Skip to content

Commit

Permalink
Note s3 fips endpoints (#2566)
Browse files Browse the repository at this point in the history
  • Loading branch information
pburkholder authored Nov 20, 2024
1 parent da844e4 commit 6a0ff88
Showing 1 changed file with 37 additions and 0 deletions.
37 changes: 37 additions & 0 deletions _posts/2024-11-18-release-notes.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
---
layout: post
date: November 18th 2024
title: "November 18th Cloud.gov Release Notes"
excerpt: The Cloud.gov team is working on providing release notes so everyone can see new features and updates.
---

# Release Notes

## Developer-Impacting Changes

The audience for this section is developers who maintain applications on cloud.gov and may need to respond to stack or buildpack changes.

### AWS S3 FIPS-enabled endpoints

As part of Cloud.gov's ongoing efforts to expand the use of FIPS 140-3 validated cryptography,
our [S3 Bucket broker](https://cloud.gov/docs/services/s3/) now populates service credentials
with only the FIPS-validated S3 endpoints.

Prior to October 29, 2024, the S3 credentials included both the `fips_endpoint`
and the `endpoint` values. Now both keys have the same values, e.g.

```
"credentials": {
"access_key_id": "REDACTED"}
"additional_buckets": [],
"bucket": "cg-redacted",
"endpoint": "s3-fips.us-gov-west-1.amazonaws.com",
"fips_endpoint": "s3-fips.us-gov-west-1.amazonaws.com",
"region": "us-gov-west-1",
...
```

This change shouldn't break any applications UNLESS you were using HTTP (instead of HTTPS)
to initiate a connection to the S3 endpoint. The non-FIPS endpoint provided
a redirect to HTTPS, the FIPS endpoint does not. This could result in application
errors. Updating code to `enableSSL` or use an HTTPS protocol should resolve the issue.

0 comments on commit 6a0ff88

Please sign in to comment.