Skip to content

Commit 4c22f0d

Browse files
authored
Merge pull request #76758 from anarnold97/OADP-3171-Release-Notes-for-OADP-1.2.5
OADP-3171: Release notes for OADP 1.2.5
2 parents d823161 + e17bcf9 commit 4c22f0d

File tree

2 files changed

+49
-0
lines changed

2 files changed

+49
-0
lines changed

backup_and_restore/application_backup_and_restore/release-notes/oadp-release-notes-1-2.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ toc::[]
99

1010
The release notes for OpenShift API for Data Protection (OADP) 1.2 describe new features and enhancements, deprecated features, product recommendations, known issues, and resolved issues.
1111

12+
include::modules/oadp-release-notes-1-2-5.adoc[leveloffset=+1]
13+
1214
include::modules/oadp-release-notes-1-2-4.adoc[leveloffset=+1]
1315

1416
include::modules/oadp-release-notes-1-2-3.adoc[leveloffset=+1]

modules/oadp-release-notes-1-2-5.adoc

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * backup_and_restore/oadp-release-notes-1-2.adoc
4+
5+
:_mod-docs-content-type: REFERENCE
6+
[id="migration-oadp-release-notes-1-2-5_{context}"]
7+
= OADP 1.2.5 release notes
8+
9+
{oadp-first} 1.2.5 is a Container Grade Only (CGO) release, released to refresh the health grades of the containers, with no changes to any code in the product itself compared to that of {oadp-short} 1.2.4.
10+
11+
[id="resolved-issues-1-2-5_{context}"]
12+
== Resolved issues
13+
14+
// There are no resolved issues in {oadp-short} 1.2.5.
15+
16+
.CVE-2023-2431: `oadp-velero-plugin-for-microsoft-azure-container`: Bypass of seccomp profile enforcement
17+
18+
A flaw was found in Kubernetes, which impacts earlier versions of {oadp-short}. This flaw arises when Kubernetes allows a local authenticated attacker to bypass security restrictions, caused by a flaw when using the localhost type for a `seccomp` profile but specifying an empty profile field. An attacker can bypass the `seccomp` profile enforcement by sending a specially crafted request. This flaw has been resolved in {oadp-short} 1.2.5.
19+
20+
For more details, see link:https://access.redhat.com/security/cve/CVE-2023-2431[(CVE-2023-2431)].
21+
22+
.CSI restore ended with 'PartiallyFailed' status and PVCs not created
23+
24+
CSI restore ended with `PartiallyFailed` status. PVCs are not created, pod are in `Pending` status. This issue has been resolved in {oadp-short} 1.2.5.
25+
26+
link:https://issues.redhat.com/browse/OADP-1956[(OADP-1956)]
27+
28+
.PodVolumeBackup fails on completed pod volumes
29+
30+
In earlier versions of {oadp-short} 1.2, when there is a completed pod that mounted volumes in a namespace used by the Restic `podvolumebackup` or Velero backup, the backup does not complete successfully. This occurs when `defaultVolumesToFsBackup` is set to `true`. This issue has been resolved in {oadp-short} 1.2.5.
31+
32+
link:https://issues.redhat.com/browse/OADP-1870[(OADP-1870)]
33+
34+
35+
[id="known-issues-1-2-5_{context}"]
36+
== Known issues
37+
38+
// The {oadp-short} 1.2.5 has the following known issue:
39+
40+
.Data Protection Application (DPA) does not reconcile when the credentials secret is updated
41+
42+
Currently, the {oadp-short} Operator does not reconcile when you update the `cloud-credentials` secret. This occurs because there are no {oadp-short} specific labels or owner references on the `cloud-credentials` secret. If you create a `cloud-credentials` secret with incorrect credentials, such as empty data, the Operator reconciles and creates a backup storage location (BSL) and registry deployment with the empty data. As a result, when you update the `cloud-credentials` secret with the correct credentials, the {oadp-short} Operator does not immediately reconcile to catch the new credentials.
43+
44+
Workaround: Update to {oadp-short} 1.3.
45+
46+
link:https://issues.redhat.com/browse/OADP-3327[(OADP-3327)]
47+

0 commit comments

Comments
 (0)