You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/op-release-notes-1-6.adoc
+27-2Lines changed: 27 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ The `keep` and `keep-since` annotations are mutually exclusive. For any resource
77
77
78
78
* Administrators can disable the creation of the `pipeline` service account for the entire cluster, and prevent privilege escalation by misusing the associated SCC, which is very similar to `anyuid`.
79
79
80
-
* You can now configure feature flags and components by using the `TektonConfig` custom resource, and the custom resources for individual components, such as `TektonPipeline` and `TektonTriggers`. This level of granularity is useful for customization and testing of alpha features such as the Tekton OCI bundle for individual components.
80
+
* You can now configure feature flags and components by using the `TektonConfig` custom resource (CR) and the CRs for individual components, such as `TektonPipeline` and `TektonTriggers`. This level of granularity helps customize and test alpha features such as the Tekton OCI bundle for individual components.
81
81
82
82
* You can now configure optional `Timeouts` field for the `PipelineRun` resource. For example, you can configure timeouts separately for a pipeline run, each task run, and the `finally` tasks.
83
83
@@ -306,4 +306,29 @@ Error from server (InternalError): Internal error occurred: failed calling webho
306
306
** For implicit params:
307
307
*** Do not apply the `PipelineSpec` parameters to the `TaskRefs` object.
308
308
*** Disable implicit param behavior for the `Pipeline` objects.
== Release notes for {pipelines-title} General Availability 1.6.3
313
+
314
+
[id="fixed-issues-1-6-3_{context}"]
315
+
=== Fixed issues
316
+
317
+
* Before this update, the {pipelines-title} Operator installed pod security policies from components such as Pipelines and Triggers. However, the pod security policies shipped as part of the components were deprecated in an earlier release. With this update, the Operator stops installing pod security policies from components. As a result, the following upgrade paths are affected:
318
+
** Upgrading from {pipelines-shortname} 1.6.1 or 1.6.2 to {pipelines-shortname} 1.6.3 deletes the pod security policies, including those from the Pipelines and Triggers components.
319
+
** Upgrading from {pipelines-shortname} 1.5.x to 1.6.3 retains the pod security policies installed from components. As a cluster administrator, you can delete them manually.
320
+
+
321
+
[NOTE]
322
+
====
323
+
When you upgrade to future releases, the {pipelines-title} Operator will automatically delete all obsolete pod security policies.
324
+
====
325
+
// https://issues.redhat.com/browse/SRVKP-2259
326
+
327
+
* Before this update, only cluster administrators could access pipeline metrics in the {product-title} console. With this update, users with other cluster roles also can access the pipeline metrics.
328
+
// https://issues.redhat.com/browse/SRVKP-2129
329
+
330
+
* Before this update, role-based access control (RBAC) issues with the {pipelines-shortname} Operator caused problems upgrading or installing components. This update improves the reliability and consistency of installing various {pipelines-title} components.
331
+
// https://issues.redhat.com/browse/SRVKP-2249
332
+
333
+
* Before this update, setting the `clusterTasks` and `pipelineTemplates` fields to `false` in the `TektonConfig` CR slowed the removal of cluster tasks and pipeline templates. This update improves the speed of lifecycle management of Tekton resources such as cluster tasks and pipeline templates.
0 commit comments