Skip to content

Releases: cloudfoundry/diego-release

Diego v0.1458.0

Diego v0.1457.0

09 Mar 16:31
Compare
Choose a tag to compare

Changes from v0.1456.0 to v0.1457.0

Significant changes

Dependencies

BOSH job changes

None.

BOSH property changes

None.

Diego v0.1455.0

04 Mar 10:36
Compare
Choose a tag to compare

Changes from v0.1454.0 to v0.1455.0

Significant changes

This version of diego-release completely removes the Diego Acceptance Test suite, or DATs. This test suite had already been largely consolidated with the CF Acceptance Tests, or CATs. CF v231 contains a version of the CATs that can be targeted at either the Diego backend or the DEAs, and which includes all the remaining tests of Diego-specific functionality from the DATs. The CATs are now the only supported mechanism for verifying the CF-level functionality of a CF deployment backed by Diego. Please consult the CATs README for more details on running it with the appropriate configuration.

The Diego Smoke Tests are also redundant with the CF Smoke Tests, and will similarly be removed in favor of the CF tests in an upcoming release. If you are using the Diego Smoke Tests to monitor a CF deployment backed by Diego, please switch to using the CF Smoke Tests as soon as possible.

BBS Benchmarks

Performance

Custom CAs

SSH

CF Tasks

Routing

Windows Support

Manifest Generation

Dependencies

Test Suites and Tooling

BOSH job changes

  • Removed the acceptance-tests job.

BOSH property changes

  • Removed all BOSH properties under acceptance_tests.
  • Added benchmark-bbs.percent_writes property: Percentage of actual LRPs to write on each rep bulk loop in the BBS benchmarks.
  • Added diego.rep.trusted_certs property: Bundle of trusted certificates to be made available to all containers on the cell.

Diego v0.1454.0

20 Feb 07:50
Compare
Choose a tag to compare

Changes from v0.1453.0 to v0.1454.0

Significant changes

Operators can now install a set of trusted system certificates in the default /etc/ssl/certs trust store of the cflinuxfs2 rootfs. This is particularly useful if your cflinuxfs2-based instances communicate with external services signed by a custom CA, in which case you can use this feature to install that CA certificate in all the instances.

To install the certificates, supply the contents of the PEM-encoded certificates in the diego.rootfs_cflinuxfs2.trusted_certs property in the Diego deployment manifest. As with other PEM-encoded manifest data, you may wish to use the YAML | block-literal syntax to specify the property, as follows:

properties:
  diego:
    rootfs_cflinuxfs2:
      trusted_certs: |
        -----BEGIN CERTIFICATE-----
        (cert number 1 data)
        -----END CERTIFICATE-----
        # comments outside the PEM boundaries will be ignored
        -----BEGIN CERTIFICATE-----
        (cert number 2 data)
        -----END CERTIFICATE-----

If you are using the spiff-based manifest-generation scripts, this property can also be specified in the property-overrides stub.

Custom CAs

SSH

Routing

Manifest Generation

Dependencies

Test Suites and Tooling

Documentation

Cleanup

BOSH job changes

None.

BOSH property changes

  • Added diego.rootfs_cflinuxfs2.trusted_certs: Bundle of certificates to install in the cflinuxfs2 rootfs default trust store (/etc/ssl/certs).

Diego v0.1453.0

12 Feb 18:02
Compare
Choose a tag to compare

Changes from v0.1452.0 to v0.1453.0

Note that due to breaking changes in manifest-generation introduced in cf-release, the manifest-generation scripts in this version of diego-release are compatible only with cf-release@0665d0e or later. Those scripts are therefore incompatible with CF v230 or earlier, but will be compatible with CF v231 when it is released.

Significant changes

BBS Benchmarks

Manifest Generation

Component Logging and Metrics

Test Suites and Tooling

Cleanup

BOSH job changes

None.

BOSH property changes

None.

Diego v0.1452.0

04 Feb 18:12
Compare
Choose a tag to compare

Changes from v0.1451.0 to v0.1452.0

Significant changes

NOTE: If you are not using the spiff-based manifest-generation tooling to generate your Diego deployment manifest, please be aware that some of the per-job consul agent configuration has changed with this version of the release. Diego components now set up their DNS health checks in consul themselves via the locket library, instead of configuring the consul agent to do so. This means that most jobs will have removed the consul.agent.services property entirely. Jobs running etcd will keep only that 'etcd' service in the property, as in the following representative manifest snippet:

jobs:
- name: database_z1
  templates:
  - name: etcd
    release: etcd
  - name: bbs
    release: diego
  - name: consul_agent
    release: cf
  - name: metron_agent
    release: cf
  properties:
    consul:
      agent:
        services:
          etcd: {}

See the changes to the manifest-generation/diego.yml file introduced in diego-release commit 680aa9b for more detail.

BBS Benchmarks

Manifest Generation

Component Logging and Metrics

Security

BOSH job changes

The dns_health_check.erb script template has been removed from the following job templates:

  • auctioneer
  • bbs
  • cc_uploader
  • file_server
  • nsync
  • ssh_proxy
  • stager
  • tps

BOSH property changes

None.

Diego v0.1451.0

29 Jan 18:34
Compare
Choose a tag to compare

Diego v0.1450.0

Diego v0.1448.0

Diego v0.1447.0