Skip to content

Commit f9c8d8e

Browse files
committed
Remove all introduced in 5.x mentions from the dev branch
1 parent d7baba2 commit f9c8d8e

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+213
-231
lines changed

modules/ROOT/pages/authentication-authorization/dbms-administration.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -469,7 +469,7 @@ GRANT [IMMUTABLE] SET PASSWORD[S]
469469
GRANT [IMMUTABLE] SET AUTH
470470
ON DBMS
471471
TO role[, ...]
472-
| label:new[Introduced in 5.24] Enables the specified roles to `SET` or `REMOVE` users' xref:authentication-authorization/auth-providers.adoc[auth providers].
472+
| Enables the specified roles to `SET` or `REMOVE` users' xref:authentication-authorization/auth-providers.adoc[auth providers].
473473

474474
| [source, syntax, role=noheader]
475475
GRANT [IMMUTABLE] SET USER HOME DATABASE
@@ -614,7 +614,7 @@ A user that is granted the `SET PASSWORDS` privilege is allowed to run the `ALTE
614614
ALTER USER jake SET PASSWORD 'abcd5678' CHANGE NOT REQUIRED
615615
----
616616

617-
label:new[Introduced in 5.24] A user that is granted the `SET AUTH` privilege is allowed to run the `ALTER USER` administration command with one or both of the `SET AUTH` and `REMOVE AUTH` parts:
617+
A user that is granted the `SET AUTH` privilege is allowed to run the `ALTER USER` administration command with one or both of the `SET AUTH` and `REMOVE AUTH` parts:
618618

619619
[source, cypher, role=noplay]
620620
----
@@ -1926,7 +1926,7 @@ a|Rows: 2
19261926
======
19271927

19281928

1929-
[role=label--new-5.6]
1929+
19301930
[[access-control-dbms-administration-setting]]
19311931
== The DBMS `SETTING` privileges
19321932

modules/ROOT/pages/authentication-authorization/ldap-integration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -334,7 +334,7 @@ dbms.security.ldap.authorization.access_permitted_group=501
334334
. Map the groups in the LDAP system to the Neo4j built-in and custom roles.
335335
For more information, see xref:authentication-authorization/ldap-integration.adoc#auth-ldap-map-ldap-roles[Map the LDAP groups to the Neo4j roles].
336336

337-
[role=label--new-5.24]
337+
[role=]
338338
[[auth-ldap-auth-providers]]
339339
== Configure authentication/authorization at the user level using auth providers
340340
xref:authentication-authorization/auth-providers.adoc[User auth providers] can be used to determine which users can authenticate and authorize using the configured providers, including LDAP.

modules/ROOT/pages/authentication-authorization/load-privileges.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,7 @@ GRANT [IMMUTABLE] LOAD
4646
GRANT [IMMUTABLE] LOAD
4747
ON CIDR cidr
4848
TO role[, ...]
49-
| Enables the specified roles to load external data from the given CIDR range in queries.label:new[Introduced in 5.16]
50-
49+
| Enables the specified roles to load external data from the given CIDR range in queries.
5150
|===
5251

5352
[NOTE]

modules/ROOT/pages/authentication-authorization/manage-privileges.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ The following image shows the hierarchy between different graph privileges:
203203
image::privileges_hierarchy.svg[title="Graph privileges hierarchy"]
204204

205205

206-
[role=label--new-5.9]
206+
207207
[[access-control-list-supported-privileges]]
208208
== Listing supported privileges
209209

modules/ROOT/pages/authentication-authorization/manage-users.adoc

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ CREATE USER name [IF NOT EXISTS]
152152
[[SET PASSWORD] CHANGE [NOT] REQUIRED]
153153
[SET STATUS {ACTIVE \| SUSPENDED}]
154154
[SET HOME DATABASE name]
155-
[SET AUTH [PROVIDER] 'provider' "{"{SET <key> <value>}..."}"]... # Introduced in Neo4j 5.24
155+
[SET AUTH [PROVIDER] 'provider' "{"{SET <key> <value>}..."}"]...
156156
----
157157

158158
`<key><value>` pairs for the `SET AUTH` clause could include:
@@ -203,7 +203,7 @@ CREATE OR REPLACE USER name
203203
[[SET PASSWORD] CHANGE [NOT] REQUIRED]
204204
[SET STATUS {ACTIVE \| SUSPENDED}]
205205
[SET HOME DATABASE name]
206-
[SET AUTH [PROVIDER] 'provider' "{"{SET <key> <value>}..."}"]... # Introduced in Neo4j 5.24
206+
[SET AUTH [PROVIDER] 'provider' "{"{SET <key> <value>}..."}"]...
207207
----
208208
`<key><value>` pairs for the `SET AUTH` clause could include:
209209
[source, syntax, role="noheader"]
@@ -292,7 +292,7 @@ ALTER USER name [IF EXISTS]
292292
[[SET PASSWORD] CHANGE [NOT] REQUIRED]
293293
[SET STATUS {ACTIVE \| SUSPENDED} ]
294294
[SET HOME DATABASE name]
295-
[SET AUTH [PROVIDER] 'provider' "{"{SET <key> <value>}..."}"]... # Introduced in Neo4j 5.24
295+
[SET AUTH [PROVIDER] 'provider' "{"{SET <key> <value>}..."}"]...
296296
----
297297
`<key><value>` pairs for the `SET AUTH` clause could include:
298298
[source, syntax, role="noheader"]
@@ -633,7 +633,7 @@ RETURN user AS adminUser
633633
|===
634634
======
635635

636-
[role=label--new-5.24]
636+
[role=]
637637
[[access-control-list-user-auth-providers]]
638638
== Listing user auth providers
639639

@@ -801,7 +801,7 @@ If not set, the default is `ACTIVE`.
801801
A home database is resolved if it is pointing to a database or a database alias.
802802
If no home database is set, the DBMS default database is used as the home database for that user.
803803

804-
<6> label:new[Introduced in 5.24] One or more `SET AUTH` clause can be used to configure external xref:authentication-authorization/auth-providers.adoc[auth providers], such as LDAP or OIDC, which define authentication/authorization providers for that user.
804+
<6> One or more `SET AUTH` clause can be used to configure external xref:authentication-authorization/auth-providers.adoc[auth providers], such as LDAP or OIDC, which define authentication/authorization providers for that user.
805805
`SET AUTH` can also be used as an alternative way to set the native (password-based) auth settings like `SET PASSWORD` and `SET PASSWORD CHANGE REQUIRED`.
806806
For further informations, see the examples in this section, as well as xref:authentication-authorization/sso-integration.adoc#auth-sso-auth-providers[Configure SSO at the user level using auth providers] for OIDC, and xref:authentication-authorization/ldap-integration.adoc#auth-ldap-auth-providers[Configure authentication/authorization at the user level using auth providers] for LDAP.
807807
+
@@ -838,7 +838,7 @@ SET STATUS SUSPENDED
838838
SET HOME DATABASE anotherDb
839839
----
840840
841-
[role=label--new-5.24]
841+
[role=]
842842
The equivalent command using the xref:authentication-authorization/auth-providers.adoc[auth providers] syntax would be:
843843
844844
[source,cypher,role=noplay]
@@ -862,7 +862,7 @@ SET ENCRYPTED PASSWORD '1,6d57a5e0b3317055454e455f96c98c750c77fb371f3f0634a1b8ff
862862
SET STATUS ACTIVE
863863
----
864864
865-
[role=label--new-5.24]
865+
[role=]
866866
The equivalent command using the xref:authentication-authorization/auth-providers.adoc[auth providers] syntax would be:
867867
.
868868
[source,cypher,role=noplay]
@@ -896,7 +896,7 @@ CREATE USER jake IF NOT EXISTS
896896
SET PLAINTEXT PASSWORD 'abcd1234'
897897
----
898898
899-
[role=label--new-5.24]
899+
[role=]
900900
The equivalent command using the xref:authentication-authorization/auth-providers.adoc[auth providers] syntax would be:
901901
902902
[source,cypher,role=noplay]
@@ -919,7 +919,7 @@ SET PLAINTEXT PASSWORD 'abcd1234'
919919
920920
This is equivalent to running `DROP USER jake IF EXISTS` followed by `CREATE USER jake SET PASSWORD 'abcd1234'`.
921921
922-
[role=label--new-5.24]
922+
[role=]
923923
The equivalent command using the xref:authentication-authorization/auth-providers.adoc[auth providers] syntax would be:
924924
925925
[source,cypher,role=noplay]
@@ -1004,7 +1004,7 @@ Where:
10041004
<1> Specifies the command to alter a user.
10051005
<2> Removes the home database for the user.
10061006
As a result, the DBMS default database will be used as the home database for that user.
1007-
<3> label:new[Introduced in 5.24] Removes one, several, or all existing xref:authentication-authorization/auth-providers.adoc[auth provider(s)] from a user.
1007+
<3> Removes one, several, or all existing xref:authentication-authorization/auth-providers.adoc[auth provider(s)] from a user.
10081008
However, a user must always have at least one auth provider.
10091009
Therefore, `REMOVE ALL AUTH` must be used in conjunction with at least one `SET AUTH` clause in order to meet this requirement.
10101010
<4> Specifies the password for the user.
@@ -1023,7 +1023,7 @@ The `SET PASSWORD` prefix of the `CHANGE [NOT] REQUIRED` clause is only optional
10231023
<6> Specifies the user's status.
10241024
<7> Specifies a home database for a user. A home database is resolved if it is pointing to a database or a database alias. If no home database is set, the DBMS default database is used as the home database for that user.
10251025

1026-
<8> label:new[Introduced in 5.24] One or more `SET AUTH` clauses can be used to set xref:authentication-authorization/auth-providers.adoc[auth providers], which define authentication / authorization providers for that user.
1026+
<8> One or more `SET AUTH` clauses can be used to set xref:authentication-authorization/auth-providers.adoc[auth providers], which define authentication / authorization providers for that user.
10271027
This might be used to configure external auth providers like LDAP or OIDC, but can also be used as an alternative way to set the native (password-based) auth settings like `SET PASSWORD` and `SET PASSWORD CHANGE REQUIRED`.
10281028
For further informations, see the examples in this section, as well as xref:authentication-authorization/sso-integration.adoc#auth-sso-auth-providers[Configure SSO at the user level using auth providers], and xref:authentication-authorization/ldap-integration.adoc#auth-ldap-auth-providers[Configure authentication/authorization at the user level using auth providers].
10291029
+
@@ -1050,7 +1050,7 @@ SET PASSWORD 'abcd5678' CHANGE NOT REQUIRED
10501050
SET STATUS ACTIVE
10511051
----
10521052
1053-
[role=label--new-5.24]
1053+
[role=]
10541054
The equivalent command using the xref:authentication-authorization/auth-providers.adoc[auth providers] syntax would be:
10551055
10561056
----
@@ -1070,7 +1070,7 @@ ALTER USER bob
10701070
SET PASSWORD CHANGE REQUIRED
10711071
----
10721072
1073-
[role=label--new-5.24]
1073+
[role=]
10741074
The equivalent command using the xref:authentication-authorization/auth-providers.adoc[auth providers] syntax would be:
10751075
10761076
----
@@ -1079,7 +1079,7 @@ SET AUTH 'native' {SET PASSWORD CHANGE REQUIRED}
10791079
----
10801080
======
10811081

1082-
[role=label--enterprise-edition label--new-5.24]
1082+
[role=label--enterprise-edition]
10831083
.Modify a user to use an external OIDC auth provider
10841084
======
10851085
For example, you can modify the user `bob` by removing his native auth provider and adding an external OIDC auth provider:
@@ -1092,7 +1092,7 @@ SET AUTH 'oidc-mysso1' {SET ID 'bobsUniqueMySso1Id'}
10921092
----
10931093
======
10941094

1095-
[role=label--enterprise-edition label--new-5.24]
1095+
[role=label--enterprise-edition]
10961096
.Modify a user to use multiple external OIDC auth providers
10971097
======
10981098
For example, you can modify the user `bob` by removing all of his existing auth providers and adding two external OIDC auth providers:

modules/ROOT/pages/authentication-authorization/sso-integration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ dbms.security.oidc.mysso.get_groups_from_user_info=true
271271
+
272272
It is possible to fetch just the username, just the groups, or both from the userinfo endpoint.
273273

274-
[role=label--new-5.24]
274+
[role=]
275275
[[auth-sso-auth-providers]]
276276
=== Configure SSO at the user level using auth providers
277277
xref:authentication-authorization/auth-providers.adoc[User auth providers] can be used to determine which users can authenticate and authorize using the configured providers.

modules/ROOT/pages/backup-restore/aggregate.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Consult Neo4j support before use.
9090
|false
9191

9292
|--temp-path=<path>
93-
|label:new[Introduced in 5.24] Provide a path to a temporary empty directory for storing backup files until the command is completed. The files will be deleted once the command is finished.
93+
|Provide a path to a temporary empty directory for storing backup files until the command is completed. The files will be deleted once the command is finished.
9494
|
9595

9696
|--verbose
@@ -151,7 +151,7 @@ The following examples show how to perform aggregation of a set of backups locat
151151

152152
[.tabbed-example]
153153
=====
154-
[role=include-with-AWS-S3 label--new-5.19]
154+
[role=include-with-AWS-S3]
155155
======
156156

157157
include::partial$/aws-s3-overrides.adoc[]
@@ -167,7 +167,7 @@ bin/neo4j-admin database aggregate-backup --from-path=s3://myBucket/myDirectory/
167167
----
168168
======
169169
170-
[role=include-with-Google-cloud-storage label--new-5.21]
170+
[role=include-with-Google-cloud-storage]
171171
======
172172

173173
include::partial$/gcs-credentials.adoc[]
@@ -181,7 +181,7 @@ bin/neo4j-admin database aggregate-backup --from-path=gs://myBucket/myDirectory/
181181
----
182182
======
183183
184-
[role=include-with-Azure-cloud-storage label--new-5.24]
184+
[role=include-with-Azure-cloud-storage]
185185
======
186186

187187
include::partial$/azb-credentials.adoc[]

modules/ROOT/pages/backup-restore/copy-database.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Cannot be combined with `--ignore-relationships-with-types`.
111111
|
112112

113113
|--copy-schema
114-
|label:new[Introduced in 5.20] Copy the schema instead of generating schema statements, meaning index and constraint definitions.
114+
|Copy the schema instead of generating schema statements, meaning index and constraint definitions.
115115
The indexes will be built the first time the database is started.
116116
|
117117

@@ -175,7 +175,7 @@ Cannot be combined with `--skip-properties` or `--copy-only-relationship-propert
175175
|
176176

177177
|--temp-path=<path>
178-
|label:new[Introduced in 5.24] Path to a directory to be used as a staging area when the source and target databases are the same. Default is the current directory.
178+
|Path to a directory to be used as a staging area when the source and target databases are the same. Default is the current directory.
179179
|
180180

181181
|--to-format=<format>
@@ -206,7 +206,7 @@ If you go from `high_limit` to `standard` or `aligned`, there is no validation t
206206
[role=label--enterprise-edition]
207207
[NOTE]
208208
====
209-
The block format is introduced in Neo4j 5.14 and from Neo4j 5.22, is the default format for all newly-created databases as long as they do not have the xref:configuration/configuration-settings.adoc#config_db.format[`db.format`] setting specified.
209+
The block format is the default format for all newly-created databases as long as they do not have the xref:configuration/configuration-settings.adoc#config_db.format[`db.format`] setting specified.
210210
For more information on the block format, see xref:database-internals/store-formats.adoc[Store formats].
211211
====
212212

@@ -323,7 +323,7 @@ bin/neo4j-admin database copy neo4j neo4j --compact-node-store --temp-path=<my-p
323323
+
324324
[TIP]
325325
====
326-
`--temp-path`, introduced in Neo4j 5.24, can be used to specify a different directory to use as a temporary staging area.
326+
`--temp-path` can be used to specify a different directory to use as a temporary staging area.
327327
If omitted, the current working directory will be used.
328328
329329
From Neo4j 5.20 onwards, you can use the `--copy-schema` option to automatically copy the schema.

modules/ROOT/pages/backup-restore/offline-backup.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ The following examples show how to dump a database to a cloud storage bucket usi
130130

131131
[.tabbed-example]
132132
=====
133-
[role=include-with-AWS-S3 label--new-5.19]
133+
[role=include-with-AWS-S3]
134134
======
135135

136136
include::partial$/aws-s3-overrides.adoc[]
@@ -145,7 +145,7 @@ bin/neo4j-admin database dump mydatabase --to-path=s3://myBucket/myDirectory/
145145
----
146146
======
147147
148-
[role=include-with-Google-cloud-storage label--new-5.21]
148+
[role=include-with-Google-cloud-storage]
149149
======
150150

151151
include::partial$/gcs-credentials.adoc[]
@@ -158,7 +158,7 @@ bin/neo4j-admin database dump mydatabase --to-path=gs://myBucket/myDirectory/
158158
----
159159
======
160160
161-
[role=include-with-Azure-cloud-storage label--new-5.24]
161+
[role=include-with-Azure-cloud-storage]
162162
======
163163

164164
include::partial$/azb-credentials.adoc[]

modules/ROOT/pages/backup-restore/online-backup.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ Note: this is an EXPERIMENTAL option. Consult Neo4j support before use.
170170
|false
171171

172172
|--temp-path=<path>
173-
|label:new[Introduced in 5.24] Provide a path to a temporary empty directory for storing backup files until the command is completed. The files will be deleted once the command is finished.
173+
|Provide a path to a temporary empty directory for storing backup files until the command is completed. The files will be deleted once the command is finished.
174174
|
175175

176176
|--to-path=<path>
@@ -420,7 +420,7 @@ The following examples show how to back up a database to a cloud storage bucket
420420

421421
[.tabbed-example]
422422
=====
423-
[role=include-with-AWS-S3 label--new-5.19]
423+
[role=include-with-AWS-S3]
424424
======
425425

426426
include::partial$/aws-s3-overrides.adoc[]
@@ -436,7 +436,7 @@ bin/neo4j-admin database backup --to-path=s3://myBucket/myDirectory/ mydatabase
436436

437437
======
438438
439-
[role=include-with-Google-cloud-storage label--new-5.21]
439+
[role=include-with-Google-cloud-storage]
440440
======
441441

442442
include::partial$/gcs-credentials.adoc[]
@@ -448,7 +448,7 @@ include::partial$/gcs-credentials.adoc[]
448448
bin/neo4j-admin database backup --to-path=gs://myBucket/myDirectory/ mydatabase
449449
----
450450
======
451-
[role=include-with-Azure-cloud-storage label--new-5.24]
451+
[role=include-with-Azure-cloud-storage]
452452
======
453453

454454
include::partial$/azb-credentials.adoc[]

0 commit comments

Comments
 (0)