You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ossm-rn-fixed-issues.adoc
+28-3Lines changed: 28 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,17 +14,42 @@ Provide the following info for each issue if possible:
14
14
*Result* - How has the behavior changed as a result? Try to avoid “It is fixed” or “The issue is resolved” or “The error no longer presents”.
15
15
////
16
16
17
-
The following issues have been resolved in the current release:
17
+
The following issue has been resolved in the current release:
18
18
19
-
* https://issues.redhat.com/browse/OSSM-4851[OSSM-4851] Previously, an error occurred in the operator deploying new pods in a namespace scoped inside the mesh when `runAsGroup`, `runAsUser`, or `fsGroup` parameters were `nil`. Now, a yaml validation has been added to avoid the `nil` value.
19
+
* https://issues.redhat.com/browse/OSSM-3647[OSSM-3647] Previously, in the {SMProductShortName} control plane (SMCP) v2.2 (Istio 1.12), WasmPlugins were applied only to inbound listeners. Since SMCP v2.3 (Istio 1.14), WasmPlugins have been applied to inbound and outbound listeners by default, which introduced regression for users of the 3scale WasmPlugin. Now, the environment variable `APPLY_WASM_PLUGINS_TO_INBOUND_ONLY` is added, which allows safe migration from SMCP v2.2 to v2.3 and v2.4.
20
+
+
21
+
The following setting should be added to the SMCP config:
22
+
+
23
+
[source, yaml]
24
+
----
25
+
spec:
26
+
runtime:
27
+
components:
28
+
pilot:
29
+
container:
30
+
env:
31
+
APPLY_WASM_PLUGINS_TO_INBOUND_ONLY: "true"
20
32
21
-
* https://issues.redhat.com/browse/OSSM-3771[OSSM-3771] Previously, OpenShift routes could not be disabled for additional ingress gateways defined in a Service Mesh Control Plane (SMCP). Now, a `routeConfig` block can be added to each `additionalIngress` gateway so the creation of OpenShift routes can be enabled or disabled for each gateway.
33
+
----
34
+
+
35
+
To ensure safe migration, perform the following steps:
36
+
+
37
+
--
38
+
. Set `APPLY_WASM_PLUGINS_TO_INBOUND_ONLY` in SMCP v2.2.
39
+
. Upgrade to 2.4.
40
+
. Set `spec.match[].mode: SERVER` in WasmPlugins.
41
+
. Remove the previously-added environment variable.
42
+
--
22
43
23
44
The following issues have been resolved in previous releases:
24
45
25
46
[id="ossm-rn-fixed-issues-ossm_{context}"]
26
47
== {SMProductShortName} fixed issues
27
48
49
+
* https://issues.redhat.com/browse/OSSM-4851[OSSM-4851] Previously, an error occurred in the operator deploying new pods in a namespace scoped inside the mesh when `runAsGroup`, `runAsUser`, or `fsGroup` parameters were `nil`. Now, a yaml validation has been added to avoid the `nil` value.
50
+
51
+
* https://issues.redhat.com/browse/OSSM-3771[OSSM-3771] Previously, OpenShift routes could not be disabled for additional ingress gateways defined in a Service Mesh Control Plane (SMCP). Now, a `routeConfig` block can be added to each `additionalIngress` gateway so the creation of OpenShift routes can be enabled or disabled for each gateway.
52
+
28
53
* https://issues.redhat.com/browse/OSSM-4197[OSSM-4197] Previously, if you deployed a v2.2 or v2.1 of the 'ServiceMeshControlPlane' resource, the `/etc/cni/multus/net.d/` directory was not created. As a result, the `istio-cni` pod failed to become ready, and the `istio-cni` pods log contained the following message:
Copy file name to clipboardExpand all lines: modules/ossm-rn-new-features.adoc
+77Lines changed: 77 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,33 @@ Module included in the following assemblies:
15
15
16
16
This release adds improvements related to the following components and concepts.
17
17
18
+
== New features {SMProductName} version 2.4.5
19
+
20
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
21
+
22
+
=== Component versions included in {SMProductName} version 2.4.5
23
+
//Component table updated for 2.4.5, 2.3.9, and 2.2.12
24
+
//Kiali updated to 1.65.11 Nov 8, 2023
25
+
//According to Distributed Tracing rel notes, Jaeger is unchanged
26
+
//Envoy remains unchanged
27
+
//Istio remains unchanged
28
+
|===
29
+
|Component |Version
30
+
31
+
|Istio
32
+
|1.16.7
33
+
34
+
|Envoy Proxy
35
+
|1.24.12
36
+
37
+
|Jaeger
38
+
|1.47.0
39
+
40
+
|Kiali
41
+
|1.65.11
42
+
|===
43
+
//Component table updated for 2.4.5, 2.3.9, and 2.2.12
44
+
18
45
== New features {SMProductName} version 2.4.4
19
46
20
47
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
@@ -259,6 +286,31 @@ endif::openshift-rosa[]
259
286
* {SMProductShortName} on ARM64 architecture is not supported.
260
287
* OpenTelemetry API remains a Technology Preview feature.
261
288
289
+
== New features {SMProductName} version 2.3.9
290
+
//Update with 2.4.5
291
+
292
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
293
+
294
+
=== Component versions included in {SMProductName} version 2.3.9
295
+
//Updated with 2.4.5
296
+
//Kiali updated to 1.57.14 Nov 8
297
+
|===
298
+
|Component |Version
299
+
300
+
|Istio
301
+
|1.14.5
302
+
303
+
|Envoy Proxy
304
+
|1.22.11
305
+
306
+
|Jaeger
307
+
|1.47.0
308
+
309
+
|Kiali
310
+
|1.57.14
311
+
|===
312
+
313
+
262
314
== New features {SMProductName} version 2.3.8
263
315
//Update with 2.4.4
264
316
@@ -538,6 +590,31 @@ Additionally, the SMMR must also be configured for cluster-wide deployment. This
538
590
----
539
591
<1> Adds all namespaces to the mesh, including any namespaces you subsequently create. The following namespaces are not part of the mesh: kube, openshift, kube-* and openshift-*.
540
592
593
+
== New features {SMProductName} version 2.2.12
594
+
595
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
596
+
597
+
=== Component versions included in {SMProductName} version 2.2.12
598
+
//2.2.12 released with 2.4.5
599
+
//Kiali updated to 1.48.11 Nov 8
600
+
|===
601
+
|Component |Version
602
+
603
+
|Istio
604
+
|1.12.9
605
+
606
+
|Envoy Proxy
607
+
|1.20.8
608
+
609
+
|Jaeger
610
+
|1.47.0
611
+
612
+
|Kiali
613
+
|1.48.11
614
+
|===
615
+
//2.2.12 being released with 2.4.5
616
+
617
+
541
618
== New features {SMProductName} version 2.2.11
542
619
543
620
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
0 commit comments