LATEST VERSION: 4.2.1 - RELEASE NOTES
Concourse for PCF v4.x

Concourse Release Notes

Page last updated:

v4.2.2

Release Date: December 12, 2018

Security Fix

This release contains the following security fix:

  • An issue related to authentication. This issue is present in Concourse for PCF v4.x.

v4.2.1

Release Date: October 5, 2018

Concourse v4.2.1 introduces the concept of user-based team authentication.

Previously, Concourse required you to log in under a specific team without an association to a user. In this version of Concourse, users can authenticate into teams as specific users. Users can be added to a team by configuring the team’s whitelist as described in Configuring Team Authentication.

Breaking Changes

This release has the following breaking changes:

Installation

  • The BOSH deployment for Concourse v4.0.0 requires manifest changes. For examples, see the operations folder in the Concourse BOSH deployment GitHub repository.

  • The concourse/bosh-deployment-resource has been deprecated and removed from this release. Please use the updated cloudfoundry/bosh-deployment-resource instead.

  • If you are currently on v3.6.0 and are looking to upgrade to v4.2.1, you must first upgrade to one of the following Concourse versions before upgrading to 4.2.1:

    • v3.8.0
    • v3.9.2
    • v3.13.0

    This is because v4.2.1 requires a code change for migration that is available in v3.8 and later.

Teams

  • If you have multiple teams configured with the same basic auth username, the migration will fail. This is because “basic auth” is now gone and in its place is local user configuration. Logging in with basic auth is now actually logging in as the configured user, so there cannot be multiple.

  • There is no support for configuring the same provider multiple times, for example, multiple GitHub Enterprise instances. The migration will fail when trying to upgrade an instance with teams having different configurations for the same provider. The workaround to this limitation is to deploy multiple Concourse instances.

  • BitBucket auth is no longer supported because the underlying authentication library does not support it. However, Concourse v4.0.0 supports GitHub, generic LDAP, oAuth, and OIDC connectors.

Fly

  • The team authentication flags for fly set-team have been split between set-team and concourse’s web module. For the specific changes, see Configuring Team Authentication. For further examples, see the operations folder in the Concourse BOSH deployment GitHub repository.

  • fly sync may not be able to update a v3.x version of fly to v4.0.0 due to the new auth mechanisms. The workaround is to download and install the latest v4.0.0 fly CLI binary.

Features

New features and changes in this release:

Fly

  • The fly teams command only lists teams of which you are a member (or all teams, if you’re a member of the admin team main).
  • fly teams has a new flag -d/--details that displays each team’s auth configuration.
  • The fly execute command with -j will now use the job’s pipeline’s resource_types.
  • fly login can now be invoked with -b to auto-launch a browser to do the oAuth dance.
  • fly now supports --json on most commands to dump info in JSON format, rather than the human-friendly table format.
  • fly validate-pipeline can now be instructed to print the interpolated pipeline config using the --output flag.
  • Users can now force an immediate check of a resource type using fly check-resource-type.

Resources

  • git-resource
    • Now has git-crypt v0.6.0
      • Resources can be pinned across the pipeline as part of the pipeline config by specifying version on the resource definition in the pipeline.
      • This is similar to setting version. on every get step that references the resource.
    • Now supports two new parameters:
      • submodule_recursive: false, to disable the default recursive fetching
      • submodule_remote: true, to fetch submodules with --remote
    • Now emits a short SHA to .git/short_ref, which can be useful for dynamic tagging.
    • Now uses the latest version of the Git Large File Storage (Git LFS) extension.
    • Now supports shallow clones by configuring depth: 1.
    • Now the webhook_token property can be interpolated using a credential manager.
  • s3-resource
    • Now supports skip_download: true in params.
    • Now supports configuring an initial version & content, which can be useful for bootstrapping state.
  • docker-image-resource
    • Now has a tag_file param which deprecates the old tag command which does the same thing. This is in the interest of clearer naming.
    • Now supports interpolating the Concourse-provided env vars in build args.
  • cf-resource
    • Now supports client credentials-based auth.

Runtime

  • The interval on which resource types are checked for new versions can now be:
    • Set globally using default_resource_type_check_interval
    • Set per-resource-type in a pipeline using check_every.
      For more information, see default_resource_type_check_interval in the BOSH documentation.
  • Task caches can now be cleared using fly clear-task-cache.
  • The ATC can now be configured to periodically emit build logs to a syslog endpoint.
    • This is configured using syslog parameters on the ATC job.
    • When enabled, build logs will be shipped off in a batch as builds complete.
  • The ATC now exposes an API endpoint for performing a health-check against the configured credential manager, at /api/v1/info/creds.
    • This propagates whatever information may be useful, depending on your credential manager backend.

      Note: This endpoint is only accessible by admin users (members of the main team).

  • General optimizations to reduce the load on the database.
    • You should see improvements in garbage collection efficiency and web UI response time.
  • Container and volume Garbage Collection is now performed in parallel across the worker cluster.
    • The ATC is still the source of truth for knowing when containers and volumes are to be removed, but is no longer responsible for performing the actual “destroy” API calls.
    • This should make large-scale Concourse deployments much more efficient, removing a ton of network and CPU overhead from the ATC.
  • Concourse workers can now be registered with the ephemeral parameter.
    • When specified, the worker will be immediately removed once it stalls.
  • The ATC will no longer fail to start if it is configured with CredHub and CredHub isn’t running. It will ll just try and reach it later instead.

Core Functionality

  • Concourse now supports user authentication into teams.
    • Supported Auth providers include: Basic Auth, GitHub Auth, CF Auth, OIDC and oAuth.
  • Concourse emits warnings in the task logs when it detects that params are declared but not configured.
  • Pipeline credentials can now be verified using a new --check-creds flag available on fly set-pipeline. This command will attempt to fetch values from the configured credential manager and let you know which values could not be interpolated.

Web UI

  • The dashboard page now has “Dashboard” in the title.
  • Concourse pipeline view now has breadcrumbs to indicate which pipeline, job, or resource you are looking at.
  • Pipeline groups navigation has been redesigned to better display lots of groups and/or long group names.
  • Dashboard searches update the URL, making it easy to bookmark and share specific dashboard views.
  • The main page (/) now shows the dashboard instead of a random pipeline configured by the first team on the instance.
  • Concourse Dashboard allows you to pause and reorder pipelines.
    • As part of this change, the sidebar has been removed from the pipeline view.
  • The dashboard will now indicate when a pipeline has a resource that is failing to check, by drawing a little orange triangle on the pipeline.
  • Build page load performance has been significantly improved.
  • The dashboard view will now indicate whether you are a member of each team, or whether you are only seeing it because it has exposed pipelines.

Metrics

  • The Prometheus metrics will now automatically prune stale workers.
  • The Prometheus metrics for pipeline scheduling are now counters instead of gauges.
  • There are now metrics emitted for periodic resource checking.
  • The Prometheus metric emitter has seen some spring cleaning.

Fixed Issues

This release fixes the following issues:

Fly

  • The fly intercept command will no longer list containers that are still being created, and are not yet interceptable. Previously, this would lead to a websocket: bad handshake error.

Resources

  • Previously, if a resource was only ever used as an explicit output of a job, it would always show up as black even if it was erroring.
    • It will now show up as orange, like the other resources.
  • The s3-resource can now be used with Dell’s EMC ECS object store.
  • Publishing draft releases with the github-release-resource will no longer error.
  • Recent versions of Docker introduced an issue where dockerd could fail to start if the worker was under load.
    • This resulted in an infinite loop in the docker-image-resource.
    • Resource are now more resilient to this—they detect a failure to start and keep resuscitating dockerd until it starts, giving up after 2 minutes.
  • docker-image-resource
    • Skips starting the Docker daemon if skip_download: true is set
    • Includes support for fetching and extracting xz packages in ADD commands
    • Fails gracefully when build_args_file cannot be parsed
    • Fails with a clearer error when your ECR credentials are incorrect

Runtime

  • Fixed handling of no_proxy in concourse worker
  • The ATC will now fail gracefully early if no session signing key is specified, rather than failing ungracefully and late.
    • In addition, one will be generated automatically if not given to concourse web.

      Warning: Do not do this forever. Users will be logged out whenever you restart the instance, and things will not work at all if you are running a cluster of many web nodes (they all need to have the same session signing key).

  • Removed an artificial limit to the garbage collector that was originally to prevent a stampede of work on a single worker.
    • Now that workers garbage-collect themselves, this was no longer necessary, and only slowed down the database side of the garbage collection lifecycle.
  • Fixed a container failure mode that occurs when check containers fail to create.
  • Tables now get cleaned up via database triggers on pipeline/team deletion
    • Previously, repeated team and pipeline creation and destruction would leave a few tables around: team_build_events_XXX and pipeline_build_events_XXX.
    • This would cause the database to increase in CPU usage over time.
    • If you see symptoms of this problem, it should be safe to manually drop the tables that have no corresponding pipeline or team.

Installation

  • The BOSH release now has properties for configuring the DataDog metrics emitter.
  • The BOSH release now respects the configured postgresql.client_cert property.

Web UI

  • Updated messaging in the UI to be less confusing
    • When viewing a build that has not been made public, it will now say you are not authorized.
      • Previously, it would tell you to log in, only to tell you to log in again, because that didn’t change anything.
  • The build number in the <title> when viewing a one-off build in your browser is now consistent with the number reflected on the page.
  • A couple situations in the UI where jobs or pipelines with spaces in their name would render incorrectly are now fixed. In general, Pivotal does not recommend whitespaces in pipeline names.
  • Fixed an “Aw, snap!” browser crash that affected some versions of Chrome when viewing the pipeline page

Core Functionality

  • Fixed a regression with the CredHub integration that caused very high CPU usage on the ATC.
    • In addition, the CredHub client has been bumped to include a crucial fix.
  • When running on Windows, we will no longer shell out to tar for performing volume streaming operations, since it seems to be pretty unreliable.
    • A native Go implementation will be used instead.
  • Fixed a potential panic in the delete worker API endpoint, which is used internally as part of the worker draining lifecycle.
  • The TSA will now respect the configured log level for worker heartbeating logs.
  • Fixed up a few API endpoints so that they correctly return Content-Type: application/json
  • Fixed a bug that caused the Vault login retry logic to go into a fast loop if retrying failed for long enough to exceed the maximum retry backoff.
  • Removed unnecessary log messages from the TSA
  • Any errors when checking for a resource’s type to have new versions will be bubbled up as resource checking errors.
    • This includes failure to fetch credentials.

Known Issues

This release has the following issues:

  • Upgrading from Concourse v3.x to v4.2.1 can result in the following JSON exception when attempting to start the web node: json: cannot unmarshal object into Go value of type []string.

    • This is caused by a failing migration during the upgrade process.
    • To recover from this error state, do the following:
      1. Access the Concourse database.
      2. Go to the teams table.
      3. Set the auth field on the main team to the empty string ''.
      4. Attempt the upgrade again. This forces the ATC component of the web node to set the main team’s auth to the parameters supplied in your manifest.
    • For more information about this issue, see Upgrading concourse from 3.10 to 4.10 results in json exception on starting web nodes #2595 in GitHub.
  • User Authentication flows against UAA with external identity providers, such as SAML, using the Concourse cf connector command cannot be completed due to a mismatch in service URLs.

View Release Notes for Another Version

To view the release notes for another product version, select the version from dropdown at the top of this page.

Create a pull request or raise an issue on the source for this page in GitHub