You're viewing Apigee Edge documentation.
Go to the
Apigee X documentation. info
On the following dates, we began releasing component updates to Apigee Edge for Public Cloud:
- Management Server: Wednesday, November 4, 2020
- Management Server Patch Release: Monday, January 11, 2021
New features and updates
Following are the new features and updates in this release.
Bugs fixed
The following bugs are fixed in this release. This list is primarily for users checking to see if their support tickets have been fixed. It's not designed to provide detailed information for all users.
Issue ID | Component Name | Description |
---|---|---|
128548509 | Management Server |
The management API allows duplicate aliases Use of the |
155984372 | Management Server |
KeyStore errors are not correctly surfaced in the Edge UI The management API for uploading keys and certs now returns descriptive error messages to help with diagnosing and fixing problems. |
140799656 | Management Server |
A developer app query returns no results The management API to query apps for a given developer returned empty results for developers with a higher number of apps. This change fixes the behavior and returns the result set. |
132688399 | Management Server |
Two shared flow revisions were deployed in the same environment Shared flow deployment APIs allowed two revisions of the same shared flow under certain error conditions. This fix prevents two shared flow revisions from being deployed in the same environment. |
148577546 | Management Server |
Add validation for customer uploaded truststore cert Customer uploaded truststore certs are now validated to make sure each chain has all certs up to the root. |
67560041 | Management Server |
Revoke access token by end user ID does not seem to be effective for some end user IDs The revoke access token by end user ID API did not work as expected if there were more than 100 tokens associated with the ID. This fix handles the case of IDs with a larger number of tokens. |
112879927 | Management Server |
Self-signed certificate is corrupt The management server now generates self-signed certs in PEM format. The management API also validates that a supplied self-signed cert is in PEM format. |
152856311 | Management Server |
Adding two-way TLS with DER certificates The fix is same as #112879927 |
156453131 | Management Server |
The validation for duplicate virtual host aliases does not work as expected Checks and validations have been enhanced for duplicate virtual host aliases to cover all cases. |
158592076 | Management Server |
Add missing permissions to the default devadmin role Default role devadmin now has GET permission on /apps |
157758700 | Management Server |
Cert chain validation if present during alias creation (without root check) Cert chain validations during upload have been enhanced. The certs have to be in order and the last cert must be a root certificate or an intermediate cert signed by a root certificate. For multiple certs in a chain, the leaf certs (actual cert) need to be on the top (first), and going down optional intermediate certs and finally towards the optional root at the bottom (last). |
158970356 | Management Server |
KVM value size limit enforcement KVM value size limit is now enforced to 512 KB |
154344571 | Management Server |
Add validation for the keyalias in keystores Key aliases in a keystore are now validated. If they point to a non-existing key, the API will throw an error. |