Crowd 6.0 EAP is out

We’ve just released an Early Access Program (EAP) of Crowd 6.0 so you can get familiar with the upcoming changes. Unless we need to include emergency or unplanned changes, this should be the only EAP for Crowd 6.0.

Highlights

  • Migration to Java 17: We’ve removed support for JDK 8 and 11. Crowd 6.0 only supports JDK 17.
  • Removed support for JNDI datasource connection: We’ve removed JNDI as a method for connecting to the database.
  • Upgrade to Platform 7: We’ve upgraded to Atlassian Data Center Platform 7.
  • Endpoint default security annotations: By default, endpoints will require an authenticated user instead of allowing public access.
  • Front-end dependencies SBOM file included in the distribution: With this improvement Crowd becomes compliant with the Secure Software Development Framework.

Downloads and documentation

For details, check out the documentation on how to prepare for Crowd 6.0.

Share your feedback

If there’s anything we can provide that will make it easier for you to understand and plan for the changes, let us know by commenting below this post.

Happy testing,
The Crowd team

Hi @MichalSamujlo

I encountered the following warning in the logs while attempting to install our plugin:

“Package com.atlassian.crowd.manager.authentication is internal and is not available for export.”

Our apps requires access to this package. Could you please consider exporting this package or suggest an alternative solution?

Your assistance would be greatly appreciated.

Thanks,
Lokesh

Hi,

we are maintaining a custom internal plugin for Crowd. When preparing for Crowd 6.0, we are seeing this error

Package com.atlassian.config.util is internal and is not available for export to plugin

Then, the startup of our plugin fails.

The same error is reported by the community for Confluence: Preparing for Confluence 9.0 - EAP out now - #476 by fgrund
A member of the atlassian team responded and said this will be fixed soon for Confluence.

Is this error already known for Crowd as well? Is there maybe already a timeline for the fix?

Thanks,
Jonas

Hi @MichalSamujlo,

I hope you’re doing well. We’re facing an issue with the error is internal and is not available for export. If possible, could we kindly request the same level of support the Atlassian team provided when we were working on making the app compatible with Confluence and Jira?

Thanks,
Lokesh

Thank you for your patience, and I apologize for the delay in responding.

For security reasons, we intentionally restricted access to selected packages in Crowd 6.0. However, it appears that restricting access to com.atlassian.config.util was unintended. I understand the impact this may have on your work, and I’m sorry for any inconvenience caused. We plan to include a fix in the upcoming bug fix release scheduled for the next week.

@lokesh It’s more complex for com.atlassian.crowd.manager.authentication package which was blocked for security reasons. Can you please tell us which classes from this package you use and how? We will try to find a solution.

Hi @MichalSamujlo,

Thanks for the response.

We have the SSO and MFA app for Crowd where we need to authenticate users to create a session. To achieve this, we’re utilizing com.atlassian.crowd.manager.authentication.TokenAuthenticationManager to authenticate the user and generate a session token. We have also tried com.atlassian.crowd.integration.http.CrowdHttpAuthenticator but stuck with the same issue.

Thanks,
Lokesh

@lokesh We decided to expose com.atlassian.crowd.manager.authentication and also mark it as deprecated. The change will be available in the next patch version (6.0.4) and in 6.1+ .

We would like to remove access to this package in Crowd 7.0 and introduce new public API.

Hi @MichalSamujlo,

Thank you for the update, we really appreciate your assistance.

I wanted to check if there is an estimated release date for Crowd v6.0.4. Having this information would allow us to provide more accurate communication to our customers who are eagerly awaiting updates for our apps.

Thanks again for your support!

Thanks,
Lokesh