This topic tells you how to upgrade Application Single Sign-On (commonly called AppSSO) outside of a Tanzu Application Platform profile installation. If you installed Tanzu Application Platform through a profile, see Upgrade Tanzu Application Platform instead.
For help on migrating your resources in between versions, see the migration guides.
If you installed the AppSSO package on its own, and not as part of TAP, you can upgrade it individually by running:
tanzu package installed update PACKAGE_INSTALLATION_NAME -p sso.apps.tanzu.vmware.com -v 3.0.0 --values-file PATH_TO_YOUR_VALUES_YAML -n YOUR_INSTALL_NAMESPACE
NoteYou can also upgrade AppSSO as part of upgrading Tanzu Application Platform as a whole. See Upgrading Tanzu Application Platform for more information.
v2.0.0 to v3.0.0VMware recommends that you recreate your AuthServers after upgrading your AppSSO to v3.0.0 with the following changes:
.spec.tls.disabled to .spec.tls.deactivated.v1.0.0 to v2.0.0VMware recommends that you recreate your AuthServers after upgrading your AppSSO to v2.0.0 with the following changes:
Migrate from .spec.issuerURI to .spec.tls:
NoteAppSSO templates your issuer URI and enables TLS. When using the newer
.spec.tls, a customServiceand an ingress resource are no longer required.It is not recommended to continue using
.spec.issuerURIin AppSSO v2.0.0. To use.spec.issuerURIin AppSSO v2.0.0, you must provide aServiceand an ingress resource as in AppSSO v1.0.0.
.spec.tls.{issuerRef, certificateRef, secretRef}. See Issuer URI & TLS for more information..spec.tls.disabled..spec.issuerURI.AuthServer-specific Service and ingress resources.AuthServer. You can find its issuer URI in .status.issuerURI.If you use the internalUnsafe identity provider to migrate existing users by replacing the bcrypt hash through the plain-text equivalent. You can still use existing bcrypt passwords by prefixing them with {bcrypt}:
---
apiVersion: sso.apps.tanzu.vmware.com/v1alpha1
kind: AuthServer
metadata:
# ...
spec:
identityProviders:
- name: internal
internalUnsafe:
users:
# v1.0
- username: test-user-1
password: $2a$10$201z9o/tHlocFsHFTo0plukh03ApBYe4dRiXcqeyRQH6CNNtS8jWK # bcrypt-encoded "password"
# ...
# v2.0
- username: "test-user-1"
password: "{bcrypt}$2a$10$201z9o/tHlocFsHFTo0plukh03ApBYe4dRiXcqeyRQH6CNNtS8jWK" # same bcrypt hash, with {bcrypt} prefix
- username: "test-user-2"
password: "password" # plain text
# ...