Knowledge Base Moved

X-Road Knowledge Base has permanently moved to https://nordic-institute.atlassian.net/wiki/spaces/XRDKB/overview

Release Info

Version number7.0.0
Release date30.11.2021
Supported versions
  • 7.0.0
  • 6.26.0
  • 6.25.0
Supported platforms

Central Server

  • Ubuntu 18.04 LTS
  • Ubuntu 20.04 LTS

Configuration Proxy

  • Ubuntu 18.04 LTS
  • Ubuntu 20.04 LTS

Security Server

  • Ubuntu 18.04 LTS
  • Ubuntu 20.04 LTS
  • RHEL 7
  • RHEL 8
  • Docker
Official documentationhttps://github.com/nordic-institute/X-Road/tree/master/doc
Source codehttps://github.com/nordic-institute/X-Road/tree/master
Software licenseMIT
On this page:

Changes in This Release

Summary

  • New X-Road 7 look and feel for the Security Server UI.
  • Security improvements on the Security Server:
    • Encrypt backup files (opt-in)
    • Verify integrity of backup files on restore.
    • Remove executable files from backups.

  • Improvements in Security Server message logging:
    • Encrypt message payload in message log database (opt-in)
    • Encrypt message log archives (opt-in)
    • Group message log archives by subsystem (opt-in)
    • Support for fully disabling message logging.
  • Change PIN code on the Security Server.
  • Return REST API type (OPENAPI3 / REST) and API endpoints in REST metaservice responses.
  • Run the Security Server on Java 11 by default.
  • Make Security Server more modular by enabling installation without a local Postgres server
  • Version compatibility check for version upgrades - it is no longer possible to update from an unsupported version.
  • Official Docker support added to the Security Server with the Security Server Sidecar images.
  • Other enhancements and bug fixes.

The following blog posts provide additional information about the biggest changes in X-Road 7.0.0:

The X-Road 7 migration guide is available here

Upgrade to version 7.0.0 is supported from version 6.26.0 only. In case you're running an older version, please upgrade to version 6.26.0 first, and then to version 7.0.0.

Completed Issues

Access to the X-Road Backlog and issue details requires signing up for an account. Sign up now and get access to the backlog and issue details immediately.

Issue IDTypeSummary

XRDDEV-333

Improvement

Update the timestamping service URL automatically on the Security Server when the URL is updated on the Central Server.

The feature is disabled by default. To enable it, add the following configuration to /etc/xroad/conf.d/local.ini

[proxy-ui-api]
auto-update-timestamp-service-url=true

When the timestamping URL is updated by the Security Server there is an info level log entry in the following file: /var/log/xroad/proxy_ui_api.log

When there are multiple timestamping services with the same name and the URL and one of those is updated on the Central Server, the Security Server does not perform the update because it's not able to distinguish between the services. Instead it adds a warning level log entry.

XRDDEV-427ImprovementAdd "x-forwarded-for" HTTP header to the Security Server proxy access log ("/var/log/xroad/clientproxy_access.log"). If a client information system connects to the Security Server through a proxy, the header contains the original IP address of the client.

XRDDEV-541

Improvement

Diagnostics now correctly reports if it is unable to verify the OCSP response due to an application level problem, e.g., invalid OCSP responder certificate.

If the response verification fails and other responders are available, those will be also tried.

If there are configuration changes affecting available OCSP responders, obsolete OCSP responders will be removed from the diagnostics view. Previously that required restarting signer.

Fixes a vulnerability that caused the OCSP responder certificate not being verified properly. Before the fix, it wasn't verified that the OCSP responder certificate was signed by the CA that issued the certificate.

XRDDEV-542

Improvement

Diagnostics now correctly reports if it is unable to verify the timestamp returned by a TSA due to an application level problem, e.g., invalid TSA certificate. Previously a successful simple connection check masked all application level errors.

TSA diagnostics now shows both connection and application level failures from batch timestamping attempts.

XRDDEV-964

ImprovementInvalidate the internal key cache in the Security Server immediately when the internal TLS key or certificate changes instead of waiting for the cache to expire. In this way, the changes become effective immediately.

XRDDEV-1092

New

Add support to install the Security Server and Central Server without a local PostgreSQL server. If a remote database is used, it's not necessary to install a local PostgreSQL server.

Installing with a local database works like before - installing xroad-securityserver and xroad-centralserver packages install a local PostgreSQL server.

Installing the local PostgreSQL server can be skipped by explicitly installing the xroad-database-remote package, e.g.:

apt/yum install xroad-database-remote xroad-securityserver

The relevant documentation is available here:

XRDDEV-1184

NewAdd support to the Security Server management API to allow changing the software token pin code.

XRDDEV-1225

NewAdd support to the signer console to allow changing the software token pin code.

XRDDEV-1226

NewAdd support to the Security Server UI to allow changing the software token pin code.

XRDDEV-1295

Improvement

Clarify the error messages that are returned when the TLS handshake between two Security Servers fails and when the connection between the provider Security Server and a service fails due to a certificate error. Before, the same error message was returned in both cases. After the change, different error messages are returned.

XRDDEV-1351ImprovementImprove permission handling in the new Security Server UI to make it more resilient to issues.
XRDDEV-1397NewCreate a shared UI library for the Security Server and new Central Server.

XRDDEV-1450

NewImplement the new X-Road 7 look and feel in the Security Server UI.

XRDDEV-1461

FixFix a bug in the Security Server management API that caused inconsistencies in how certificate-related permissions were handled.
XRDDEV-1468FixRemove the "Please enter soft token PIN" link from global alerts in the Security Server UI if the user does not have the required permission to carry out the action.
XRDDEV-1469FixFix the Security Server UI keys and certificates filtering to include both the friendly name and ID so that both of them can be used for filtering.
XRDDEV-1470FixFix the Security Server UI Add Services dialog in the Service Clients wizard so that long lists of services don't hide the dialog action buttons.
XRDDEV-1471ImprovementVarious small improvements to the Security Server UI code so that it follows best practices.
XRDDEV-1477Improvement

Improve the usability of Security Server UI's Local Group Add Members dialog and Service Access Rights dialog.

XRDDEV-1507

New

Add a check that prevents version upgrades from an unsupported X-Road version.

X-Road’s current lifecycle policy is to support the latest version plus two previous versions. The supported versions are defined on MAJOR.MINOR level so the release of patch versions (MAJOR.MINOR.PATCH) does not effect on the support. Also, version upgrades are supported and tested between the supported versions. However, with X-Road 7.0.0, there's one exception – upgrade to version 7.0.0 is supported from version 6.26.0 only. If you're running an older version of X-Road, upgrade to version 6.26.0 is required first before upgrading to version 7.0.0.

XRDDEV-1525

ImprovementImprove the Security Server UI keys and certificates table to provide better visual feedback about different key and certificate statuses.

XRDDEV-1544

ImprovementImprove the way message log records are updated in the database to better handle cases where multiple nodes might be trying to update the same records, e.g., a Security Server cluster with an external load balancer uses a shared message log database between the nodes.

XRDDEV-1549

ImprovementImprove the way the Security Server handles control characters in identifiers so that they don't cause issues on the frontend or management API level.

XRDDEV-1551

FixFix a bug in the Security Server UI certificate details page where updating the page caused some information to be missing from the UI.
XRDDEV-1559Improvement

Improve the Add Client wizard on the Security Server. Enable sending a client registration request only if the client to be registered has valid sign certificate with a good OCSP response.

XRDDEV-1569

ImprovementAdd Java version information to the Security Server UI diagnostics page.

XRDDEV-1581

Improvement

Make the OpenAPI description of the Security Server management REST API available on the Security Server.

The API description is now available on the Security Server at: "https://<hostname/ip>:4000/api/v1/openapi.yaml"

XRDDEV-1590

FixFix an issue in the Central Server UI that caused the System Settings view to break when the member owning the management services Security Server was deleted.

XRDDEV-1597

Improvement

Improve the "getOpenAPI" metaservice so that the host part is removed from the server URL when an OpenAPI description is returned. After the change, the behavior is consistent with the "getWsdl" metaservice for SOAP services.

This changes the current behaviour of the metaservice for getting the OpenAPI descriptor in the following way when handling the "server.url" parameters inside the description:

  • If the URL contains parameter(s), nothing is removed and the URL is returned as-is
  • Otherwise the protocol and host are removed from the URL and only the path is returned

For example:

  • https://service/v1 → /v1
  • https://service/v1/entities/entity → /v1/entities/entity
  • https://service/v1/entities/entity/{:entityId} → https://service/v1/entities/entity/{:entityId}

XRDDEV-1604

NewUpdate the Security Server to run on JAVA 11 by default.

XRDDEV-1605

New

Add support to encrypt Security Server backups.

The feature is opt-in and is disabled by default.

Details on how to configure and enable backup encryption can be found in the Security Server user manual:

XRDDEV-1610

FixFix the Security Server UI diagnostics view timestamping service column name to be "Previous update" instead of "Next update" to correctly label the data.

XRDDEV-1611

New

Add integrity verification of Security Server backup files on restore.

XRDDEV-1612

New

Remove executable files from the Central Server and Security Server backups. The change requires manual migration if local configuration overrides have been defined in ""/etc/xroad/services/local.conf".

The X-Road 7 migration guide is available here

This changes the current backup and restore mechanism in a considerable way so please review your usage to make sure you update your settings to work with the new restrictions.

  • Executable files from "/etc/xroad/services/*.conf" are no longer backed up.
  • For local configuration changes, properties can be set in "/etc/xroad/services/local.properties" file.
    • Only a fixed set of environment variables can be changed, others are ignored (see the local.properties file for supported values).
  • The old "/etc/xroad/services/local.conf" file is still usable but please note that this file is no longer included in the backups.
  • Permissions for all the restored files are set to safe constant values during restore (permissions in the backup are ignored).
  • For the Security Server database backup a custom backup format is used, this prevents execution of arbitrary commands during the restoration process.

Please note that the backups are incompatible between X-Road 6 and X-Road 7.

XRDDEV-1626Improvement

Add a basic certificate profile that doesn't contain a hard-coded country code and therefore, is not connected to any specific country. The basic profile can be used to get started with X-Road. The profile can be used by setting the below CertificateProfileInfo value on the Central Server.

CertificateProfileInfo value
ee.ria.xroad.common.certificateprofile.impl.BasicCertificateProfileInfoProvider

XRDDEV-1629

FixFix a XSS vulnerability in the Central Server UI system settings view, where users could add executable Javascript code into the description of a member class, which would be executed on page load.

XRDDEV-1634

ImprovementIncrease the maximum width of the Security Server UI views to better use the available screen space.

XRDDEV-1639

ImprovementOverhaul the Security Server UI keys and certificates view to provide a better user experience.

XRDDEV-1648

New

Add support to group message log archives by member or subsystem.

Grouping is opt-in and is not enabled by default.

  • The property "messagelog.archive-grouping" controls the grouping and can have one of the following values: none, member, subsystem
  • The archive files, depending on the setting, use the following naming pattern: mlog[CLASS-MEMBER[-SUBSYSTEM]]-<starttime>-<endtime>-<random>.zip
  • Even with the property set to "none", the records are sorted by member/subsystem, but the archive files can contain records from several members
  • According to long-term tests, setting the grouping property to none does not seem have an significant effect on the archiving speed, however, there is an additional index that takes some space, and the query fetching the records from database is slower than previously

More information about the message log configuration can be found in the Security Server user manual:

XRDDEV-1653

ImprovementImprove the page not found error page design in the Security Server UI.

XRDDEV-1659

Improvement

Improve the verification of the Security Server's internal TLS certificate when a new certificate is uploaded. After the change, the Security Server verifies that the certificate belongs to the Security Server's internal TLS key, otherwise an error message is returned.

XRDDEV-1661

ImprovementRestart the relevant Security Server services after a country-specific metapackage install so that the configuration overrides are picked up automatically without a manual restart.

XRDDEV-1664

New

Move the message log archiving to a separate process to improve the fault tolerance of the Security Server.

This change introduces a new X-Road java process (systemd unit: xroad-addon-messagelog.service) that logs to "/var/log/xroad/messagelog-archiver.log".

RHEL only: After upgrading, it is necessary to manually start the archiver service with:

systemctl start xroad-addon-messagelog

XRDDEV-1667

Fix

Fix the profile of the SSL certificate used by the Security Server UI and management API so that curl is able to validate the certificate.

XRDDEV-1670

New

Change X-Road specific configuration properties to start with the prefix "XROAD_" on the Central Server, Security Server and Configuration Proxy. The change requires manual migration if local configuration overrides have been defined in ""/etc/xroad/services/local.conf".

The X-Road 7 migration guide is available here

More information about the configuration properties in X-Road 7 is available at:

XRDDEV-1671

NewAdd a permission denied page to the Security Server UI to give better visual feedback in case users try to visit a page their role does not allow them to.

XRDDEV-1679

New

Add an option to install the Security Server with the message log addon disabled. When the message log addon is disabled, no messages are logged and no timestamping service is needed.

XRDDEV-1691

New

Add support to encrypt message log archives files on the Security Server.

This feature is opt-in and is disabled by default.

More information on how to configure the feature is available in the Security Server user manual:

XRDDEV-1692

New

Add support to encrypt the message log database records on the Security Server.

This feature is opt-in and is disabled by default.

More information on how to configure the feature is available in the Security Server user manual:

XRDDEV-1696

Improvement

Update the message log archive file names to be deterministic. In practice, it means that given the same input (grouping, message records, previous archive linking info digest), the output (file name and contents) is the same after possible encryption is removed.

More information on the archive file names is available in the Security Server user manual:

XRDDEV-1697

ImprovementImprove OpenAPI service description checks on the Security Server to verify that the description is using a supported version. When a new REST API with OpenAPI description is added to the Security Server, the OpenAPI version of the service description is verified and an error is returned if the version number is not supported by the Security Server.

XRDDEV-1702

ImprovementAdd content security policy headers to the web interfaces for the Security Server and Central Server to improve security.

XRDDEV-1704

Improvement

Remove references to BDR plugin version 1 for PostgreSQL by 2ndQuadrant from the Central Server scripts so that other BDR versions can be used. Before the change, the Central Server installation scripts contained hard-coded references to BDR1 that caused errors in case a later BDR version was used.

XRDDEV-1705

Improvement

Add ability to skip database restoration during a restore operation on the Central Server so that it can be done manually for 3rd party database replication and high availability solutions (e.g. BDR3).

This can be done only using the command-line to initiate the restoration.

More information can be found in the Central Server user manual:

XRDDEV-1706

Improvement

Add the ability to skip running database migrations when installing or upgrading the Central Server to support 3rd party database replication and high availability solutions (e.g. BDR3).

This feature is opt-in and by default the database migrations are ran as they were previously.

It's possible to skip the Central Server database migrations by setting "skip_migrations" to "true" in "/etc/xroad/db.properties".

For new installations of the Central Server, the installer asks the user should the migrations be skipped (defaulting to not to skip migrations). If the migrations are skipped, the X-Road services remain stopped after the installation completes.

More information about this can be found in the Central Server installation manual:

XRDDEV-1707

Improvement

Add the ability to run database migrations manually on the Central Server to support 3rd party database replication and high availability solutions (e.g. BDR3).

XRDDEV-1708

New

Add support to configure message log archive encryption keys by member as well as a general key for non-grouped members.

XRDDEV-1722

FixFix a problem with message log ASiC containers containing REST messages that prevented opening the containers using DigiDoc 4.

XRDDEV-1725

ImprovementUpdate the OpenAPI generator used for code generation in the development process from version 4.x to 5.x.
XRDDEV-1771Improvement

Update the Signed Document Download Service to return encrypted documents when message log archive encryption is enabled.

More information is available in the Signed Document Download Service user manual:

XRDDEV-1789ImprovementAdd a static warning to the Security Server UI about backward incompatible changes in backups and local configuration overrides. The warning is shown in the Backup and restore view in the Security Server UI.
XRDDEV-1843FixFix a problem with the Security Server health check API that caused the API to report everything working OK when serverconf database wasn't available. After the fix, the health check API reports the error when serverconf database isn't available.
XRDDEV-1855FixFix an XML External Entity (XXE) vulnerability on the Security Server. The vulnerability was related to adding a new WSDL to the Security Server and it could be triggered by an authenticated Security Server administrator with permissions to manage services.

Issue types: fix (bug fix or technical debt), improvement (improvement to an existing feature), new (a new feature).

New/Updated Dependencies

DependencyOld VersionNew VersionNotes
spring-boot2.3.83.5.5
akka2.13:2.6.122.13:2.6.16
metrics4.1.174.1.26
jetty9.4.36.v202101149.4.44.v20210927
jaxb2.3.32.3.5
hibernate5.4.28.Final5.4.32.Final
jackson2.11.42.12.5
postgresql(driver)42.2.1842.2.24
spring-cloudHoxton.SR102020.0.4
commons-compression1.201.21
bucket4j-core4.10.06.3.0
xmlsec2.2.12.2.3
bcpkix-jdk15on1.661.69
commons-lang33.113.12.0
commons-io2.8.02.11.0
jcl-over-slf4j1.7.301.7.32
apache-mime4j-core0.8.30.8.6
saaj-impl1.5.21.5.3
gson2.8.62.8.7
guava29.0-jre31.0.1-jer
cfx-tools-validator3.4.23.4.5
core-js3.6.53.18.0
vee-validate3.4.113.4.13
vue2.6.122.6.14
vue-i18n8.22.08.26.0
vue-router3.4.33.5.1
vuetify2.3.102.4.8
vuex3.5.13.6.2

Contributors

The following developers have contributed to the development of this release version. A contribution means at least one Git commit that is included in the release. The full list of contributors of different X-Road® versions is available here.

Other Notes

Package Repositories

RepositoryURL
Bionic
deb https://artifactory.niis.org/xroad-release-deb bionic-<version> main
Focal
deb https://artifactory.niis.org/xroad-release-deb focal-<version> main
RPM / RHEL7
https://artifactory.niis.org/xroad-release-rpm/rhel/7/<version>
RPM / RHEL8
https://artifactory.niis.org/xroad-release-rpm/rhel/8/<version>
Dockerhttps://hub.docker.com/r/niis/xroad-security-server-sidecar

Repository Sign Key Details

Download URLhttps://artifactory.niis.org/api/gpg/key/public
Hash935CC5E7FA5397B171749F80D6E3973B
FingerprintA01B FE41 B9D8 EAF4 872F A3F1 FB0D 532C 10F6 EC5B
3rd party key serverUbuntu key server

Packages

Ubuntu Bionic

Package

SHA256 checksum

xroad-addon-hwtokens_7.0.0-1.ubuntu18.04_all.deb

b0d76a98bdc8e6fc28b6cd1d96d6af721e4f94c60a3bdf9e9c0a61ee11f4d4fa

xroad-addon-messagelog_7.0.0-1.ubuntu18.04_all.deb

80cf52c3a6a4c3d8b151b566e86210e2dc035bd2cb0241f4d24fe0f68b606594

xroad-addon-metaservices_7.0.0-1.ubuntu18.04_all.deb

b6e497a4144af0bcd0cf8ead72711c3714cde6d89f4c9679cc8f8cb72c0322a0

xroad-addon-opmonitoring_7.0.0-1.ubuntu18.04_all.deb

5c3523fe7d37f6a6016ea009a3e6214e8c8d5571676e91996db3fc30bdd80fda

xroad-addon-proxymonitor_7.0.0-1.ubuntu18.04_all.deb

27c693d7055db410c5869b99c50c02dd62d8d800a17d6fa32262247056484094

xroad-addon-wsdlvalidator_7.0.0-1.ubuntu18.04_all.deb

7c28f7d212320d0a8c110f98c591e1f28321c3fef66aa779c69aa01d74f098cd

xroad-autologin_7.0.0-1.ubuntu18.04_all.deb

752c980766b636b44ed30b7d321747991c2683e045d0947d7f77cb8c56ec194c

xroad-base_7.0.0-1.ubuntu18.04_amd64.deb

387261ec3c4d2ca2f6b2146da8d18e880ed121bade2c8bcc25c25b725666a7e2

xroad-center_7.0.0-1.ubuntu18.04_all.deb

ad9143ce146afee0e4621363e14e5c693bd7d9d44183c23d0a8e190e49ca1547

xroad-centralserver_7.0.0-1.ubuntu18.04_all.deb

cc2d213543833b98149e74bea41c99c035137c170badeac27579673ffb17a56f

xroad-centralserver-monitoring_7.0.0-1.ubuntu18.04_all.deb

2f46ac622a60732007abaced4365c27aa0d07d67449eb28f065d3c3981b9233f

xroad-confclient_7.0.0-1.ubuntu18.04_amd64.deb

8f8483f45d29ff89c8a0b5aa311c6b2e31e643ee1c765215becf9212258e182d

xroad-confproxy_7.0.0-1.ubuntu18.04_all.deb

a09b308b367c4a0640a6874c7fbc718e4fab8545222b616d94fe1127328260c8

xroad-database-local_7.0.0-1.ubuntu18.04_all.deb

d3839b08959be117a314c095c3ef49182e81ce20b2b1ee1a6a62ec4ce636aa99

xroad-database-remote_7.0.0-1.ubuntu18.04_all.deb

bb353235b058e97ca4ecd3c56fa0f5df1f6a23c63dd47cee585a9a1e8f68a90e

xroad-jetty9_7.0.0-1.ubuntu18.04_all.deb

ba329878b22afc6471f6cd5ba97b66b8f099eaf009986afa20610135124ee8b7

xroad-monitor_7.0.0-1.ubuntu18.04_all.deb

40084095dc2999bf1f201e8153a392b245d3174038f0de9188e3a2ccb3f17cb7

xroad-nginx_7.0.0-1.ubuntu18.04_amd64.deb

2c2edcecb5f2c1009aaae85075f6bf31a4b8f6e2af33a43e8bfa38d7bb121075

xroad-opmonitor_7.0.0-1.ubuntu18.04_all.deb

f2882f727faea43e599541b77309b9a02f1802ff687553ccff342e8dc75ac01e

xroad-proxy_7.0.0-1.ubuntu18.04_all.deb

e1d3020912e4dd3f0eaa08e014dd7026099f49c6855d3ddf6ad62ad95b5d2360

xroad-proxy-ui-api_7.0.0-1.ubuntu18.04_all.deb

b37b91f3879cb9caeb2a9b9cf66e5574fce99d31e947fe21689f0dc271f05210

xroad-securityserver_7.0.0-1.ubuntu18.04_all.deb

e6788662b550d903acf32d0fc4dce4db77a620f5c20fbee66363282212a134f3

xroad-securityserver-ee_7.0.0-1.ubuntu18.04_all.deb

5b3255691a9922241ffcd540ebf33c139b560871c8fe3e741e0adb06b3afb320

xroad-securityserver-fi_7.0.0-1.ubuntu18.04_all.deb

aa0c885012b961cb52c7682cdc73eb95384066f782651aecaf27a5d0026a1589

xroad-securityserver-fo_7.0.0-1.ubuntu18.04_all.deb

aee43e6e7a8fbadc876125be046025db484fed4172b12797ecc74dae0b012767

xroad-securityserver-is_7.0.0-1.ubuntu18.04_all.deb

fea9e81bcb09e9045478713e635d66d9222e141494a6dadb078eb304328df2f1

xroad-signer_7.0.0-1.ubuntu18.04_amd64.deb

85fba8a56b899e5ee20a44b1ee483ae38fb8e1e21abe3aaddba4d5afefc51562


Ubuntu Focal

Package

SHA256 checksum

xroad-addon-hwtokens_7.0.0-1.ubuntu20.04_all.deb

c1b024cf2b13e358b8855d0f9a27a24c5ac7fee02eec7c5d650f3dec084bb080

xroad-addon-messagelog_7.0.0-1.ubuntu20.04_all.deb

ed581b03fb6bdf64877ddfea26b532532fe1e70ebde98c32be21df6078e59a86

xroad-addon-metaservices_7.0.0-1.ubuntu20.04_all.deb

ba88de836ac183c1c5ab6bde8984086fce57e5500af5ba000e17ec4a2535975c

xroad-addon-opmonitoring_7.0.0-1.ubuntu20.04_all.deb

10a1c5877ea9c6a8111dc280bdc4817aee7c03502cdba4031cebf5bf0d9e4cbc

xroad-addon-proxymonitor_7.0.0-1.ubuntu20.04_all.deb

5b19e16c2b11d089b913b5e007237b3805a6b409d58fee9a0ac453d65d577325

xroad-addon-wsdlvalidator_7.0.0-1.ubuntu20.04_all.deb

047104a77ec988402cb4acfabd7098831f05aef934a1fcd56047343da1ee910f

xroad-autologin_7.0.0-1.ubuntu20.04_all.deb

4616ee11239ba802fbd36e50f48edff75e1eeb883623c25e9e5e8c66cbcd4592

xroad-base_7.0.0-1.ubuntu20.04_amd64.deb

eac7cce9e4f009d5eefb6f346f7cfda88e916129fb424f4d73edb758a45bea1c

xroad-center_7.0.0-1.ubuntu20.04_all.deb

eaba0b84e703fb18461807eb78cc3ca1ad8ee43ab2075c85b6e96d2548b2f96a

xroad-centralserver_7.0.0-1.ubuntu20.04_all.deb

8ad68be5c191d5dfad421b43a8c91be4dd9b9867d79ff2f47d638e6fe2200da9

xroad-centralserver-monitoring_7.0.0-1.ubuntu20.04_all.deb

9b496883436cf93e4184c63d6ccf2c5ec75a5957f9fc399cd967df7134965b05

xroad-confclient_7.0.0-1.ubuntu20.04_amd64.deb

75d9c562c1634fd1cd14bdf7db47421b2e2ff8d1acec10db7b4ed7eb231f08fb

xroad-confproxy_7.0.0-1.ubuntu20.04_all.deb

bf174c5047bef46ad2064ca5d071ba3a3bd6e5c11615c61ea60958b8946f034f

xroad-database-local_7.0.0-1.ubuntu20.04_all.deb

bb9bd95215b3816ced59cfbba21f31d23c4a9e7c1992709681c2356816ccfef4

xroad-database-remote_7.0.0-1.ubuntu20.04_all.deb

be88d37760c7e537088c179fa936aa7ae7caf5c6a3d2bdb82b5ebcfb73fac968

xroad-jetty9_7.0.0-1.ubuntu20.04_all.deb

60340b2c3b0b9237cd1cb6ab16982bcf1b822e04430f28d1652d999d4ad71202

xroad-monitor_7.0.0-1.ubuntu20.04_all.deb

26f2d10d97c1e167987b1ad9235e0c0a37310b00535735c259d74e64263ca6a0

xroad-nginx_7.0.0-1.ubuntu20.04_amd64.deb

caef71f98a9ecb6ecb30f07b7c35a5c5e18b472c36ef7c3e684562b34c121a37

xroad-opmonitor_7.0.0-1.ubuntu20.04_all.deb

6afddcd6c01321632bfedd5d36798c26cb543aec2571eda8a6af23b0e72a821c

xroad-proxy_7.0.0-1.ubuntu20.04_all.deb

d5c7172962316cb3da553dbd345e56163383b12189f1fffc9a76a43b03d82724

xroad-proxy-ui-api_7.0.0-1.ubuntu20.04_all.deb

13a05ea4c51ffd2a7a7511a2a6d72849b61fbca84e736004bc01b9e3b6044cf5

xroad-securityserver_7.0.0-1.ubuntu20.04_all.deb

6fd39b5aab2deb4d3182a17fb722eadc4bd5498ed6f94a56d1ce8b712c181471

xroad-securityserver-fi_7.0.0-1.ubuntu20.04_all.deb

58698a207830896310aa8d470f8495e55a597b5371953ee0efff0c857574618d

xroad-securityserver-ee_7.0.0-1.ubuntu20.04_all.deb

b5f7499fcc2bf4e81754aec7cff032cc0962ee9d4253e6ba0ca6df8b3d8746ab

xroad-securityserver-fo_7.0.0-1.ubuntu20.04_all.deb

0d840e159efce1d62e9b4476616b874945d0058782af106d5e6d66ab4f6d812d

xroad-securityserver-is_7.0.0-1.ubuntu20.04_all.deb

8c7dbff9c173bd31e93bb32e012a50ac891f815a8b0ea395e5003601bcd4fbab

xroad-signer_7.0.0-1.ubuntu20.04_amd64.deb

beb0a021dddf1571b2035cbcd029ea6ffdc694a70707d2cdd72cfd89f429f3f9


RPM / RHEL7

Package

SHA256 checksum

xroad-addon-messagelog-7.0.0-1.el7.x86_64.rpm

bac3a541867205152828891a16f0818fc7eb95d03dbca9f8572509d3c7f653f7

xroad-addon-metaservices-7.0.0-1.el7.x86_64.rpm

616c510cfeedf81f96aef1e587be99991a29c62f75d26bce0c10b50d716eca2d

xroad-addon-opmonitoring-7.0.0-1.el7.x86_64.rpm

270855572a81669f0ff52ba5bf0d30746220b7a12dfc187eeee9dbd086f4b58f

xroad-addon-proxymonitor-7.0.0-1.el7.x86_64.rpm

a29ee0298291363d4d1fc304ebd47572b80ab565f3eea609d355e5ee2c175281

xroad-addon-wsdlvalidator-7.0.0-1.el7.x86_64.rpm

5850e95bfa54895464eb93d6bb3ac1c394972dd82ce9b4df4bb733e3ea26104b

xroad-autologin-7.0.0-1.el7.noarch.rpm

4d5e0f69e59d7826d2c6559306afb3467c0e64d74ca27e3283b145e03c92a58d

xroad-base-7.0.0-1.el7.x86_64.rpm

e752d25a7e10b858fcbcc6c5985a5fd11e32d3f28227247e74e774f66f389279

xroad-confclient-7.0.0-1.el7.x86_64.rpm

9a5f242fdc6337f5f0b6c9ce987db02d54537645bb0124c1661cc75838ad9caf

xroad-database-local-7.0.0-1.el7.noarch.rpm

9cde95d7f5478dbab05d6eed0654d619df0eb8da3a30f9f74b66bcb0d7b53d81

xroad-database-remote-7.0.0-1.el7.noarch.rpm

34f109a3d30d1e925fe53c67120a8d8cff8dd7c43d78e5c4beb7212163150f28

xroad-monitor-7.0.0-1.el7.x86_64.rpm

17414738aecb3a3c333b9aab8220bc0a6d1070ee6080529e6b39641519682fe5

xroad-nginx-7.0.0-1.el7.x86_64.rpm

fea7d89e4f3ac5605628fb97d6e36a9ff1ee9c83105447523cba538b5655613b

xroad-opmonitor-7.0.0-1.el7.x86_64.rpm

bede9a9ee675b6c1533c113e4417caff056cbc0a24c5bd799c7cca57faa8a381

xroad-proxy-7.0.0-1.el7.x86_64.rpm

227c2a995c3167456f8dd52c98f4fb4306d93c680b98cba054b39b2563ce32e0

xroad-proxy-ui-api-7.0.0-1.el7.x86_64.rpm

3ce25718844e800472377f2b8f9f74f85b6f0e92132907302a8c2993d56a185f

xroad-securityserver-7.0.0-1.el7.noarch.rpm

d67bf6520f31ffdbf95422632a02885e4babb8b4a20970fbfe8a82e9d4a2d79a

xroad-securityserver-fi-7.0.0-1.el7.noarch.rpm

943ec8a2d29a28389434ae6255bff910bb009eca2e1606e9ecf7ca4cba25faf3

xroad-securityserver-fo-7.0.0-1.el7.noarch.rpm

e1bedabd27848012bc352b3885d296e9eac9246e82e9344c4d9bd93a62099e7e

xroad-securityserver-is-7.0.0-1.el7.noarch.rpm

d5de632eef3ff4088bb8e7b1a6c70c13d1423b1961173ad58c6a9b8118003da5

xroad-signer-7.0.0-1.el7.x86_64.rpm

553b18ad2d87e2767f9c9eb08c04ef75b81b9638b11f64f3f1e66520844cba42


RPM / RHEL8

Package

SHA256 checksum

xroad-addon-messagelog-7.0.0-1.el8.x86_64.rpm

d4dd8ec5a08d1e33133e9760cfe30255524140d078478909a7e469835009fa67

xroad-addon-metaservices-7.0.0-1.el8.x86_64.rpm

c68957dd2c0a2be02010c4922a0b3c324f139264433e861eb7ac2cafe1b436ec

xroad-addon-opmonitoring-7.0.0-1.el8.x86_64.rpm

9f6698f2f841bd071a9e6b52a0d9b41cc07d06691e75c4b9590521f3525d237a

xroad-addon-proxymonitor-7.0.0-1.el8.x86_64.rpm

96b08b5ab1ed3c4367260a5175eb1f09547c00e06b47d41401241471280edf15

xroad-addon-wsdlvalidator-7.0.0-1.el8.x86_64.rpm

1e35397f13b0e7839c9b71c56a7983749b2206f76c338ddaeba8fd471c8f1501

xroad-autologin-7.0.0-1.el8.noarch.rpm

70d83d8e0249bd39b38760b543f9c75452a02a9ae2ea31ade57bcf7c3f69e835

xroad-base-7.0.0-1.el8.x86_64.rpm

bb2766fb0ddf465ff8f2d83632d39a77bb300a9a0005d6f2b433b1926f73eb8e

xroad-confclient-7.0.0-1.el8.x86_64.rpm

abb7065e3bdc9134554a08ebc3101655e1dccacfb614821c55e356e4de145a37

xroad-database-local-7.0.0-1.el8.noarch.rpm

5f9fa0061dd0ca9b0073ccdca9066926545b59c90f5f49e30c5e1b10a2672461

xroad-database-remote-7.0.0-1.el8.noarch.rpm

b4884c0a3a42ec316430149bc73a3137910b317d83991c0e5f206dd7b811c0ca

xroad-monitor-7.0.0-1.el8.x86_64.rpm

ea097bb9567f97492cd3cd8bbe41665d911d601035a6f4b6f40112b464641069

xroad-nginx-7.0.0-1.el8.x86_64.rpm

46a6cd957e90ebab7bb3f518aafc689cf421ac29dfac7f55d9fb02f8f40cff7a

xroad-opmonitor-7.0.0-1.el8.x86_64.rpm

24c5bded52f6460ef6d3711530d903c2c0f83bc0220535c01876d08a971eb1b4

xroad-proxy-7.0.0-1.el8.x86_64.rpm

11f111cd9ae956ba3f310d216a7bc713a044e83f7e58ae792adadff469016109

xroad-proxy-ui-api-7.0.0-1.el8.x86_64.rpm

f061ef75c84aee88201a4b104d0a377599141f8610792abb3f1f51184c554dd4

xroad-securityserver-7.0.0-1.el8.noarch.rpm

bc60992149df70e9a1c7a2d8950f6c5310f90663f2aef28cd446199c745dc287

xroad-securityserver-fi-7.0.0-1.el8.noarch.rpm

074296507100cab4f214f8bda1719d6d7877a680e6eaec7b6044f11d67373e22

xroad-securityserver-fo-7.0.0-1.el8.noarch.rpm

97efa0c4d6e243b0aa9629723ce404f846c8d76fe496c374861000dd9643fa20

xroad-securityserver-is-7.0.0-1.el8.noarch.rpm

a82f3524a64cab7f44a927cc7e82e9a8b33241529bed33d6c3133f695913daf2

xroad-signer-7.0.0-1.el8.x86_64.rpm

a0ea947fc62fcfc41e821dc28b0b626f2675dfff150f79162d1132cdd06941bf