You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
seo-title: "Updates to MCP Server and TLS/SSL Cipher Support in 26.0.0.5 Beta- OpenLiberty.io"
9
-
seo-description: This beta release updates the `mcpServer-1.0` feature and simplifies SSL cipher configuration by using the effective JDK cipher list by default and flexible `enabledCiphers` syntax.
10
-
blog_description: This beta release updates the `mcpServer-1.0` feature and simplifies SSL cipher configuration by using the effective JDK cipher list by default and flexible `enabledCiphers` syntax.
8
+
seo-title: "Updates to MCP Server and TLS/SSL Cipher Support in 26.0.0.5-beta - OpenLiberty.io"
9
+
seo-description: This beta release updates the mcpServer-1.0 feature and simplifies SSL cipher configuration by using the effective JDK cipher list by default and flexible enabledCiphers syntax.
10
+
blog_description: This beta release updates the mcpServer-1.0 feature and simplifies SSL cipher configuration by using the effective JDK cipher list by default and flexible enabledCiphers syntax.
= Updates to MCP Server and TLS/SSL Cipher Support in 26.0.0.5 Beta
14
+
= Updates to MCP Server and TLS/SSL Cipher Support in 26.0.0.5-beta
15
15
Navaneeth S Nair <https://github.com/navaneethsnair1>
16
16
:imagesdir: /
17
17
:url-prefix:
18
18
:url-about: /
19
19
//Blank line here is necessary before starting the body of the post.
20
20
21
-
This beta release updates the `mcpServer-1.0` feature and simplifies SSL cipher configuration by using the effective JDK cipher list by default and flexible `enabledCiphers` syntax.
21
+
This beta release updates the mcpServer-1.0 feature and simplifies SSL cipher configuration by using the effective JDK cipher list by default and flexible enabledCiphers syntax.
22
22
23
23
// // // // // // // //
24
24
// Change the RELEASE_SUMMARY to an introductory paragraph. This sentence is really
@@ -55,7 +55,7 @@ The link:https://modelcontextprotocol.io/docs/getting-started/intro[Model Contex
55
55
This beta release of Liberty includes important updates to the `mcpServer-1.0` feature, including configurable endpoint paths and notable bug fixes.
56
56
57
57
=== Prerequisites
58
-
To use the `mcpServer-1.0` feature, it is required to have `Java 17` or later installed on your system.
58
+
To use the `mcpServer-1.0` feature, it is required to have Java 17 or later installed on your system.
59
59
60
60
=== Configure custom MCP endpoint paths
61
61
Previously, the MCP endpoint was hard-coded to `/mcp` under the web application context root. You can now configure custom endpoint paths to better suit your application architecture and naming conventions.
@@ -78,8 +78,6 @@ For a single application, configure the endpoint path directly in the `<mcpServe
78
78
<mcpServer path="/custom-mcp"/>
79
79
</application>
80
80
81
-
<include location="../fatTestPorts.xml" />
82
-
83
81
</server>
84
82
----
85
83
@@ -153,36 +151,34 @@ This has been fixed to ensure proper isolation of encoder beans per application,
153
151
[#ssl]
154
152
== Update to TLS/SSL Cipher support
155
153
156
-
Liberty uses the effective JDK cipher list from the JDK. The `securityLevel` attribute in the SSL configuration is not used anymore. In addition, the `enabledCiphers` attribute in the SSL config is updated to customize the SSL ciphers in a more flexible way.
157
-
158
-
This change modifies the existing attribute `enabledCiphers` in the `ssl` config.
154
+
Liberty now uses the effective cipher list from the JDK for SSL configuration. The `securityLevel` attribute in the SSL configuration is not used anymore. In addition, the `enabledCiphers` attribute in the SSL config is updated to customize the SSL ciphers in a more flexible way.
159
155
160
156
Liberty's `securityLevel` based cipher categories no longer provide meaningful value. The `MEDIUM` and `LOW` categories contain no remaining ciphers.
161
157
162
158
The `enabledCiphers` attribute now has two mutually exclusive modes: (1) Specify a custom list of ciphers separated by spaces, or (2) Specify filter criteria to add (+) or remove (-) cipher suites from the effective JDK cipher list. If the value set in `enabledCiphers` contains a static entry and a +/- entry, an error is logged, and the server ignores the `enabledCiphers` value by returning the effective JDK cipher list.
163
159
164
-
*Existing Usage - A user sets `securityLevel` as `HIGH`*
160
+
*Existing Usage:* A user sets `securityLevel` as `HIGH`
165
161
166
162
[source,xml]
167
163
----
168
164
<ssl id="defaultSSL" securityLevel=HIGH/>
169
165
----
170
166
171
-
*Example with new syntax - `securityLevel` is not required and is ignored if provided*
167
+
The `securityLevel` attribute is now ignored, so the previous `<ssl>` configuration is treated equivalently to the configuration shown here where there is no `securityLevel` attribute configured.
172
168
173
169
[source,xml]
174
170
----
175
171
<ssl id="defaultSSL"/>
176
172
----
177
173
178
-
*Existing Usage - A user specifies all ciphers from the effective jdk list excluding all TLS_RSA ciphers except for one (TLS_RSA_WITH_AES_128_GCM_SHA256)*
174
+
*Existing Usage:* A user specifies all ciphers from the effective JDK list, excluding all TLS_RSA ciphers except for one (TLS_RSA_WITH_AES_128_GCM_SHA256)
seo-title: Jakarta EE 11, SpringBoot 4.0, and more in 26.0.0.5- OpenLiberty.io
9
-
seo-description: This release adds support for Jakarta EE 11 and SpringBoot 4.0, including MicroProfile 7 compatibility with Jakarta EE 11 and support for deploying SpringBoot 4.x applications in both JAR and WAR formats.
10
-
blog_description: This release adds support for Jakarta EE 11 and SpringBoot 4.0, including MicroProfile 7 compatibility with Jakarta EE 11 and support for deploying SpringBoot 4.x applications in both JAR and WAR formats.
8
+
seo-title: Jakarta EE 11, Spring Boot 4.0, and more in 26.0.0.5- OpenLiberty.io
9
+
seo-description: This release introduces official support for Jakarta EE 11, Spring Boot 4.0 applications, and updated TLS/SSL cipher handling in Open Liberty, including enhanced Spring Boot deployment support and simplified SSL cipher configuration.
10
+
blog_description: This release introduces official support for Jakarta EE 11, Spring Boot 4.0 applications, and updated TLS/SSL cipher handling in Open Liberty, including enhanced Spring Boot deployment support and simplified SSL cipher configuration.
= Jakarta EE 11, SpringBoot 4.0, and more in 26.0.0.5
14
+
= Jakarta EE 11, Spring Boot 4.0, and more in 26.0.0.5
15
15
Navaneeth S Nair <https://github.com/navaneethsnair1>
16
16
:imagesdir: /
17
17
:url-prefix:
@@ -49,7 +49,7 @@ Navaneeth S Nair <https://github.com/navaneethsnair1>
49
49
// change the "IMAGE CAPTION" to a couple words of what the image is
50
50
// // // // // // // //
51
51
52
-
This release adds support for Jakarta EE 11 and SpringBoot 4.0, including MicroProfile 7 compatibility with Jakarta EE 11 and support for deploying SpringBoot 4.x applications in both JAR and WAR formats.
52
+
This release introduces official support for Jakarta EE 11, Spring Boot 4.0 applications, and updated TLS/SSL cipher handling in Open Liberty, including enhanced Spring Boot deployment support and simplified SSL cipher configuration.
53
53
54
54
// // // // // // // //
55
55
// In the preceding section:
@@ -67,7 +67,8 @@ This release adds support for Jakarta EE 11 and SpringBoot 4.0, including MicroP
67
67
In link:{url-about}[Open Liberty] 26.0.0.5:
68
68
69
69
* <<jakarta_ee, Jakarta EE 11 Core Profile, Web Profile, and Platform>>
70
-
* <<springboot, SpringBoot 4.0>>
70
+
* <<springboot, Spring Boot 4.0>>
71
+
* <<ssl, Update to TLS/SSL Cipher support>>
71
72
* <<CVEs, Security Vulnerability (CVE) Fixes>>
72
73
* <<bugs, Notable bug fixes>>
73
74
@@ -280,10 +281,10 @@ To run Jakarta EE 11 features on the Application Client Container, add the follo
280
281
// Contact/Reviewer: anjumfatima90
281
282
// // // // // // // //
282
283
[#springboot]
283
-
== SpringBoot 4.0
284
-
Open Liberty currently supports running SpringBoot 1.5, 2.x, and 3.x applications. With the introduction of the new `springBoot-4.0` feature, users can now deploy SpringBoot 4.x applications. While Liberty has consistently supported SpringBoot applications packaged as `WAR` files, this enhancement extends support to both `JAR` and `WAR` formats for SpringBoot 4.x applications.
284
+
== Spring Boot 4.0
285
+
Open Liberty currently supports running Spring Boot 1.5, 2.x, and 3.x applications. With the introduction of the new `springBoot-4.0` feature, users can now deploy Spring Boot 4.x applications. While Liberty has consistently supported Spring Boot applications packaged as `WAR` files, this enhancement extends support to both `JAR` and `WAR` formats for Spring Boot 4.x applications.
285
286
286
-
The `springBoot-4.0` feature provides complete support for running a SpringBoot 4.x application on Open Liberty, as well as the ability to thin the application when building containerized applications.
287
+
The `springBoot-4.0` feature provides complete support for running a Spring Boot 4.x application on Open Liberty, as well as the ability to thin the application when building containerized applications.
287
288
288
289
To use this feature, users must be running `Java 17` or later with EE11 features enabled. If the application uses servlets, it must be configured to use `Servlet 6.1`. Include the following features in your `server.xml` file to configure the server.
289
290
@@ -295,17 +296,59 @@ To use this feature, users must be running `Java 17` or later with EE11 features
295
296
</features>
296
297
----
297
298
298
-
The `server.xml` configuration for deploying a SpringBoot application follows the same approach used in earlier Liberty SpringBoot versions.
299
+
The `server.xml` configuration for deploying a Spring Boot application follows the same approach used in earlier Liberty Spring Boot versions.
As in earlier versions, the SpringBoot application JAR can be deployed by placing it in the `/dropins/spring` folder. The `springBootApplication` configuration in the `server.xml` file can be omitted when this deployment method is used.
306
+
As in earlier versions, the Spring Boot application JAR can be deployed by placing it in the `/dropins/spring` folder. The `springBootApplication` configuration in the `server.xml` file can be omitted when this deployment method is used.
306
307
307
308
// DO NOT MODIFY THIS LINE. </GHA-BLOG-TOPIC>
308
309
310
+
// // // // DO NOT MODIFY THIS COMMENT BLOCK <GHA-BLOG-TOPIC> // // // //
311
+
// Blog issue: https://github.com/OpenLiberty/open-liberty/issues/34374
312
+
// Contact/Reviewer: rangaran
313
+
// // // // // // // //
314
+
[#ssl]
315
+
== Update to TLS/SSL Cipher support
316
+
Liberty now uses the effective cipher list from the JDK for SSL configuration. The `securityLevel` attribute in the SSL configuration is not used anymore. In addition, the `enabledCiphers` attribute in the SSL config is updated to customize the SSL ciphers in a more flexible way.
317
+
318
+
Liberty's `securityLevel` based cipher categories no longer provide meaningful value. The `MEDIUM` and `LOW` categories contain no remaining ciphers.
319
+
320
+
The `enabledCiphers` attribute now has two mutually exclusive modes: (1) Specify a custom list of ciphers separated by spaces, or (2) Specify filter criteria to add (+) or remove (-) cipher suites from the effective JDK cipher list. If the value set in `enabledCiphers` contains a static entry and a +/- entry, an error is logged, and the server ignores the `enabledCiphers` value by returning the effective JDK cipher list.
321
+
322
+
*Existing Usage:* A user sets `securityLevel` as `HIGH`
323
+
324
+
[source,xml]
325
+
----
326
+
<ssl id="defaultSSL" securityLevel=HIGH/>
327
+
----
328
+
329
+
The `securityLevel` attribute is now ignored, so the previous `<ssl>` configuration is treated equivalently to the configuration shown here where there is no `securityLevel` attribute configured.
330
+
331
+
[source,xml]
332
+
----
333
+
<ssl id="defaultSSL"/>
334
+
----
335
+
336
+
*Existing Usage:* A user specifies all ciphers from the effective JDK list, excluding all TLS_RSA ciphers except for one (TLS_RSA_WITH_AES_128_GCM_SHA256)
To learn more about Transport Security, see link:https://openliberty.io/docs/modules/reference/23.0.0.6/com.ibm.websphere.appserver.api.ssl_1.5-javadoc/com/ibm/websphere/ssl/Constants.html[SSL Constants Javadoc], link:https://openliberty.io/docs/modules/reference/23.0.0.6/com.ibm.websphere.appserver.api.ssl_1.5-javadoc/com/ibm/websphere/ssl/JSSEProvider.html[JSSEProvider Javadoc], and link:https://openliberty.io/docs/latest/reference/config/ssl.html[SSL Configuration Reference].
350
+
351
+
// DO NOT MODIFY THIS LINE. </GHA-BLOG-TOPIC>
309
352
310
353
[#CVEs]
311
354
== Security vulnerability (CVE) fixes in this release
0 commit comments