You're viewing Apigee Edge documentation.
Go to the
Apigee X documentation. info
On December 19, 2024, we released a new version of Apigee Edge for Private Cloud.
Update procedure
This section describes how to install this release if you are updating from the previous release of Edge for Private Cloud. If you need to update from an earlier release, see Applying Multiple Patch Versions.
Updating this release will update the components listed below:
- apigee-nginx-1.26.1-el8.x86_64.rpm
- apigee-nginx-1.26.1-el9.x86_64.rpm
- apigee-qpidd-8.0.6-0.0.2534.noarch.rpm
- apigee-sso-4.53.00-0.0.21506.noarch.rpm
- apigee-tomcat-9.0.86-0.0.948.noarch.rpm
You can check the RPM versions currently installed to see if they need to be updated by entering:
apigee-all version
To update your installation, perform the following procedure on the Edge nodes:
-
On all Edge nodes:
- Clean the Yum repositories:
sudo yum clean all
- Download the latest Edge 4.53.00
bootstrap_4.53.00.sh
file to/tmp/bootstrap_4.53.00.sh
:curl https://software.apigee.com/bootstrap_4.53.00.sh -o /tmp/bootstrap_4.53.00.sh
- Install the Edge 4.53.00
apigee-service
utility and dependencies:sudo bash /tmp/bootstrap_4.53.00.sh apigeeuser=uName apigeepassword=pWord
where uName and pWord are the username and password you received from Apigee. If you omit pWord, you will be prompted to enter it.
- Use the
source
command to execute theapigee-service.sh
script:source /etc/profile.d/apigee-service.sh
- Clean the Yum repositories:
- On all Qpid nodes, execute the
update.sh
script:/opt/apigee/apigee-setup/bin/update.sh -c qpid -f configFile
- On SSO nodes, follow the procedure detailed in the Steps for updating Apigee SSO from older versions section:
/opt/apigee/apigee-setup/bin/update.sh -c sso -f configFile
Steps for updating Apigee SSO from older versions
In Edge for Private Cloud 4.53.00, the IDP keys and certificates used in the apigee-sso
component are now configured through a keystore. You will need to export the key and certificate used earlier into a keystore, configure it, and then proceed with the SSO update as usual.
-
Identify the existing key and certificate used for configuring IDP:
-
Retrieve the certificate by looking up the value of SSO_SAML_SERVICE_PROVIDER_CERTIFICATE in the SSO installation configuration file or by querying the
apigee-sso
component for conf_login_service_provider_certificate.Use the following command on the SSO node to query
apigee-sso
for the IDP certificate path. In the output, look for the value in the last line.apigee-service apigee-sso configure -search conf_login_service_provider_certificate
-
Retrieve the key by looking up the value of SSO_SAML_SERVICE_PROVIDER_KEY in the SSO installation configuration file or by querying the
apigee-sso
component for conf_login_service_provider_key.Use the following command on the SSO node to query
apigee-sso
for the IDP key path. In the output, look for the value on the last line.apigee-service apigee-sso configure -search conf_login_service_provider_key
-
-
Export the key and certificate to a keystore:
-
Export the key and certificate to a PKCS12 keystore:
sudo openssl pkcs12 -export -clcerts -in <certificate_path> -inkey <key_path> -out <keystore_path> -name <alias>
Parameters:
certificate_path
: Path to the certificate file retrieved in Step 1.a.key_path
: Path to the private key file retrieved in Step 1.b.keystore_path
: Path to the newly created keystore containing the certificate and private key.alias
: Alias used for the key and certificate pair within the keystore.
Refer to the OpenSSL documentation for more details.
-
(Optional) Export the key and certificate from PKCS12 to a JKS keystore:
sudo keytool -importkeystore -srckeystore <PKCS12_keystore_path> -srcstoretype PKCS12 -destkeystore <destination_keystore_path> -deststoretype JKS -alias <alias>
Parameters:
PKCS12_keystore_path
: Path to the PKCS12 keystore created in Step 2.a, containing the certificate and key.destination_keystore_path
: Path to the new JKS keystore where the certificate and key will be exported.alias
: Alias used for the key and certificate pair within the JKS keystore.
Refer to the keytool documentation for more details.
-
Export the key and certificate to a PKCS12 keystore:
- Change the owner of the output keystore file to the "apigee" user:
sudo chown apigee:apigee <keystore_file>
-
Add the following properties in Apigee SSO configuration file and update them with the keystore file path, password, keystore type, and alias:
# Path to the keystore file SSO_SAML_SERVICE_PROVIDER_KEYSTORE_PATH=${APIGEE_ROOT}/apigee-sso/source/conf/keystore.jks # Keystore password SSO_SAML_SERVICE_PROVIDER_KEYSTORE_PASSWORD=Secret123 # Password for accessing the keystore # Keystore type SSO_SAML_SERVICE_PROVIDER_KEYSTORE_TYPE=JKS # Type of keystore, e.g., JKS, PKCS12 # Alias within keystore that stores the key and certificate SSO_SAML_SERVICE_PROVIDER_KEYSTORE_ALIAS=service-provider-cert
-
Update Apigee SSO software on the SSO node as usual using the following command:
/opt/apigee/apigee-setup/bin/update.sh -c sso -f /opt/silent.conf
Bug fixes
This section lists the Private Cloud bugs that were fixed in this release.
Issue ID | Description |
---|---|
379446933 | Fixed the issue preventing nginx from binding to port 443.
|
Security issues fixed
The following is a list of known security issues that have been fixed in this release. To avoid these issues, install the latest version of Edge Private Cloud.
Issue ID | Description |
---|---|
344961470 | Patched QPID management portal for an XSS vulnerability. |
Changes to supported software
No support for new software has been included in this release.
Deprecations and retirements
There are no new deprecations or retirements in this release.
New features
This section lists new features in this release.
Issue ID | Description |
---|---|
379125083 | Enabled Single Sign-On (SSO) functionality in FIPS-enabled RHEL-8 environments. |
379125495 | SSO now accepts keys and certificates for IDP in keystore format. |
Known issues
See Known issues with Edge for Private Cloud for a complete list of known issues.
Applying multiple patch versions
This section describes how to apply multiple patch versions, in case you are updating from a version of Edge for Private Cloud that is earlier than the previous patch release version.
Each patch release contains updates to specific components of Edge for Private Cloud, such as
edge-management-server
.
To apply multiple patch versions, you need to update each Edge component that was included in
a patch release later than your currently installed version. You can find these components by
looking at the Edge for Private Cloud release notes for all versions later than your current
version, and checking the list of RPMs for those releases. See
Apigee Release Notes for links to all
Edge for Private Cloud release notes.
Note: You only need to update each component once, by installing the RPM for the latest version of the component included in the patch releases. Follow the instructions in the release notes for that version to update the component.
Note: Upgrading a component automatically installs the latest patch version of a component. If you want to upgrade to a patch version that is not the latest, you need to maintain your own tarball copy of Apigee's repo using Apigee mirror, and use this mirror for Apigee installations. For more information, refer to Using a local Edge repository to maintain your Edge version.