Skip to content
This repository was archived by the owner on Dec 29, 2025. It is now read-only.

Commit b8520be

Browse files
author
GitHub Actions
committed
Added release notes and version entries for 2025.53.0
1 parent 3fe9b60 commit b8520be

File tree

1 file changed

+166
-0
lines changed

1 file changed

+166
-0
lines changed

blog/2025-12-10-Release-0.md

Lines changed: 166 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,166 @@
1+
---
2+
author: meshcloud
3+
title: Release 2025.53.0
4+
---
5+
6+
Release period: 2025-12-03 to 2025-12-10
7+
8+
This release includes the following issues:
9+
* Automatic User Access Control Assignment
10+
* Edit User Access During Workspace and Project Creation
11+
* Open GitHub Workflow Files Directly from Building Block Definition
12+
* Improved Structure for Platform Authentication Configuration in meshPlatform API
13+
* Runner Selection for Building Block Integrations
14+
* Communication Email Header Logo in Preview and Sent Emails
15+
* Communication Center Email Preview Matches Actual Emails
16+
* Azure Subscription Name Enforcement
17+
* Built-In Integrations Exposed via meshIntegration API
18+
* Streamlined Adding User Access with Modal Dialog
19+
* Drift Detection of Secrets for meshPlatform API v2-preview
20+
<!--truncate-->
21+
22+
## Ticket Details
23+
### Automatic User Access Control Assignment
24+
**Audience:** User<br>
25+
26+
#### Description
27+
When you create a new project, you are now automatically added with the highest-ranking role available to you,
28+
matching the existing behavior during workspace creation. Asides the Admin Area Workspace Management, where you
29+
can still add yourself directly as a workspace manager, the "Add Myself" button has been removed from workspace
30+
and project access control overview screens, streamlining the interface and reducing clutter.
31+
32+
Note: This change only affects customers who have access to the new access control v2 feature. If you are using the
33+
standard access control interface, this change does not apply to you.
34+
35+
### Edit User Access During Workspace and Project Creation
36+
**Audience:** User<br>
37+
38+
#### Description
39+
You can now edit user access assignments directly during workspace and project creation. Previously, you could only add
40+
or remove users during the creation process, but not modify their roles or expiration dates. This improvement allows
41+
you to adjust access settings in the creation flow.
42+
43+
Note: This change only affects customers who have access to the new access control v2 feature. If you are using the
44+
standard access control interface, this change does not apply to you.
45+
46+
### Open GitHub Workflow Files Directly from Building Block Definition
47+
**Audience:** User<br>
48+
49+
#### Description
50+
When configuring a GitHub Actions Building Block Definition, you can now open the workflow files directly in GitHub
51+
from the meshPanel. This makes it easier to verify your configuration and review the workflow implementation without
52+
manually navigating to the GitHub repository.
53+
54+
#### How to use
55+
In the Building Block Definition configuration, after entering your GitHub workflow file names (deploy and destroy
56+
workflows), click the "Open workflow" button next to each field to open the corresponding workflow file in a new tab.
57+
The button becomes available once you have provided the integration, repository, and branch details.
58+
59+
### Improved Structure for Platform Authentication Configuration in meshPlatform API
60+
**Audience:** User<br>
61+
62+
#### Description
63+
The meshPlatform API v2-preview now uses an improved and more consistent structure for configuring platform authentication
64+
credentials. The authentication configuration has been reorganized to use a unified `auth` pattern across
65+
all cloud platforms (AWS, Azure, GCP, and AKS). This change makes it easier to understand and configure different
66+
authentication methods (credentials vs. workload identity) by using a consistent structure with a `type` field
67+
that clearly identifies the authentication method being used.
68+
69+
#### How to use
70+
If you are using the meshPlatform API preview-v2 to manage platform configurations, you need to update your API requests to
71+
use the new structure. Please refer to the updated API documentation for detailed examples of the new configuration structure for each
72+
platform type.
73+
74+
### Runner Selection for Building Block Integrations
75+
**Audience:** User<br>
76+
77+
#### Description
78+
You can now select a specific building block runner when creating or editing integrations for GitHub, GitLab,
79+
and Azure DevOps. This allows you to choose which runner will execute the building block definitions that use
80+
this integration.
81+
82+
#### How to use
83+
When creating or editing an integration, a new "Building Block Runner" section appears below the integration
84+
configuration. You can select from available runners that match the integration type (e.g., GitHub Workflow
85+
runners for GitHub integrations). If you change the runner for an existing integration that stores secrets
86+
(GitHub or Azure DevOps), you'll need to re-enter those secrets as they are encrypted per runner.
87+
88+
### Communication Email Header Logo in Preview and Sent Emails
89+
**Audience:** User<br>
90+
91+
#### Description
92+
The email preview in the communication center now displays your organization's logo at the top of the message, matching
93+
what recipients will see. Additionally, the logo display in actual sent emails has been improved to ensure consistent
94+
and professional formatting regardless of the original logo size.
95+
96+
#### How to use
97+
When creating a communication, the email preview will show your configured logo at the top of the message. This preview
98+
accurately reflects how the logo will appear in emails sent to workspace members, helping you ensure your communications
99+
maintain a professional appearance.
100+
101+
### Communication Center Email Preview Matches Actual Emails
102+
**Audience:** User<br>
103+
104+
#### Description
105+
When you create communications in the communication center, the email preview now shows exactly what recipients will
106+
receive. The greeting and message content are now displayed in the same format in both the preview and the actual sent
107+
emails.
108+
109+
#### How to use
110+
When creating a communication, use the email preview feature to see exactly how your message will appear to recipients.
111+
The preview accurately reflects the final email layout, including the personalized greeting (when applicable) and the
112+
message content. This helps you ensure your communication looks professional before sending it to workspace members.
113+
114+
### Azure Subscription Name Enforcement
115+
**Audience:** User<br>
116+
117+
#### Description
118+
During Azure replication, meshStack now ensures that the Azure subscription name is correctly applied
119+
according to the configured subscription name pattern. This step was added to the replication process to guarantee
120+
that subscription names remain consistent with your naming conventions, even if they were changed manually or
121+
through other means.
122+
123+
### Built-In Integrations Exposed via meshIntegration API
124+
**Audience:** User<br>
125+
126+
#### Description
127+
The meshIntegration API now exposes built-in integrations (Replicator and Metering) as read-only resources. You can
128+
retrieve Workload Identity Federation (WIF) configuration details including OIDC issuer, subject identifiers, and token
129+
paths for GCP, AWS, and Azure. This enables you to fully automate platform setup by retrieving WIF information via the
130+
API before creating the platform in meshStack.
131+
132+
#### How to use
133+
Filter by integration type (replicator or metering) or retrieve individual integrations by their static UUID. Use the
134+
WIF configuration from the status field to configure your cloud platform's identity provider before creating the
135+
platform in meshStack. Built-in integrations are read-only and cannot be created, updated, or deleted via the API.
136+
137+
### Streamlined Adding User Access with Modal Dialog
138+
**Audience:** User<br>
139+
140+
#### Description
141+
We improved the user experience when adding users to workspaces and projects in the new access control interface
142+
(access control v2). Instead of using a dropdown popover, the "Add Users" functionality now opens in a clear modal
143+
dialog, providing a more focused and intuitive interface. You can now add multiple users at once and invite new users
144+
by email in the same flow, streamlining the process of managing workspace and project access.
145+
146+
Note: This change only affects customers who have access to the new access control v2 feature. If you are using the
147+
standard access control interface, this change does not apply to you.
148+
149+
### Drift Detection of Secrets for meshPlatform API v2-preview
150+
**Audience:** User<br>
151+
152+
#### Description
153+
The meshPlatform API v2-preview now supports drift detection for platform configuration secrets. Previously,
154+
GET responses returned a placeholder value for secrets, making it impossible to detect when secrets were changed
155+
outside of Terraform or other API clients. Now, secrets are returned with a hash value that enables drift detection
156+
while maintaining security by never exposing the actual secret values. This is a breaking change for the v2-preview
157+
API, so existing API clients need to adapt to the new secret representation structure.
158+
159+
#### How to use
160+
When creating or updating platforms via the API, you can provide secret values using a "plaintext" property.
161+
GET responses return a "hash" property instead of the actual secret or a placeholder. Terraform providers and
162+
other API clients can store this hash and compare it on subsequent reads to detect when secrets have been changed
163+
outside of their control. When updating a platform, you can either provide a new secret value to update it, or
164+
provide the hash from a previous response to keep the existing secret unchanged. For details on the new secret
165+
structure, see the API documentation at https://docs.meshcloud.io/api/mesh-platform-post-v/.
166+

0 commit comments

Comments
 (0)