security Server user manual: | |
Improvement | Improve OpenAPI service description checks on the Security Server to verify that the description is using a supported version. When a new REST API with OpenAPI description is added to the Security Server, the OpenAPI version of the service description is verified and an error is returned if the version number is not supported by the Security Server. | |
Improvement | Add content security policy headers to the web interfaces for the Security Server and Central Server to improve security. | |
Improvement | Remove references to BDR plugin version 1 for PostgreSQL by 2ndQuadrant from the Central Server scripts so that other BDR versions can be used. Before the change, the Central Server installation scripts contained hard-coded references to BDR1 that caused errors in case a later BDR version was used. | |
Improvement | Add ability to skip database restoration during a restore operation on the Central Server so that it can be done manually for 3rd party database replication and high availability solutions (e.g. BDR3). This can be done only using the command-line to initiate the restoration. More information can be found in the Central Server user manual: | |
Improvement | Add the ability to skip running database migrations when installing or upgrading the Central Server to support 3rd party database replication and high availability solutions (e.g. BDR3). This feature is opt-in and by default the database migrations are ran as they were previously. It's possible to skip the Central Server database migrations by setting "skip_migrations" to "true" in "/etc/xroad/db.properties". For new installations of the Central Server, the installer asks the user should the migrations be skipped (defaulting to not to skip migrations). If the migrations are skipped, the X-Road services remain stopped after the installation completes. More information about this can be found in the Central Server installation manual: | |
Improvement | Add the ability to run database migrations manually on the Central Server to support 3rd party database replication and high availability solutions (e.g. BDR3). More information is available in the Central Server installation manual: | |
New | Add support to configure message log archive encryption keys by member as well as a general key for non-grouped members. This feature is opt-in and disabled by default. It is tied to message log archive grouping and encryption configurations. More information is available in the Security Server user manual:
| |
Fix | Fix a problem with message log ASiC containers containing REST messages that prevented opening the containers using DigiDoc 4. | |
Improvement | Update the OpenAPI generator used for code generation in the development process from version 4.x to 5.x. | |
XRDDEV-1771 | Improvement | Update the Signed Document Download Service to return encrypted documents when message log archive encryption is enabled. More information is available in the Signed Document Download Service user manual: |
XRDDEV-1789 | Improvement | Add a static warning to the Security Server UI about backward incompatible changes in backups and local configuration overrides. The warning is shown in the Backup and restore view in the Security Server UI. |
XRDDEV-1843 | Fix | Fix a problem with the Security Server health check API that caused the API to report everything working OK when serverconf database wasn't available. After the fix, the health check API reports the error when serverconf database isn't available. |
XRDDEV-1855 | Fix | Fix an XML External Entity (XXE) vulnerability on the Security Server. The vulnerability was related to adding a new WSDL to the Security Server and it could be triggered by an authenticated Security Server administrator with permissions to manage services. |
XRDSD-205 | Improvement | Return REST API type (OPENAPI3 / REST) and API endpoints in REST metaservice responses. |
Issue types: fix (bug fix or technical debt), improvement (improvement to an existing feature), new (a new feature).
New/Updated Dependencies
Dependency | Old Version | New Version | Notes |
---|---|---|---|
spring-boot | 2.3.8 | 3.5.5 | |
akka | 2.13:2.6.12 | 2.13:2.6.16 | |
metrics | 4.1.17 | 4.1.26 | |
jetty | 9.4.36.v20210114 | 9.4.44.v20210927 | |
jaxb | 2.3.3 | 2.3.5 | |
hibernate | 5.4.28.Final | 5.4.32.Final | |
jackson | 2.11.4 | 2.12.5 | |
postgresql(driver) | 42.2.18 | 42.2.24 | |
spring-cloud | Hoxton.SR10 | 2020.0.4 | |
commons-compression | 1.20 | 1.21 | |
bucket4j-core | 4.10.0 | 6.3.0 | |
xmlsec | 2.2.1 | 2.2.3 | |
bcpkix-jdk15on | 1.66 | 1.69 | |
commons-lang3 | 3.11 | 3.12.0 | |
commons-io | 2.8.0 | 2.11.0 | |
jcl-over-slf4j | 1.7.30 | 1.7.32 | |
apache-mime4j-core | 0.8.3 | 0.8.6 | |
saaj-impl | 1.5.2 | 1.5.3 | |
gson | 2.8.6 | 2.8.7 | |
guava | 29.0-jre | 31.0.1-jer | |
cfx-tools-validator | 3.4.2 | 3.4.5 | |
core-js | 3.6.5 | 3.18.0 | |
vee-validate | 3.4.11 | 3.4.13 | |
vue | 2.6.12 | 2.6.14 | |
vue-i18n | 8.22.0 | 8.26.0 | |
vue-router | 3.4.3 | 3.5.1 | |
vuetify | 2.3.10 | 2.4.8 | |
vuex | 3.5.1 | 3.6.2 |
Contributors
The following developers have contributed to the development of this release version. A contribution means at least one Git commit that is included in the release. The full list of contributors of different X-Road® versions is available here.
GitHub Username |
---|
amoog |
carohauta |
Dos4dev |
iluwatar |
jansu76 |
jhyoty |
olliru |
petkivim |
qrlt |
rihohiiepuu |
Riippi |
teemukin65 |
TJaakkola |
turkkaholmqvist |
Other Notes
Package Repositories
Repository | URL |
---|---|
Bionic | deb https://artifactory.niis.org/xroad-release-deb bionic-<version> main |
Focal | deb https://artifactory.niis.org/xroad-release-deb focal-<version> main |
RPM / RHEL7 | https://artifactory.niis.org/xroad-release-rpm/rhel/7/<version> |
RPM / RHEL8 | https://artifactory.niis.org/xroad-release-rpm/rhel/8/<version> |
Docker | https://hub.docker.com/r/niis/xroad-security-server-sidecar |
Repository Sign Key Details
Download URL | https://artifactory.niis.org/api/gpg/key/public |
---|---|
Hash | 935CC5E7FA5397B171749F80D6E3973B |
Fingerprint | A01B FE41 B9D8 EAF4 872F A3F1 FB0D 532C 10F6 EC5B |
3rd party key server | Ubuntu key server |
Packages
Ubuntu Bionic
Package | SHA256 checksum |
---|---|
xroad-addon-hwtokens_7.0.0-1.ubuntu18.04_all.deb | b0d76a98bdc8e6fc28b6cd1d96d6af721e4f94c60a3bdf9e9c0a61ee11f4d4fa |
xroad-addon-messagelog_7.0.0-1.ubuntu18.04_all.deb | 80cf52c3a6a4c3d8b151b566e86210e2dc035bd2cb0241f4d24fe0f68b606594 |
xroad-addon-metaservices_7.0.0-1.ubuntu18.04_all.deb | b6e497a4144af0bcd0cf8ead72711c3714cde6d89f4c9679cc8f8cb72c0322a0 |
xroad-addon-opmonitoring_7.0.0-1.ubuntu18.04_all.deb | 5c3523fe7d37f6a6016ea009a3e6214e8c8d5571676e91996db3fc30bdd80fda |
xroad-addon-proxymonitor_7.0.0-1.ubuntu18.04_all.deb | 27c693d7055db410c5869b99c50c02dd62d8d800a17d6fa32262247056484094 |
xroad-addon-wsdlvalidator_7.0.0-1.ubuntu18.04_all.deb | 7c28f7d212320d0a8c110f98c591e1f28321c3fef66aa779c69aa01d74f098cd |
xroad-autologin_7.0.0-1.ubuntu18.04_all.deb | 752c980766b636b44ed30b7d321747991c2683e045d0947d7f77cb8c56ec194c |
xroad-base_7.0.0-1.ubuntu18.04_amd64.deb | 387261ec3c4d2ca2f6b2146da8d18e880ed121bade2c8bcc25c25b725666a7e2 |
xroad-center_7.0.0-1.ubuntu18.04_all.deb | ad9143ce146afee0e4621363e14e5c693bd7d9d44183c23d0a8e190e49ca1547 |
xroad-centralserver_7.0.0-1.ubuntu18.04_all.deb | cc2d213543833b98149e74bea41c99c035137c170badeac27579673ffb17a56f |
xroad-centralserver-monitoring_7.0.0-1.ubuntu18.04_all.deb | 2f46ac622a60732007abaced4365c27aa0d07d67449eb28f065d3c3981b9233f |
xroad-confclient_7.0.0-1.ubuntu18.04_amd64.deb | 8f8483f45d29ff89c8a0b5aa311c6b2e31e643ee1c765215becf9212258e182d |
xroad-confproxy_7.0.0-1.ubuntu18.04_all.deb | a09b308b367c4a0640a6874c7fbc718e4fab8545222b616d94fe1127328260c8 |
xroad-database-local_7.0.0-1.ubuntu18.04_all.deb | d3839b08959be117a314c095c3ef49182e81ce20b2b1ee1a6a62ec4ce636aa99 |
xroad-database-remote_7.0.0-1.ubuntu18.04_all.deb | bb353235b058e97ca4ecd3c56fa0f5df1f6a23c63dd47cee585a9a1e8f68a90e |
xroad-jetty9_7.0.0-1.ubuntu18.04_all.deb | ba329878b22afc6471f6cd5ba97b66b8f099eaf009986afa20610135124ee8b7 |
xroad-monitor_7.0.0-1.ubuntu18.04_all.deb | 40084095dc2999bf1f201e8153a392b245d3174038f0de9188e3a2ccb3f17cb7 |
xroad-nginx_7.0.0-1.ubuntu18.04_amd64.deb | 2c2edcecb5f2c1009aaae85075f6bf31a4b8f6e2af33a43e8bfa38d7bb121075 |
xroad-opmonitor_7.0.0-1.ubuntu18.04_all.deb | f2882f727faea43e599541b77309b9a02f1802ff687553ccff342e8dc75ac01e |
xroad-proxy_7.0.0-1.ubuntu18.04_all.deb | e1d3020912e4dd3f0eaa08e014dd7026099f49c6855d3ddf6ad62ad95b5d2360 |
xroad-proxy-ui-api_7.0.0-1.ubuntu18.04_all.deb | b37b91f3879cb9caeb2a9b9cf66e5574fce99d31e947fe21689f0dc271f05210 |
xroad-securityserver_7.0.0-1.ubuntu18.04_all.deb | e6788662b550d903acf32d0fc4dce4db77a620f5c20fbee66363282212a134f3 |
xroad-securityserver-ee_7.0.0-1.ubuntu18.04_all.deb | 5b3255691a9922241ffcd540ebf33c139b560871c8fe3e741e0adb06b3afb320 |
xroad-securityserver-fi_7.0.0-1.ubuntu18.04_all.deb | aa0c885012b961cb52c7682cdc73eb95384066f782651aecaf27a5d0026a1589 |
xroad-securityserver-fo_7.0.0-1.ubuntu18.04_all.deb | aee43e6e7a8fbadc876125be046025db484fed4172b12797ecc74dae0b012767 |
xroad-securityserver-is_7.0.0-1.ubuntu18.04_all.deb | fea9e81bcb09e9045478713e635d66d9222e141494a6dadb078eb304328df2f1 |
xroad-signer_7.0.0-1.ubuntu18.04_amd64.deb | 85fba8a56b899e5ee20a44b1ee483ae38fb8e1e21abe3aaddba4d5afefc51562 |
Ubuntu Focal
Package | SHA256 checksum |
---|---|
xroad-addon-hwtokens_7.0.0-1.ubuntu20.04_all.deb | c1b024cf2b13e358b8855d0f9a27a24c5ac7fee02eec7c5d650f3dec084bb080 |
xroad-addon-messagelog_7.0.0-1.ubuntu20.04_all.deb | ed581b03fb6bdf64877ddfea26b532532fe1e70ebde98c32be21df6078e59a86 |
xroad-addon-metaservices_7.0.0-1.ubuntu20.04_all.deb | ba88de836ac183c1c5ab6bde8984086fce57e5500af5ba000e17ec4a2535975c |
xroad-addon-opmonitoring_7.0.0-1.ubuntu20.04_all.deb | 10a1c5877ea9c6a8111dc280bdc4817aee7c03502cdba4031cebf5bf0d9e4cbc |
xroad-addon-proxymonitor_7.0.0-1.ubuntu20.04_all.deb | 5b19e16c2b11d089b913b5e007237b3805a6b409d58fee9a0ac453d65d577325 |
xroad-addon-wsdlvalidator_7.0.0-1.ubuntu20.04_all.deb | 047104a77ec988402cb4acfabd7098831f05aef934a1fcd56047343da1ee910f |
xroad-autologin_7.0.0-1.ubuntu20.04_all.deb | 4616ee11239ba802fbd36e50f48edff75e1eeb883623c25e9e5e8c66cbcd4592 |
xroad-base_7.0.0-1.ubuntu20.04_amd64.deb | eac7cce9e4f009d5eefb6f346f7cfda88e916129fb424f4d73edb758a45bea1c |
xroad-center_7.0.0-1.ubuntu20.04_all.deb | eaba0b84e703fb18461807eb78cc3ca1ad8ee43ab2075c85b6e96d2548b2f96a |
xroad-centralserver_7.0.0-1.ubuntu20.04_all.deb | 8ad68be5c191d5dfad421b43a8c91be4dd9b9867d79ff2f47d638e6fe2200da9 |
xroad-centralserver-monitoring_7.0.0-1.ubuntu20.04_all.deb | 9b496883436cf93e4184c63d6ccf2c5ec75a5957f9fc399cd967df7134965b05 |
xroad-confclient_7.0.0-1.ubuntu20.04_amd64.deb | 75d9c562c1634fd1cd14bdf7db47421b2e2ff8d1acec10db7b4ed7eb231f08fb |
xroad-confproxy_7.0.0-1.ubuntu20.04_all.deb | bf174c5047bef46ad2064ca5d071ba3a3bd6e5c11615c61ea60958b8946f034f |
xroad-database-local_7.0.0-1.ubuntu20.04_all.deb | bb9bd95215b3816ced59cfbba21f31d23c4a9e7c1992709681c2356816ccfef4 |
xroad-database-remote_7.0.0-1.ubuntu20.04_all.deb | be88d37760c7e537088c179fa936aa7ae7caf5c6a3d2bdb82b5ebcfb73fac968 |
xroad-jetty9_7.0.0-1.ubuntu20.04_all.deb | 60340b2c3b0b9237cd1cb6ab16982bcf1b822e04430f28d1652d999d4ad71202 |
xroad-monitor_7.0.0-1.ubuntu20.04_all.deb | 26f2d10d97c1e167987b1ad9235e0c0a37310b00535735c259d74e64263ca6a0 |
xroad-nginx_7.0.0-1.ubuntu20.04_amd64.deb | caef71f98a9ecb6ecb30f07b7c35a5c5e18b472c36ef7c3e684562b34c121a37 |
xroad-opmonitor_7.0.0-1.ubuntu20.04_all.deb | 6afddcd6c01321632bfedd5d36798c26cb543aec2571eda8a6af23b0e72a821c |
xroad-proxy_7.0.0-1.ubuntu20.04_all.deb | d5c7172962316cb3da553dbd345e56163383b12189f1fffc9a76a43b03d82724 |
xroad-proxy-ui-api_7.0.0-1.ubuntu20.04_all.deb | 13a05ea4c51ffd2a7a7511a2a6d72849b61fbca84e736004bc01b9e3b6044cf5 |
xroad-securityserver_7.0.0-1.ubuntu20.04_all.deb | 6fd39b5aab2deb4d3182a17fb722eadc4bd5498ed6f94a56d1ce8b712c181471 |
xroad-securityserver-fi_7.0.0-1.ubuntu20.04_all.deb | 58698a207830896310aa8d470f8495e55a597b5371953ee0efff0c857574618d |
xroad-securityserver-ee_7.0.0-1.ubuntu20.04_all.deb | b5f7499fcc2bf4e81754aec7cff032cc0962ee9d4253e6ba0ca6df8b3d8746ab |
xroad-securityserver-fo_7.0.0-1.ubuntu20.04_all.deb | 0d840e159efce1d62e9b4476616b874945d0058782af106d5e6d66ab4f6d812d |
xroad-securityserver-is_7.0.0-1.ubuntu20.04_all.deb | 8c7dbff9c173bd31e93bb32e012a50ac891f815a8b0ea395e5003601bcd4fbab |
xroad-signer_7.0.0-1.ubuntu20.04_amd64.deb | beb0a021dddf1571b2035cbcd029ea6ffdc694a70707d2cdd72cfd89f429f3f9 |
RPM / RHEL7
Package | SHA256 checksum |
---|---|
xroad-addon-messagelog-7.0.0-1.el7.x86_64.rpm | bac3a541867205152828891a16f0818fc7eb95d03dbca9f8572509d3c7f653f7 |
xroad-addon-metaservices-7.0.0-1.el7.x86_64.rpm | 616c510cfeedf81f96aef1e587be99991a29c62f75d26bce0c10b50d716eca2d |
xroad-addon-opmonitoring-7.0.0-1.el7.x86_64.rpm | 270855572a81669f0ff52ba5bf0d30746220b7a12dfc187eeee9dbd086f4b58f |
xroad-addon-proxymonitor-7.0.0-1.el7.x86_64.rpm | a29ee0298291363d4d1fc304ebd47572b80ab565f3eea609d355e5ee2c175281 |
xroad-addon-wsdlvalidator-7.0.0-1.el7.x86_64.rpm | 5850e95bfa54895464eb93d6bb3ac1c394972dd82ce9b4df4bb733e3ea26104b |
xroad-autologin-7.0.0-1.el7.noarch.rpm | 4d5e0f69e59d7826d2c6559306afb3467c0e64d74ca27e3283b145e03c92a58d |
xroad-base-7.0.0-1.el7.x86_64.rpm | e752d25a7e10b858fcbcc6c5985a5fd11e32d3f28227247e74e774f66f389279 |
xroad-confclient-7.0.0-1.el7.x86_64.rpm | 9a5f242fdc6337f5f0b6c9ce987db02d54537645bb0124c1661cc75838ad9caf |
xroad-database-local-7.0.0-1.el7.noarch.rpm | 9cde95d7f5478dbab05d6eed0654d619df0eb8da3a30f9f74b66bcb0d7b53d81 |
xroad-database-remote-7.0.0-1.el7.noarch.rpm | 34f109a3d30d1e925fe53c67120a8d8cff8dd7c43d78e5c4beb7212163150f28 |
xroad-monitor-7.0.0-1.el7.x86_64.rpm | 17414738aecb3a3c333b9aab8220bc0a6d1070ee6080529e6b39641519682fe5 |
xroad-nginx-7.0.0-1.el7.x86_64.rpm | fea7d89e4f3ac5605628fb97d6e36a9ff1ee9c83105447523cba538b5655613b |
xroad-opmonitor-7.0.0-1.el7.x86_64.rpm | bede9a9ee675b6c1533c113e4417caff056cbc0a24c5bd799c7cca57faa8a381 |
xroad-proxy-7.0.0-1.el7.x86_64.rpm | 227c2a995c3167456f8dd52c98f4fb4306d93c680b98cba054b39b2563ce32e0 |
xroad-proxy-ui-api-7.0.0-1.el7.x86_64.rpm | 3ce25718844e800472377f2b8f9f74f85b6f0e92132907302a8c2993d56a185f |
xroad-securityserver-7.0.0-1.el7.noarch.rpm | d67bf6520f31ffdbf95422632a02885e4babb8b4a20970fbfe8a82e9d4a2d79a |
xroad-securityserver-fi-7.0.0-1.el7.noarch.rpm | 943ec8a2d29a28389434ae6255bff910bb009eca2e1606e9ecf7ca4cba25faf3 |
xroad-securityserver-fo-7.0.0-1.el7.noarch.rpm | e1bedabd27848012bc352b3885d296e9eac9246e82e9344c4d9bd93a62099e7e |
xroad-securityserver-is-7.0.0-1.el7.noarch.rpm | d5de632eef3ff4088bb8e7b1a6c70c13d1423b1961173ad58c6a9b8118003da5 |
xroad-signer-7.0.0-1.el7.x86_64.rpm | 553b18ad2d87e2767f9c9eb08c04ef75b81b9638b11f64f3f1e66520844cba42 |
RPM / RHEL8
Package | SHA256 checksum |
---|---|
xroad-addon-messagelog-7.0.0-1.el8.x86_64.rpm | d4dd8ec5a08d1e33133e9760cfe30255524140d078478909a7e469835009fa67 |
xroad-addon-metaservices-7.0.0-1.el8.x86_64.rpm | c68957dd2c0a2be02010c4922a0b3c324f139264433e861eb7ac2cafe1b436ec |
xroad-addon-opmonitoring-7.0.0-1.el8.x86_64.rpm | 9f6698f2f841bd071a9e6b52a0d9b41cc07d06691e75c4b9590521f3525d237a |
xroad-addon-proxymonitor-7.0.0-1.el8.x86_64.rpm | 96b08b5ab1ed3c4367260a5175eb1f09547c00e06b47d41401241471280edf15 |
xroad-addon-wsdlvalidator-7.0.0-1.el8.x86_64.rpm | 1e35397f13b0e7839c9b71c56a7983749b2206f76c338ddaeba8fd471c8f1501 |
xroad-autologin-7.0.0-1.el8.noarch.rpm | 70d83d8e0249bd39b38760b543f9c75452a02a9ae2ea31ade57bcf7c3f69e835 |
xroad-base-7.0.0-1.el8.x86_64.rpm | bb2766fb0ddf465ff8f2d83632d39a77bb300a9a0005d6f2b433b1926f73eb8e |
xroad-confclient-7.0.0-1.el8.x86_64.rpm | abb7065e3bdc9134554a08ebc3101655e1dccacfb614821c55e356e4de145a37 |
xroad-database-local-7.0.0-1.el8.noarch.rpm | 5f9fa0061dd0ca9b0073ccdca9066926545b59c90f5f49e30c5e1b10a2672461 |
xroad-database-remote-7.0.0-1.el8.noarch.rpm | b4884c0a3a42ec316430149bc73a3137910b317d83991c0e5f206dd7b811c0ca |
xroad-monitor-7.0.0-1.el8.x86_64.rpm | ea097bb9567f97492cd3cd8bbe41665d911d601035a6f4b6f40112b464641069 |
xroad-nginx-7.0.0-1.el8.x86_64.rpm | 46a6cd957e90ebab7bb3f518aafc689cf421ac29dfac7f55d9fb02f8f40cff7a |
xroad-opmonitor-7.0.0-1.el8.x86_64.rpm | 24c5bded52f6460ef6d3711530d903c2c0f83bc0220535c01876d08a971eb1b4 |
xroad-proxy-7.0.0-1.el8.x86_64.rpm | 11f111cd9ae956ba3f310d216a7bc713a044e83f7e58ae792adadff469016109 |
xroad-proxy-ui-api-7.0.0-1.el8.x86_64.rpm | f061ef75c84aee88201a4b104d0a377599141f8610792abb3f1f51184c554dd4 |
xroad-securityserver-7.0.0-1.el8.noarch.rpm | bc60992149df70e9a1c7a2d8950f6c5310f90663f2aef28cd446199c745dc287 |
xroad-securityserver-fi-7.0.0-1.el8.noarch.rpm | 074296507100cab4f214f8bda1719d6d7877a680e6eaec7b6044f11d67373e22 |
xroad-securityserver-fo-7.0.0-1.el8.noarch.rpm | 97efa0c4d6e243b0aa9629723ce404f846c8d76fe496c374861000dd9643fa20 |
xroad-securityserver-is-7.0.0-1.el8.noarch.rpm | a82f3524a64cab7f44a927cc7e82e9a8b33241529bed33d6c3133f695913daf2 |
xroad-signer-7.0.0-1.el8.x86_64.rpm | a0ea947fc62fcfc41e821dc28b0b626f2675dfff150f79162d1132cdd06941bf |