|
| 1 | +--- |
| 2 | +author: meshcloud |
| 3 | +title: Release 2025.53.0 |
| 4 | +--- |
| 5 | + |
| 6 | +Release period: 2025-12-03 to 2025-12-10 |
| 7 | + |
| 8 | +This release includes the following issues: |
| 9 | +* Automatic User Access Control Assignment |
| 10 | +* Edit User Access During Workspace and Project Creation |
| 11 | +* Open GitHub Workflow Files Directly from Building Block Definition |
| 12 | +* Improved Structure for Platform Authentication Configuration in meshPlatform API |
| 13 | +* Runner Selection for Building Block Integrations |
| 14 | +* Communication Email Header Logo in Preview and Sent Emails |
| 15 | +* Communication Center Email Preview Matches Actual Emails |
| 16 | +* Azure Subscription Name Enforcement |
| 17 | +* Built-In Integrations Exposed via meshIntegration API |
| 18 | +* Streamlined Adding User Access with Modal Dialog |
| 19 | +* Drift Detection of Secrets for meshPlatform API v2-preview |
| 20 | +<!--truncate--> |
| 21 | + |
| 22 | +## Ticket Details |
| 23 | +### Automatic User Access Control Assignment |
| 24 | +**Audience:** User<br> |
| 25 | + |
| 26 | +#### Description |
| 27 | +When you create a new project, you are now automatically added with the highest-ranking role available to you, |
| 28 | +matching the existing behavior during workspace creation. Asides the Admin Area Workspace Management, where you |
| 29 | +can still add yourself directly as a workspace manager, the "Add Myself" button has been removed from workspace |
| 30 | +and project access control overview screens, streamlining the interface and reducing clutter. |
| 31 | + |
| 32 | +Note: This change only affects customers who have access to the new access control v2 feature. If you are using the |
| 33 | +standard access control interface, this change does not apply to you. |
| 34 | + |
| 35 | +### Edit User Access During Workspace and Project Creation |
| 36 | +**Audience:** User<br> |
| 37 | + |
| 38 | +#### Description |
| 39 | +You can now edit user access assignments directly during workspace and project creation. Previously, you could only add |
| 40 | +or remove users during the creation process, but not modify their roles or expiration dates. This improvement allows |
| 41 | +you to adjust access settings in the creation flow. |
| 42 | + |
| 43 | +Note: This change only affects customers who have access to the new access control v2 feature. If you are using the |
| 44 | +standard access control interface, this change does not apply to you. |
| 45 | + |
| 46 | +### Open GitHub Workflow Files Directly from Building Block Definition |
| 47 | +**Audience:** User<br> |
| 48 | + |
| 49 | +#### Description |
| 50 | +When configuring a GitHub Actions Building Block Definition, you can now open the workflow files directly in GitHub |
| 51 | +from the meshPanel. This makes it easier to verify your configuration and review the workflow implementation without |
| 52 | +manually navigating to the GitHub repository. |
| 53 | + |
| 54 | +#### How to use |
| 55 | +In the Building Block Definition configuration, after entering your GitHub workflow file names (deploy and destroy |
| 56 | +workflows), click the "Open workflow" button next to each field to open the corresponding workflow file in a new tab. |
| 57 | +The button becomes available once you have provided the integration, repository, and branch details. |
| 58 | + |
| 59 | +### Improved Structure for Platform Authentication Configuration in meshPlatform API |
| 60 | +**Audience:** User<br> |
| 61 | + |
| 62 | +#### Description |
| 63 | +The meshPlatform API v2-preview now uses an improved and more consistent structure for configuring platform authentication |
| 64 | +credentials. The authentication configuration has been reorganized to use a unified `auth` pattern across |
| 65 | +all cloud platforms (AWS, Azure, GCP, and AKS). This change makes it easier to understand and configure different |
| 66 | +authentication methods (credentials vs. workload identity) by using a consistent structure with a `type` field |
| 67 | +that clearly identifies the authentication method being used. |
| 68 | + |
| 69 | +#### How to use |
| 70 | +If you are using the meshPlatform API preview-v2 to manage platform configurations, you need to update your API requests to |
| 71 | +use the new structure. Please refer to the updated API documentation for detailed examples of the new configuration structure for each |
| 72 | +platform type. |
| 73 | + |
| 74 | +### Runner Selection for Building Block Integrations |
| 75 | +**Audience:** User<br> |
| 76 | + |
| 77 | +#### Description |
| 78 | +You can now select a specific building block runner when creating or editing integrations for GitHub, GitLab, |
| 79 | +and Azure DevOps. This allows you to choose which runner will execute the building block definitions that use |
| 80 | +this integration. |
| 81 | + |
| 82 | +#### How to use |
| 83 | +When creating or editing an integration, a new "Building Block Runner" section appears below the integration |
| 84 | +configuration. You can select from available runners that match the integration type (e.g., GitHub Workflow |
| 85 | +runners for GitHub integrations). If you change the runner for an existing integration that stores secrets |
| 86 | +(GitHub or Azure DevOps), you'll need to re-enter those secrets as they are encrypted per runner. |
| 87 | + |
| 88 | +### Communication Email Header Logo in Preview and Sent Emails |
| 89 | +**Audience:** User<br> |
| 90 | + |
| 91 | +#### Description |
| 92 | +The email preview in the communication center now displays your organization's logo at the top of the message, matching |
| 93 | +what recipients will see. Additionally, the logo display in actual sent emails has been improved to ensure consistent |
| 94 | +and professional formatting regardless of the original logo size. |
| 95 | + |
| 96 | +#### How to use |
| 97 | +When creating a communication, the email preview will show your configured logo at the top of the message. This preview |
| 98 | +accurately reflects how the logo will appear in emails sent to workspace members, helping you ensure your communications |
| 99 | +maintain a professional appearance. |
| 100 | + |
| 101 | +### Communication Center Email Preview Matches Actual Emails |
| 102 | +**Audience:** User<br> |
| 103 | + |
| 104 | +#### Description |
| 105 | +When you create communications in the communication center, the email preview now shows exactly what recipients will |
| 106 | +receive. The greeting and message content are now displayed in the same format in both the preview and the actual sent |
| 107 | +emails. |
| 108 | + |
| 109 | +#### How to use |
| 110 | +When creating a communication, use the email preview feature to see exactly how your message will appear to recipients. |
| 111 | +The preview accurately reflects the final email layout, including the personalized greeting (when applicable) and the |
| 112 | +message content. This helps you ensure your communication looks professional before sending it to workspace members. |
| 113 | + |
| 114 | +### Azure Subscription Name Enforcement |
| 115 | +**Audience:** User<br> |
| 116 | + |
| 117 | +#### Description |
| 118 | +During Azure replication, meshStack now ensures that the Azure subscription name is correctly applied |
| 119 | +according to the configured subscription name pattern. This step was added to the replication process to guarantee |
| 120 | +that subscription names remain consistent with your naming conventions, even if they were changed manually or |
| 121 | +through other means. |
| 122 | + |
| 123 | +### Built-In Integrations Exposed via meshIntegration API |
| 124 | +**Audience:** User<br> |
| 125 | + |
| 126 | +#### Description |
| 127 | +The meshIntegration API now exposes built-in integrations (Replicator and Metering) as read-only resources. You can |
| 128 | +retrieve Workload Identity Federation (WIF) configuration details including OIDC issuer, subject identifiers, and token |
| 129 | +paths for GCP, AWS, and Azure. This enables you to fully automate platform setup by retrieving WIF information via the |
| 130 | +API before creating the platform in meshStack. |
| 131 | + |
| 132 | +#### How to use |
| 133 | +Filter by integration type (replicator or metering) or retrieve individual integrations by their static UUID. Use the |
| 134 | +WIF configuration from the status field to configure your cloud platform's identity provider before creating the |
| 135 | +platform in meshStack. Built-in integrations are read-only and cannot be created, updated, or deleted via the API. |
| 136 | + |
| 137 | +### Streamlined Adding User Access with Modal Dialog |
| 138 | +**Audience:** User<br> |
| 139 | + |
| 140 | +#### Description |
| 141 | +We improved the user experience when adding users to workspaces and projects in the new access control interface |
| 142 | +(access control v2). Instead of using a dropdown popover, the "Add Users" functionality now opens in a clear modal |
| 143 | +dialog, providing a more focused and intuitive interface. You can now add multiple users at once and invite new users |
| 144 | +by email in the same flow, streamlining the process of managing workspace and project access. |
| 145 | + |
| 146 | +Note: This change only affects customers who have access to the new access control v2 feature. If you are using the |
| 147 | +standard access control interface, this change does not apply to you. |
| 148 | + |
| 149 | +### Drift Detection of Secrets for meshPlatform API v2-preview |
| 150 | +**Audience:** User<br> |
| 151 | + |
| 152 | +#### Description |
| 153 | +The meshPlatform API v2-preview now supports drift detection for platform configuration secrets. Previously, |
| 154 | +GET responses returned a placeholder value for secrets, making it impossible to detect when secrets were changed |
| 155 | +outside of Terraform or other API clients. Now, secrets are returned with a hash value that enables drift detection |
| 156 | +while maintaining security by never exposing the actual secret values. This is a breaking change for the v2-preview |
| 157 | +API, so existing API clients need to adapt to the new secret representation structure. |
| 158 | + |
| 159 | +#### How to use |
| 160 | +When creating or updating platforms via the API, you can provide secret values using a "plaintext" property. |
| 161 | +GET responses return a "hash" property instead of the actual secret or a placeholder. Terraform providers and |
| 162 | +other API clients can store this hash and compare it on subsequent reads to detect when secrets have been changed |
| 163 | +outside of their control. When updating a platform, you can either provide a new secret value to update it, or |
| 164 | +provide the hash from a previous response to keep the existing secret unchanged. For details on the new secret |
| 165 | +structure, see the API documentation at https://docs.meshcloud.io/api/mesh-platform-post-v/. |
| 166 | + |
0 commit comments