Skip to content

Commit f7a8ab9

Browse files
Fixes + minor formatting adjustments for MTA RNs (#302)
* Fixes + minor formatting adjustments * Update docs/topics/release-notes-topics/ref_new-features-and-enhancements-8-0.adoc Co-authored-by: Andy Arnold <anarnold@redhat.com> * Update docs/topics/release-notes-topics/ref_fixed-issues-8-0.adoc Co-authored-by: Andy Arnold <anarnold@redhat.com> --------- Co-authored-by: Andy Arnold <anarnold@redhat.com>
1 parent c6e97f7 commit f7a8ab9

File tree

7 files changed

+18
-97
lines changed

7 files changed

+18
-97
lines changed

docs/topics/release-notes-topics/ref_fixed-issues-8-0-1.adoc

Lines changed: 1 addition & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -12,99 +12,72 @@ In {ProductShortName} 8.0.1 the performance of Java binary analysis has signific
1212
Before this change, when you analyzed Java binary applications, {ProductShortName} incorrectly classified some open-source dependencies as internal dependencies, it was then decompiled and analyzed, that caused the analysis to take longer to complete. Now, the location of the Maven index file is passed to the Java provider to determine if an embedded dependency is open-source or internal. This fix resolved the two following issues:
1313

1414
Binary application analysis latency is reduced in {ProductShortName}::
15-
1615
When you analyzed a binary, the performance degraded because {ProductShortName} relied on Maven search. With this release, this issue is fixed by introducing the pre-generated Maven index that does not require connecting to an external index.
1716
+
18-
1917
(link:https://issues.redhat.com/browse/MTA-6231[MTA-6231])
2018

2119
Analysis of binary applications classify open source dependencies accurately::
22-
23-
When you analyzed Java binary applications, {ProductShortName} incorrectly classified some open-source dependencies as internal dependencies. With this version, this issue if fixed. This leads to {ProductShortName} classifying embedded open source dependencies correctly after a source+dependency binary analysis.
20+
When you analyzed Java binary applications, {ProductShortName} incorrectly classified some open-source dependencies as internal dependencies. With this version, this issue is fixed. This leads to {ProductShortName} classifying embedded open source dependencies correctly after a source+dependency binary analysis.
2421
+
25-
2622
(link:https://issues.redhat.com/browse/MTA-6357[MTA-6357])
2723

2824
{ProductShortName} enables you to target an organization when importing applications from Cloud Foundry::
29-
3025
When you imported applications from Cloud Foundry (CF), {ProductShortName} did not have a provision for you to mention the CF organizations. With this release, this issue is fixed. You can configure one or more organizations, spaces, and applications for the discovery process. The spaces can belong to different organizations and the applications can belong to different spaces. You must specify at least one organization for application discovery.
3126
+
32-
3327
(link:https://issues.redhat.com/browse/MTA-6271[MTA-6271])
3428

3529
{ProductShortName} {CLIName} correctly processes Cloud Foundry applications with service binding::
36-
3730
The discovery process of Cloud Foundry (CF) applications with service bindings by using live connection failed in {ProductShortName} {CLIName}. The {ProductShortName} {CLIName} did not parse the `VCAP_SERVICES` environment variables correctly to handle service binding information for an array of services. For example, `cf bind-service _<application_name>_ postgres01`. With this version, this issue is fixed. As a result, {ProductShortName} {CLIName} successfully completes the discovery of CF applications with service bindings.
3831
+
39-
4032
(link:https://issues.redhat.com/browse/MTA-6399[MTA-6399])
4133

4234
Cloud Foundry applications imported in {ProductShortName} are tagged automatically::
43-
4435
When you imported applications in {ProductShortName} from a Cloud Foundry (CF) instance, the applications did not contain the `Cloud Foundry` tag. The tag links an application to an archetype. The archetype has a generator that produces the deployment assets for a migration path. With this release, this issue is fixed. You no longer have to manually add the `Cloud Foundry` tag in the imported application.
4536
+
46-
4737
(link:https://issues.redhat.com/browse/MTA-6282[MTA-6282])
4838

4939
You can import Cloud Foundry applications from the application inventory in the {ProductShortName} web console::
5040

5141
Before this update, an {ProductShortName} Architect could not discover or import applications from the Cloud Foundry (CF) source platform on the application inventory page. As a result, only an {ProductShortName} Administrator could import the applications on the *Source platforms* page in the Administrator mode. With this release, this issue is fixed. Architects can now import CF applications in the *Application Inventory*.
5242
+
53-
5443
(link:https://issues.redhat.com/browse/MTA-6120[MTA-6120])
5544

5645
Concurrent usage of {mta-dl-plugin} for code resolution at scale no longer causes race conditions::
57-
5846
Concurrent usage of the Solution Server through the {mta-dl-plugin} Visual Studio (VS) Code plugin for code resolution at scale caused race conditions for duplicate incidents. With this release, this issue is fixed. The plugin generates resolutions for the incidents identified when many users use it concurrently.
5947
+
60-
6148
(link:https://issues.redhat.com/browse/MTA-6230[MTA-6230])
6249

6350
{ProductShortName} rules for Java use FQN to match annotations in source code::
64-
6551
Before this update, the annotation rules for Java applications did not use Fully Qualified Names (FQNs) to match with the annotation location in rules. As a result, the rule triggered incorrect matches or false positives for issues. For example, a rule that looked for the `javax.enterprise.inject.Produces` incorrectly matched with occurrences of `javax.ws.rs.Produces`. With this release, this issue is fixed.
6652
+
67-
6853
(link:https://issues.redhat.com/browse/MTA-6195[MTA-6195])
6954

7055
{ProductShortName} triggers rules to match import statements with wildcard in Java applications analysis::
71-
7256
{ProductShortName} did not trigger rule to match import statements that contain a wildcard when analyzing a Java application. Consequently, specific incidents were not detected in the report after the analysis. With this release, this issue is fixed.
7357
+
74-
7558
(link:https://issues.redhat.com/browse/MTA-4027[MTA-4027])
7659

7760
{ProductShortName} {WebName} enables you to edit secure SVN application without an error::
78-
7961
When you disabled the `Allow insecure connection` for an application stored in the SVN repository and edited the application, the {WebName} displayed a blank page some times with the `TypeError` `cannot read properties of undefined (reading 'kind')`. With this version, this issue is fixed. You can edit secure SVN applications in the {ProductShortName} {WebName}.
8062
+
81-
8263
(link:https://issues.redhat.com/browse/MTA-6263[MTA-6263])
8364

8465
{ProductShortName} no longer fails language and tech discovery for Java application in SVN repositories::
85-
8666
Before this update, for a Java application source code stored in an SVN repository, {ProductShortName} produced an error when trying to checkout the repository by using the SVN credential. As a result, the language and tech discovery of the application failed. With this release, this issue is fixed. You can now analyze an application stored in SVN repository without any error.
8767
+
88-
8968
(link:https://issues.redhat.com/browse/MTA-6141[MTA-6141])
9069

9170
{ProductShortName} displays source repository URL when you skip configuring the repository type field::
92-
9371
{ProductShortName} did not show the source repository URL in the application details view if you did not select between the `Git` or `Subversion` repository type. As a result, you could not run an analysis on the application source code. With this release, this issue is fixed. You can now use {ProductShortName} to run an analysis on the source code even if you do not configure the repository type field.
9472
+
95-
9673
(link:https://issues.redhat.com/browse/MTA-6105[MTA-6105])
9774

9875
You can complete an assessment by using a custom questionnaire in the {ProductShortName} {WebName}::
99-
10076
Before this update, you could not proceed to the final step after filling in the responses to the custom questionnaire because the *Next* button was disabled in the web console. With this release, this issue is fixed.
10177
+
102-
10378
(link:https://issues.redhat.com/browse/MTA-6143[MTA-6143])
10479

10580
{ProductShortName} web console detects custom rules when many are uploaded at a time::
106-
10781
When you uploaded more than one custom rule at a time in the {ProductShortName} web console, the rules were not detected. With this version, this issue is fixed. You can upload one or more custom rules at once.
10882
+
109-
11083
(link:https://issues.redhat.com/browse/MTA-6029[MTA-6029])

docs/topics/release-notes-topics/ref_fixed-issues-8-0.adoc

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,33 +9,25 @@
99
{ProductFirstRef} ({ProductShortName}) version 8.0.0 provides the following fixed issues and other problems that have a significant impact.
1010

1111
The default `values.yaml` file is merged with the discover `values.yaml` file when generating a deployment manifest::
12-
1312
Before this update, when you generated a deployment manifest by using the Helm template, the default values in the`values.yaml` file, packaged with the Helm chart, were ignored. Consequently, only the values from the `values.yaml` file created after running the `mta-cli discover` command were used. With this update, the default `values.yaml` file is merged with the discover `values.yaml` file.
1413
+
15-
1614
(link:https://issues.redhat.com/browse/MTA-5793[MTA-5793])
1715

1816

1917
{ProductShortName} CLI no longer fails to detect dependencies for Gradle projects::
20-
2118
Before this update, when you ran an application analysis for Gradle projects in containerless mode, {ProductFullName} command-line interface (CLI) did not detect Gradle dependencies. As a consequence, the analysis report did not list the dependencies and displayed an error message in the analysis logs instead. With this update, the issue is fixed. As a result, {ProductShortName} CLI detects Gradle dependencies after the analysis is complete.
2219
+
23-
24-
(link:https://issues.redhat.com/browse/MTA-4033[MTA-5793])
20+
(link:https://issues.redhat.com/browse/MTA-4033[MTA-4033])
2521

2622

2723
{ProductShortName} UI no longer fails to analyze projects built with Gradle version 7 and later::
28-
29-
Before this update, when you analyzed an application built with Gradle in `Source code + dependencies` mode in the {ProductFullName} user interface (UI), the analysis failed if you had Gradle version 7 or later installed* With this update, the issue is fixed*
24+
Before this update, when you analyzed an application built with Gradle in `Source code + dependencies` mode in the {ProductFullName} user interface (UI), the analysis failed if you had Gradle version 7 or later installed. With this update, the issue is fixed.
3025
+
31-
3226
(link:https://issues.redhat.com/browse/MTA-5907[MTA-5907])
3327

3428

3529
The discovery manifest lists all defined web processes in the application::
36-
3730
Before this update, the `mta-cli discover` command only moved an application-level process with the process type explicitly defined to the `processes` block in the discovery manifest. Consequently, the discovery manifest did not list implicit application-level processes in the `processes` block. This resulted in the violation of the recommended clarity and proper configuration practices, especially if multiple process types were planned. With this update, `mta-cli discover` moves both implicit and explicit application-level process types to the `processes` block in the discovery manifest.
3831
+
39-
4032
(link:https://issues.redhat.com/browse/MTA-6030[MTA-6030])
4133

docs/topics/release-notes-topics/ref_known-issues-8-0-1.adoc

Lines changed: 2 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,40 +10,33 @@
1010

1111

1212
{ProductShortName} assessment form malfunctions when you use it with a custom questionnaire::
13-
1413
In the {ProductShortName} {WebName}, selecting an answer to a question in the assessment form generated from a custom questionnaire causes the form to select an option available for another question.
1514
+
1615
To work around this problem, ensure that one or more `order` keys listed in a section, for example `answers`, have a unique order number.
1716
+
1817
(link:https://issues.redhat.com/browse/MTA-6262[MTA-6262])
1918

2019
{ProductShortName} UI does not trigger a violation for open source dependencies in Gradle applications::
21-
2220
{ProductShortName} UI does not trigger a violation for open source libraries when you run a `source+dependency` analysis of a Gradle application. As a result, the analysis report does not list incidents for open source dependencies.
2321
+
24-
2522
To work around this problem, analyze Gradle applications by using the {ProductShortName} command-line interface (CLI).
2623
+
2724
(link:https://issues.redhat.com/browse/MTA-6211[MTA-6211])
2825

2926

3027
{ProductShortName} UI fails to process applications with service bindings::
31-
3228
When you use the {ProductFullName} user interface (UI) to run an application discovery for a deployed Cloud Foundry (CF) application with a service binding, {ProductShortName} UI does not parse the `VCAP_SERVICES` environment variables correctly to handle service binding information. Consequently, the discovery fails.
3329
+
34-
3530
To work around this problem, run the application discovery by using the {ProductShortName} command-line interface (CLI).
3631
+
3732
(link:https://issues.redhat.com/browse/MTA-6424[MTA-6424])
3833

3934

4035
Rules with `METHOD_CALL` or `CONSTRUCTOR_CALL` do not match expected locations when specifying parameters::
41-
4236
Search patterns in Java rules that have the `METHOD_CALL` and `CONSTRUCTOR_CALL` locations do not match the expected methods and constructors in the application source code.
4337
+
44-
38+
--
4539
For example:
46-
+
4740

4841
[source, yaml]
4942
----
@@ -52,28 +45,24 @@ For example:
5245
pattern: javax.servlet.UnavailableException(javax.servlet.Servlet,java.lang.String)
5346
----
5447
does not match
55-
+
5648

5749
[source, java]
5850
----
5951
String str = "something";
6052
Servlet s = exception1.getServlet();
6153
UnavailableException exception2 = new UnavailableException(s, str);
6254
----
63-
+
6455

6556
In addition, search patterns that do not contain Fully Qualified Names (FQN) do not match. For example:
66-
+
6757

6858
[source, yaml]
6959
----
7060
java.referenced:
7161
location: CONSTRUCTOR_CALL
7262
pattern: UnavailableException(Servlet s,String str)
7363
----
74-
+
7564

7665
No known workaround exists.
66+
--
7767
+
78-
7968
(link:https://issues.redhat.com/browse/MTA-6402[MTA-6402])

docs/topics/release-notes-topics/ref_known-issues-8-0.adoc

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -10,54 +10,44 @@
1010

1111

1212
Application analysis with {ProductShortName} CLI might fail with the "invalid header line" error::
13-
1413
An application analysis by using the {ProductFullName} command-line interface (CLI) might fail with the following error message:
1514
+
1615
----
1716
level=error msg="initialize failed" error="context canceled" provider=java
1817
error="invalid header line "An error has occurred. See the log file"
1918
----
2019
+
21-
2220
To work around this problem, clean up metadata and cache:
2321

2422
. Clear the `.metadata` subdirectory under the directory from which you ran the `mta-cli analyze` command.
2523
. Clear the Maven cache.
26-
+
2724

25+
+
2826
(link:https://issues.redhat.com/browse/MTA-6125[MTA-6125])
2927

3028

3129

3230
{ProductShortName} analysis result does not change if you add or remove a custom rule::
33-
3431
When you use Developer Lightspeed for {ProductShortName}, the analysis results do not change if you include or remove a custom rule but do not restart the analyzer process.
3532
+
36-
3733
To work around this problem, restart the analyzer process by clicking the *Start/Stop* button after making a configuration change.
3834
+
39-
4035
(link:https://issues.redhat.com/browse/MTA-6129[MTA-6129])
4136

4237

4338
`ANNOTATION` location rules do not match on FQNs::
44-
4539
The `ANNOTATION` search location does not properly use Fully Qualified Names (FQNs) to match annotations. This leads to incorrect matches and false positives in analysis issues. For example, a rule that searches for annotations using the `javax.enterprise.inject.Produces` pattern might incorrectly match the occurrences of the `javax.ws.rs.Produces` annotation in the source code.
4640
+
47-
4841
No known workaround exists.
4942
+
50-
5143
(link:https://issues.redhat.com/browse/MTA-6195[MTA-6195])
5244

5345

5446
Developer Lightspeed for {ProductShortName} database throws a connection error::
55-
5647
The Solution Server throws a connection error when concurrent connections increase in a short span of time. To work around this problem, enter the following command to allow the Developer Lightspeed for {ProductShortName} database to expire idle connections:
5748
+
5849
----
5950
oc -n openshift-mta exec deploy/kai-db – psql -U postgres -d postgres -c "ALTER ROLE kai SET idle_session_timeout = '1min'; ALTER ROLE kai SET idle_in_transaction_session_timeout = '1min';"
6051
----
6152
+
62-
6353
(link:https://issues.redhat.com/browse/MTA-6204[MTA-6204])

0 commit comments

Comments
 (0)