Skip to content

Commit af58c4b

Browse files
authored
Merge pull request #55040 from Dhruv-Soni11/RHDEVDOCS-4891
Added the new changes for 1.9 Pipelines RN
2 parents 57077a8 + 0ca23c8 commit af58c4b

File tree

1 file changed

+27
-6
lines changed

1 file changed

+27
-6
lines changed

modules/op-release-notes-1-9.adoc

Lines changed: 27 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,12 @@ In addition to the fixes and stability improvements, the following sections high
7777
[id="operator-new-features-1-9_{context}"]
7878
=== Operator
7979

80-
* With this update, you can install {pac} as a separate component, not as a part of `TektonAddon`. You can configure {pac} in the `TektonConfig` CRD.
80+
* With this update, {pac} is installed by default. You can disable {pac} by using the `-p` flag:
81+
+
82+
[source,yaml]
83+
----
84+
$ oc patch tektonconfig config --type="merge" -p '{"spec": {"platforms": {"openshift":{"pipelinesAsCode": {"enable": false}}}}}'
85+
----
8186

8287
* With this update, you can also modify {pac} configurations in the `TektonConfig` CRD.
8388

@@ -246,7 +251,10 @@ If you do not add any configuration data, you can use the default data in the AP
246251

247252
* With this update, support for `tekton.dev/v1alpha1` API pipeline resources, such as Pipeline, PipelineRun, Task, Clustertask, and TaskRun has been removed.
248253

249-
* With this update, the `tkn-pac setup` command has been removed. You can now re-use the functionality provided by the `tkn-pac setup` command by using the `tkn-pac webhook add` and `tkn-pac webhook update-token` commands. You can use the `tkn-pac webhook add` command to re-add a webhook to an existing Git repository. You can use the `tkn-pac webhook update-token` command to update the personal provider access token for an existing Secret object in the Git repository.
254+
* With this update, the `tkn-pac setup` command has been removed. Instead, use the `tkn-pac webhook add` command to re-add a webhook to an existing Git repository. And use the `tkn-pac webhook update-token` command to update the personal provider access token for an existing Secret object in the Git repository.
255+
256+
* With this update, a namespace that runs a pipeline with default settings does not apply the `pod-security.kubernetes.io/enforce:privileged` label to a workload.
257+
250258

251259
[id="deprecated-features-1-9_{context}"]
252260
== Deprecated and removed features
@@ -279,7 +287,7 @@ Workaround: Set the `NO_COLOR` environment variable to `true`.
279287

280288
* Running the `tkn pac resolve -f <filename> | oc create -f` command may not provide expected results, if the `tkn pac resolve` command uses a templated parameter value to function.
281289
+
282-
Workaround: To mitigate this issue, save the output of `tkn pac resolve` in a temporary file by running the `tkn pac resolve -f <filename> -o tempfile.yaml` command and then run the `oc create -f tempfile.yaml` command. For example, `tkn pac resolve -f <filename> -o /tmp/pull-request-resolved.yaml && kubectl create -f /tmp/pull-request-resolved.yaml`.
290+
Workaround: To mitigate this issue, save the output of `tkn pac resolve` in a temporary file by running the `tkn pac resolve -f <filename> -o tempfile.yaml` command and then run the `oc create -f tempfile.yaml` command. For example, `tkn pac resolve -f <filename> -o /tmp/pull-request-resolved.yaml && oc create -f /tmp/pull-request-resolved.yaml`.
283291

284292
[id="fixed-issues-1-9_{context}"]
285293
== Fixed issues
@@ -292,11 +300,24 @@ Workaround: To mitigate this issue, save the output of `tkn pac resolve` in a te
292300
* Before this update, if duplicate secrets were present in a service account for a pipelines run, it resulted in failure in task pod creation. With this update, this issue is resolved and the task pod is created successfully even if duplicate secrets are present in a service account.
293301
// Vincent Demeester
294302

295-
* Before this update, by looking at the TaskRun's `spec.StatusMessage` field, users could not distinguish whether the `TaskRun` had been cancelled by the user or by a `PipelineRun` that was part of it. With this update, this issue is resolved and users can distinguish the status of the `TaskRun` by looking at the TaskRun's `spec.StatusMessage` field.
303+
* Before this update, by looking at the TaskRun's `spec.StatusMessage` field, users could not distinguish whether the `TaskRun` had been cancelled by the user or by a `PipelineRun` that was part of it. With this update, this issue is resolved and users can distinguish the status of the `TaskRun` by looking at the TaskRun's `spec.StatusMessage` field.
296304
// Vincent Demeester
297305

298306
* Before this update, webhook validation was removed on deletion of old versions of invalid objects. With this update, this issue is resolved.
299-
// Vincent Demeester @vdeemester
307+
// Vincent Demeester @vdeemester
308+
309+
* Before this update, if you set the `timeouts.pipeline` parameter to `0`, you could not set the `timeouts.tasks` parameter or the `timeouts.finally` parameters. This update resolves the issue. Now, when you set the `timeouts.pipeline` parameter value, you can set the value of either the`timeouts.tasks` parameter or the `timeouts.finally` parameter. For example:
310+
+
311+
[source,yaml]
312+
----
313+
yaml
314+
kind: PipelineRun
315+
spec:
316+
timeouts:
317+
pipeline: "0" # No timeout
318+
tasks: "0h3m0s"
319+
----
320+
// Vincent Demeester @vdeemester
300321

301322
* Before this update, a race condition could occur if another tool updated labels or annotations on a PipelineRun or TaskRun. With this update, this issue is resolved and you can merge labels or annotations.
302323
// Vincent Demeester @vdeemester
@@ -317,7 +338,7 @@ Workaround: To mitigate this issue, save the output of `tkn pac resolve` in a te
317338
// https://github.com/tektoncd/cli/pull/1557
318339
// Piyush Garg @piyush-garg
319340

320-
* Before this update, if the parent pipelinerun was running while deleting TaskRuns, then TaskRuns would be deleted. With this update, this issue is resolved and TaskRuns are not getting deleted if the parent PipelineRun is running.
341+
* Before this update, if the parent PipelineRun was running while deleting TaskRuns, then TaskRuns would be deleted. With this update, this issue is resolved and TaskRuns are not getting deleted if the parent PipelineRun is running.
321342
// https://github.com/tektoncd/cli/pull/1736
322343
// Piyush Garg @piyush-garg
323344

0 commit comments

Comments
 (0)