Cloudify 4.2 Release Notes

Download in PDF

What’s New – Feature Highlights

 

  • Open Source User Interface – The Cloudify user interface framework is now open source and publically available on GitHub. The Cloudify user interface is used as Cloudify’s administration and management console, and also as a dynamic framework to construct custom user portals.
  • User Management – Enhancements include supporting different roles in different tenants for the same user, and adding 3 new roles: Tenant Manager, Tenant Viewer and Tenant Operations, to the existing User and sysAdmin roles. Also, user-groups are now assigned to tenants with roles as well.
  • Cloudify’s User interface – Cloudify now allows the option of defining the sets of pages (“Page Templates”) which the different users will be presented with upon logging into the system, according to their roles and in the context of a tenant. By that, the pages and widgets framework allows even more flexibility in designing and configuring your application dashboard to fit the presentation perfectly to your needs.
  • Global Resources – The availability level of Cloudify’s Plugins, Blueprints and Secrets can now be: Private, Tenant-wide, or Global. To the already supported Private and Tenant-wide (formerly Public) availabilities we added the option of setting those resources to Global, which will allow users from all tenants to use them according to the user roles and permissions.
  • Cloudify Composer – The blueprints visual designer has many improvements and new cool features in 4.2, of which the most exciting one is the ability to edit the Source tab and by that add, copy or update parts of the blueprint. Its environment now provides an even better experience, allowing you to combine the ease of drag-and-drop actions with the richness of the textual editing options.
  • OKTA – Cloudify now supports Single-Sign-On(SSO) via an integration with Okta systems to authenticate users.
  • Monitoring Widgets – Cloudify 4.2 also sees a much improved monitoring-graphs widget, with more configuration options, more filter and the ability to present multiple lines on one graph.
  • TOSCA Simple Profile 1.0 is now supported, via the Cloudify-ARIA-Plugin. The plug-in allows orchestrating TOSCA CSAR packages by introducing a new ARIA node type for Cloudify, that exposes ARIA’s capabilities to Cloudify
  • Kubernetes – Cloudify 4.2 extends integration with Kubernetes even further more. Cloudify-Kubernetes-plugin allows the orchestrate containerized cloud native applications alongside traditional applications.
  • Insights – Cloudify now offers Insights and analytics service for monitoring, analyzing, and managing cloud computing costs and usage. Helpful for IT managers to control and reduce usage & costs for multi and hybrid cloud infrastructure. Provides 3 types of reports: Cost Overview Report, Utilization Overview Report, Machine Overview Report.
  • Multiple Networks – Cloudify Manager can now be configured with multiple management networks through which it communicates with the Cloudify Agents. This enables both network isolation between managed deployments, enabling an enhanced security model, as well as a simplified manner of managing multiple cloud environment from a single cloudify Manager.

 

New Features: (Release Themes)

Cloudify Manager

  • CFY-6120 Role-based Access ControlCloudify 4.2 supports 5 user roles which define the permissions users have on resources in a tenant. In addition to sysadmin, we also support 4 tenant-specific roles: tenant manager, tenant user, tenant operations, tenant viewer. Now a user can have different roles in different tenants.

 

  • CFY-7223 – Improve and automate SSL commands

 

      • CFY-7119 – enable and disable external ssl after bootstrap
      • CFY-7129 – Add cert_path parameter to cfy profiles use
      • CFY-7140 – Add certificate path parameter to profiles commands

 

  • CFY-7190 Multiple networks Support multiple networks on a Cloudify manager

 

      • CFY-7200 – Add support for adding networks to the provider context during bootstrap
      • CFY-7197 – Make agents aware of the multi-network feature
      • CFY-7191 – Create CA certificate during bootstrap
      • CFY-7192 – Sign new certificates with the CA cert created in CFY-7191
    • CFY-7404 Cli on manager Adding cli installation to bootstrap
    • CFY-6876 – Isolation of RabbitMQ resources on a per-tenant basis
    • CFY-6300 – Bootstrap validation should ensure that ssh_user has passwordless sudo
    • CFY-7119 – enable and disable external ssl after bootstrap
    • CFY-7212 – A way to teardown managers with non-responding REST service

 

  • CFY-7059 Consolidate agent installation methods

 

    • CFY-7105 – Don’t install agent via install script in provided mode
    • CFY-7179 – Introduce new agent install method – “plugin”
    • CFY-7168 – Move certificate placeholder to download link, when using userdata
    • CFY-7108 – Integration tests are needed to test the plugin scenario
    • CFY-7107 – When using init script (userdata) the installation script isn’t deleted
    • CFY-7106 – Fix agent installation logs to be in order
    • CFY-7104 – Remove unnecessary code from Fabric/WinRM runners
    • CFY-7088 – Remove ability to install agent from source
    • CFY-7064 – Change agent upgrade to use the script from CFY-7060
    • CFY-7063 – Change the remote agent install to use the script from CFY-7060
    • CFY-7062 – Refactor agent config
    • CFY-7061 – Change the init-script installation method to use the generated script from CFY-7060
  • CFY-7125 – Deny users the option to list, upload or delete snapshots (only admins have these options now)
  • OSX cli installation – Cloudify now offers a CLI package for Mac OSX.

Cloudify User Interface

  • STAGE-451 – Graph improvements: More options are now supported in the filters, time-pickers, metrics units and amount of lines presented in the graphs widgets.
  • STAGE-484 – Add time parser and validator
  • STAGE-498 – Add graph changes implemented on hackathon
  • STAGE-492 – Optimize InputTimeFilter component
  • STAGE-491 – Set time resolution on range button click
  • STAGE-483 – Update time range selector in Events/logs Filter widget
  • STAGE-482 – Update time configuration in Deployment Metric Graph widget’s configuration
  • STAGE-485 – Add no-data message instead of loading spinner on empty influx response
  • STAGE-448 Unified login – The Cloudify UI and Composer now share a port, and as their login is unified you only need to enter your username and password once, to access both!
  • COMPOSER-830remove composer login code
  • COMPOSER-839change composer port in production to 80
  • COMPOSER-832composer loading without token loads app then redirect
  • STAGE-442 – Make stage recoverable with token only (rebuild local storage if needed)
  • STAGE-449 When user doesn’t have a tenant navigate to designated page
  • STAGE-447 – Do not save user table, use new rest api to retrieve user info
  • STAGE-403 – UI now uses passportJs. Adds token named XSRF-TOKEN to cookies and adds it as a header for each request.
  • STAGE-408 – Open sourcing the UI. UI repository is now available as part of the Cloudify community version
    • STAGE-410 – Secure passwords that we have in the config files
  • STAGE-30 – widget category. Widgets catalog now supports grouping according to categories
  • STAGE-443 – plugins catalog Added a new widget that presents out of the box plugins for easy plugin upload
  • STAGE-445 – Blueprint Catalog (readme icon). The i symbol on each blueprint opens he blueprint’s readme file from GitHub
  • STAGE-305Template management – You can now define the sets of pages that the users see when they log into the system according to their role and tennant
    • STAGE-454Apply a template for a user based on dynamic templates
    • STAGE-456Change ‘edit mode’ to have the bubble like the mock
    • STAGE-425 – show list of available templates
    • STAGE-453 – allow create/update/remove template
    • STAGE-455  – Template pages
  • STAGE-420Add more dynamic support for the graph query
  • STAGE-422Add more dynamic time range selection in metric graphs
  • STAGE-15 – responsive for menu

Cloudify Composer

  • COMPOSER-542 Two-Way Editing – In addition to creating the blueprint from the Topology tab, you can now edit the blueprints from the Source tab and the changes are reflected in the Topology tab

Plugins

 

  • ARIA Plugin – Allows orchestrating TOSCA CSAR packages by introducing a new ARIA node type
      • CFY-7274  – Create a cloudify-aria-plugin repository
      • CFY-7275 –  Configure the cloudify-aria-plugin repository for CI
      • CFY-7277  – Create plugin.yaml
      • CFY-7279  – Implement create operation: create ARIA working dir. Install plugins for the service template. Store service template. Create service
      • CFY-7280  – Implement start operation: Run install workflow on the ARIA service.
      • CFY-7281  – Implement stop operation: Run uninstall workflow on the ARIA service
      • CFY-7282  – Implement delete operation: Delete the service, service template and working dir (if necessary).
      • CFY-7283  – Externalize service outputs: the outputs of the ARIA service are accessible via the runtime properties of the cloudify.aria.nodes.Service node.
      • CFY-7284  – Propagate ARIA logs into cloudify: logs of the ARIA execution are written to the Cloudify ctx logger.
      • CFY-7285  – Propagate ARIA execution status to cloudify: The status of the cloudify execution is dependent of the ARIA execution status.
      • CFY-7286  – Add configuration files
      • CFY-7348  – Sort out plugin dependencies
      • CFY-7359  – Create an hello-world example blueprint

 

  • CFY-7077 – Script plugin – add a way to pass a cert to the `requests.get`

 

Resolved Issues

  • CFY-7110Uninstall failure after set-active on cluster
  • CFY-7143 – Fix HA system tests – “use/rejoin negative” and “delete”
  • CFY-7144 – Cluster – only remove old db dir after successfully cloning the new one
  • CFY-7145 – Cluster CLI rest client needs to retry requests sent to removed nodes
  • CFY-7146 – Fix HA system tests – “test_failover”
  • CFY-7165 – Quick successive failovers can leave the master in half-promoted state
  • CFY-5808 – “cli” node in manager blueprint fails to create
  • CFY-5832 – RPM’s end up referring to external pypi repo
  • CFY-5847 – No Idempotency on snapshot recovery
  • CFY-5854 – Sanity app erroneously refers to public IP
  • CFY-6041 – CLI installation from manager blueprint is broken
  • CFY-6580 – (Script plugin) incorrect handling of HTTP errors when downloading resources
  • CFY-6760 – Snapshot restore error
  • CFY-6763 – Agent installation currently mandates manager access through private IP
  • CFY-6764 – Can’t create snapshot with deployment
  • CFY-6803 – Operations using the REST client on Python 2.6 may fail
  • CFY-6810 – Bootstrap validation should ensure python-setuptools is installed
  • CFY-6813 – Wrong message when trying to use a dead manager’s profile
  • CFY-6819 – Host validation is done too late
  • CFY-6821 – Non-empty manager (with resources) can join cluster
  • CFY-6822 – Manager can be used as stand alone manager after been removed from cluster
  • CFY-6830 – Don’t show internal logs to the user
  • CFY-6850 – Extra, unneeded info printed when not all inputs are provided
  • CFY-6859 – Error with joining manager to cluster after removing the active manager from the cluster
  • CFY-6906 – cli stays connected to the passive manager on a cluster
  • CFY-6918 – Creating new tenant on snapshot restore is not validated
  • CFY-6924 – Bootstrap fails when private_ip is a hostname
  • CFY-6927 – Bootstrap hangs when failing validations
  • CFY-6947 – Extraneous output shown when get_input usage is invalid
  • CFY-6976 – Exception causes are never printed
  • CFY-7000 – Workflow events monitor: only stop after it has been started
  • CFY-7019 – Timeout error message in CLI while uploading plugins inside HA cluster (the upload itself works)
  • CFY-7022 – There are no logs available for snapshots
  • CFY-7030 – Connection error to manager outside the cluster
  • CFY-7039 – No ports reachablity validation on cluster start
  • CFY-7048 – `cfy profiles use` can use cluster settings of the previous profile
  • CFY-7050 – Current DB locking mechanism is not sufficient in edge cases
  • CFY-7058 – Snapshot restore backend (rest service + workflow) still expect tenant_name
  • CFY-7066 – fix_snapshot_ssh_db.py doesn’t respect passed in tenant name (overwrites matching key paths with secret ID for all tenants’ deployments)
  • CFY-7067 – cfy agents install for other tenants failing
  • CFY-7069 – In snapshot create only credentials from the current tenant are saved
  • CFY-7072 – Agents upgrade is not multi-tenant
  • CFY-7078 – Windows cli packages are broken
  • CFY-7080 – Save resource under folder in the tmp folder, and not directly under the tmp folder
  • CFY-7081 – `cfy -vvvv` doesn’t show tracebacks
  • CFY-7082 – Fabric version changes during bootstrap, causing CLI not to work
  • CFY-7083 – Windows cli bootstrap is broken due to invalid path
  • CFY-7084 – Fix integration test with target_aware_mock plugin
  • CFY-7085 – System tests fail due to dir creation
  • CFY-7086 – Agents upgrade is broken due to new config
  • CFY-7087 – Userdata install is broken due to small bug in agent config
  • CFY-7090 – In-place upgrade failure with SSL certificates
  • CFY-7095 – restore-certificates flag failure from 3.4.2 manager snapshot to master manager
  • CFY-7109 – Conflict in fabric versions between CLI and cloudify-fabric-plugin
  • CFY-7110 – Uninstall failure after set-active on cluster
  • CFY-7111 – snapshot restore should return error without trying to perform the action if user is not a “super-admin”
  • CFY-7112 – User should not be able to perform any actions on snapshots if it’s not an admin user
  • CFY-7115 – Users should not be able to perform any action regarding snapshots
  • CFY-7116 – Key-pairs inside secrets store doesn’t restore on snapshot
  • CFY-7120 – Agent installation with Fabric runner should run with sudo privileges
  • CFY-7123 – client copy of rest certificate is in the general workdir
  • CFY-7124 – Fix agent system tests
  • CFY-7130 – cfy dev command doesn’t work
  • CFY-7137 – Failure connecting to manager from bootstrap, after enabling ssl
  • CFY-7141 – Snapshot restore fails on community due to credentials tenant lookup
  • CFY-7142 – Command line too long on agent installation through winrm
  • CFY-7144 – Cluster – only remove old db dir after successfully cloning the new one
  • CFY-7145 – Cluster CLI restclient needs to retry requests sent to removed nodes
  • CFY-7150 – User connection failure after snapshot restore
  • CFY-7165 – Quick successive failovers can leave the master in half-promoted state
  • CFY-7166 – restore snapshot with certificate restore replaces the whole ssl dir
  • CFY-7167 – “SSL enable” fails communication between CLI and manager image
  • CFY-7169 – Second CLI receives an error while trying to connect to manager with ssl enable
  • CFY-7172 – Install script not removed from manager after running agent upgrade
  • CFY-7173 – Unable connect to bootstrapped manager after using ssl manager
  • CFY-7175 – CLI fails to connect a passive manager after set-active
  • CFY-7176 – CLI fails to connect to his bootstrap manager after SSL
  • CFY-7181 – Default import resolver rules should include cloudify.co
  • CFY-7182 – Cluster – handlers can be skipped if value changes during retries
  • CFY-7183 – Fix suites_splitter path and remove testnameextractor nose plugins
  • CFY-7186 – Misleading error message if invalid YAML provided as input file
  • CFY-7188 – Cluster error with SSL enabled
  • CFY-7199 – New rest certificate property of CLI profile breaks on old profiles
  • CFY-7213 – Cluster start: cloning database can use a non-existent directory
  • CFY-7214 – cfy agents install –all-tenants not working with empty default tenant
  • CFY-7218 – nginx startup verification uses internal address with external port
  • CFY-7222 – Bootstrap fails on RHEL 7.4
  • CFY-7237 – Cluster’s HandlerRunner might get stuck in a busy loop
  • CFY-7245 – trying to get info on your own user fails in community edition
  • CFY-7250 – /etc/cloudify/cluster is world-readable
  • CFY-7251 – Cannot add new node to cluster after failover
  • CFY-7253 – Inconsistent behaviour for 80 -> 443 redirect
  • CFY-7265 – Snapshot restore certificates fails with new internal CA
  • CFY-7267 – Incorrect agent connectivity details ends up in unhelpful message being created
  • CFY-7271 – An unauthenticated request to Composer doesn’t redirect the user to Stage login page
  • CFY-7272 – Manager IP setter doesn’t update logstash conf file
  • CFY-7276 – External certificates that were created by us should be recreated by the IP setter
  • CFY-7300 – create snapshot is broken
  • CFY-7302 – Nginx redirect should be reinstated to all paths except the API
  • CFY-7305 – Non-admin users not working after snapshot restore
  • CFY-7313 – Restores to 4.1 and 4.1.1 break with 4.0.1 where SSH keys are on the filesystem
  • CFY-7316 – Failed connecting to stage through Okta by bootstrapped manager
  • CFY-7321 – Don’t require tenant in config api
  • CFY-7323 – Update security_configuration with admin cred
  • CFY-7332 – Can’t enable ssl inside cluster
  • CFY-7336 – Allow stage read rest-security.conf
  • CFY-7337 – expose tenants api in community
  • CFY-7340 – fix Tenants api in premium
  • CFY-7345 – Plugin installation – errors might not be displayed
  • CFY-7354 – Snapshot restores broken by new permissions logic
  • CFY-7356 – 3.4.2 -> 4.2 snapshot restore fails
  • CFY-7361 – Logs should not be removed on teardown
  • CFY-7365 – fix widget names in permissions conf
  • CFY-7377 – Unauthorized User returns 401 instead of 403
  • CFY-7379 – Fix 4.2 snapshot integration test
  • CFY-7380 – fix openssl version validation
  • CFY-7382 – Private resource is broken
  • CFY-7383 – Cannot restore snapshots with riemann policies
  • CFY-7384 – Tenant Manager has the ability of managing users
  • CFY-7385 – Tenant User has the ability of managing secrets
  • CFY-7386 – Tenant Viewer and Tenant Ops Mgr can access to the composer by negative to composer’s url+port
  • CFY-7387 – Cluster start/join: validate –cluster-host-ip is actually ip
  • CFY-7388 – Simple Manager Bootstrap SSL verification fails
  • CFY-7395 – Cluster: lockfile permission denied with re-created user
  • CFY-7409 – Failed to load blueprint on composer after set-active on manager
  • CFY-7411 – Fix wagon integration test
  • CFY-7412 – Fix community multi network system test
  • CFY-7415 – Cluster join continues polling with the wrong credentials
  • CFY-7420 – “yum install” attempts to access yum repos
  • CFY-7421 – Listing tenants fails on community manager
  • CFY-7423 – Certain RPM’s missing from manager resources package
  • CFY-7434 – CLI should not be uninstalled if it existed before bootstrap
  • CFY-7437 – In-place upgrade crashes the stage and changes the password
  • CFY-7439 – “cfy profile use” ignores existing REST protocol
  • CFY-7443 – “cfy plugins upload” usually fails when using local wagon
  • CFY-7444 – Can’t add logs/events filter – widget is stuck on loading
  • CFY-7455 – Certain Wagons cannot be uploaded
  • CFY-7457 – Unable to delete tenants and user groups with specific names
  • CFY-7459 – Missing requirements in docl
  • CFY-7461 – Invalid certificate error with any CFY CLI command
  • CFY-7483 – Snapshot failure with modified home directory
  • CFY-7490 – global resources should not require tenant for authorization
  • CFY-7500 – `cfy cluster join` uses incorrect CA key to generate certs
  • CFY-7503 – Snapshot restore fails on bootstrapped managers
  • CFY-7504 – Composer can’t edit blueprints restored from a snapshot
  • CFY-7505 – no stage in HA mode
  • CFY-7506 – Snapshot does not contain composer DB
  • CFY-7508 – ‘Stage’ service on auto-restart mode after set-active on cluster
  • CFY-7509 – inplace upgrade from 4.1.1 is broken
  • CFY-7537 – Fail to uninstall blueprint from second manager in cluster
  • CFY-7551 – Failed to login the UI after start cluster and restore snapshot
  • CFY-7552 – 4.1.1 -> 4.2 restore breaks stage
  • CFY-7564 – Cannot upgrade a cluster
  • CFY-7565 – Requests without tenants are handled incorrectly
  • CFY-7571 – Bootstrap fails during in-place upgrade process after manager teardown in HA cluster
  • CFY-7579 – Add setup tools version requirement to agent dev-requiremets
  • STAGE-272 – Numeric deployment inputs sent as a string
  • STAGE-320 – Usability: Login screen should focus on the username field
  • STAGE-335 – Axis and ticks are not formatted properly for graphs
  • STAGE-386 – Events and logs with long message
  • STAGE-412 – Error messages in popups disappear after 5 sec
  • STAGE-414 – Node statistics widget keeps reloading
  • STAGE-421 – Adjust ‘loading’ spinner in widget header to allow access to widget config while data is loading
  • STAGE-427 – Focus jumps to the top of the screen after changing widgets that are at the bottom of the page.
  • STAGE-464 – Execute workflow “uninstall” improvements.
  • STAGE-486 – Force switch is not working in execution deployment modal
  • STAGE-516 – Events Filter widget render method error
  • COMPOSER-378 – intrinsic functions autocomplete doesn’t work mid writing
  • COMPOSER-534 – Able to add the same import more than once
  • COMPOSER-622 – Value and type fields of a new property in a new custom type have a weird behaviour
  • COMPOSER-746 – Getting an undetailed “error” message alongside a success message when importing the attached blueprint
  • COMPOSER-752 – When importing a BP and giving it a name of an existing BP, getting an uninformative error message
  • COMPOSER-754 – Can’t choose a group after it was created (so I can’t delete/edit it)
  • COMPOSER-781 – Can’t remove “types.yaml” from imports
  • COMPOSER-796 – When trying to change a name of a resources folder the second time, the screen gets stuck in “processing” mode
  • COMPOSER-805 – Composer fails to load if there is a ‘stuck’ user in session
  • COMPOSER-809 – Blueprint deletion weird behavior
  • COMPOSER-816 – Blueprint description is not being saved.
  • COMPOSER-821 – After I remove the types.yaml file from import, it can’t be added again
  • COMPOSER-860 – Error while trying to delete blueprint.
  • COMPOSER-865 – Can’t connect Router and Load Balancer component to any other components.
  • COMPOSER-868 – Composer automatically creates a “relationship” section
  • COMPOSER-889 – Wrong zip name when downloading a blueprint
  • COMPOSER-891 – DSL parser is not updated
  • CFY-7485 Re-installing after unsuccessful bootstrap install, fails to clean postgresql database
  • CFY-7461 – Invalid certificate error with any CFY CLI command
  • CFY-7457 – Unable to delete tenants and user groups with specific names
  • CFY-7445 – Global plugin restored as tenant resource
  • CFY-7444 – Can’t add logs/events filter – widget is stuck on loading
  • CFY-7439 -“cfy profile use” ignores existing REST protocol
  • CFY-7437 – In-place upgrade crashes the stage and changes the password
  • CFY-7415 – Cluster join continues polling with the wrong credentials
  • CFY-7383 – Cannot restore snapshots with riemann policies
  • CFY-7354 – Snapshot restores broken by new permissions logic
  • CFY-7332 – Can’t enable ssl inside cluster
  • CFY-7116 – Key-pairs inside secrets store doesn’t restore on snapshot
  • CFY-7095 – Restore-certificates flag failure from 3.4.2 manager snapshot to master manager
  • COMPOSER-882 – Drag Blueprint.yaml to new folder or delete it allowed on “Resources” tab
  • CFY-7536  – 3.4.2 -> 4.2 snapshot restore fails
  • CFY-7347  – Fix ruamel.yaml installation
  • CFY-7352  – ARIA plugin execution fails when there is no plugins directory
  • CFY-7353  – Logger tries to use the ctx before it was instantiated
  • CFY-7374  – ARIA based operations fail because of ruamel
  • CFY-7394  – ARIA tries to reinstall existing plugins
  • CFY-7345  – Plugin installation – errors might not be displayed
  • CFY-7337  – Expose tenants api in community
  • CFY-7365  – Fix widget names in permissions conf
  • STAGE-500No error when stage failed to initialize with okta
  • STAGE-501 Snapshot name in the snapshots widgets shouldn’t appear as a link
  • STAGE-521 – Some responses from manager REST API are not parsed properly
  • STAGE-520 Invalid placement and width of Time Filter popup
  • STAGE-516 Events Filter widget render method error
  • STAGE-517 Multi-charting broken when the same metric is selected more than once
  • STAGE-457 Allow editing pages
  • STAGE-527 Remove role column from UserApps table to support RBAC
  • COMPOSER-850 Need to show some loading indication when user changes source and the system is reloading
  • COMPOSER-757 Add blueprint description AFTER tosca_definitions_version in the source
    • CFY-7323 (Omer) – Allow user to query tenants list
    • CFY-7300 (Yariv) – create snapshot is broken
    • CFY-7169 (Yariv) – Second CLI receives an error while trying to connect to manager with ssl enable
    • CFY-7167 (Yariv) – “SSL enable” fails communication between CLI and manager image
    • CFY-7173 (Yariv) – Unable connect to bootstrapped manager after using ssl manager
    • CFY-7176 (Yariv) – CLI fails to connect to his bootstrap manager after SSL
    • STAGE-502 (Pawel) fixed deployment & blueprint long names
    • COMPOSER-815 When switching blueprints, description remains of the old one

 

 

  • CFY-7030 – Connection error to manager outside the cluster.
  • CFY-7019 – Timeout error message in CLI while uploading plugins inside HA cluster (the upload itself works).
  • CFY-6906  – CLI stays connected to the passive manager on a cluster.
  • CFY-6859 – Error with joining manager to cluster after removing the active manager from the cluster.
  • CFY-6821 – Connection error to manager outside the cluster.
  • CFY-7069 – Multi-tenant support for credentials in snapshot creation
  • CFY-7082 – Fabric version changes during bootstrap, causing CLI not to work
  • CFY-7120 – Agent installation with Fabric runner should run with sudo privileges
  • CFY-7123 – client copy of rest certificate is in the general workdir
  • CFY-7124 – Fix agent system tests
  • CFY-7109Conflict in fabric versions between CLI and cloudify-fabric-plugin
  • CFY-7078Windows cli packages are broken
  • CFY-7083Windows cli bootstrap is broken due to invalid path
  • CFY-7137Failure connecting to manager from bootstrap, after enabling ssl
  • CFY-7166Restore snapshot with certificate restore replaces the whole ssl dir
  • CFY-7080Save resource under folder in the tmp folder, and not directly under the tmp folder
  • CFY-7072 Agents upgrade is not multi tenant
  • CFY-7128When –all-tenants flag is true and one tenants has no deployments (while the others do) an exception is raised
  • CFY-7130cfy dev command doesn’t work

Known Issues

  • CFY-7571 Bootstrap fails during in-place upgrade process after manager teardown in HA cluster. WORKAROUND: on HA cluster upgrade, run a custom teardown script http://repository.cloudifysource.org/cloudify/4.2.0/ga-release/cfy_teardown_4_1_0_and_higher.sh
  • CFY-7481 – User groups cannot have system wide roles
  • CFY-7484 – Multiple Templates for the same role+tenant are allowed. In such cases, the template which will apply will be the first one on the list
  • CFY-7434 – When installing Cloudify Manager on a machine that already has the CLI installed on it and then tearing it down,  CLI will also be removed.
  • CFY-7167 – When working with manager image,  you need to manually replace the certificate as the external certificate created during bootstrap does not have the right IP.
  • CFY-7150 – sysadmin password is changed after snapshot restore to the sysadmin password in the snapshot
  • CFY-7575 – Snapshot restore from 4.1 does not copy stage config files, widgets, templates and pages
  • CFY-7506 – Composer data is not saved after upgrade
  • COMPOSER-912 When you rename a node instance that has properties that are referenced from non-string fields of other nodes, the node is not renamed
  • COMPOSER-913 When renaming a node inside group, the members are not updated and the group is not drawn
  • STAGE-547 – In the UI secret’s widget, Copying textual certificate key’s values reducts characters, and is not recommended. The best-practice is to use the CLI and attache the key files as input for the creation of the secret.