|
| 1 | +[id="sbo-release-notes-1-1_{context}"] |
| 2 | +// Module included in the following assembly: |
| 3 | +// |
| 4 | +// * applications/connecting_applications_to_services/sbo-release-notes.adoc |
| 5 | +:_content-type: REFERENCE |
| 6 | += Release notes for {servicebinding-title} 1.1 |
| 7 | + |
| 8 | +{servicebinding-title} is now available on {product-title} 4.7, 4.8, 4.9, and 4.10. |
| 9 | + |
| 10 | +[id="new-features-1-1_{context}"] |
| 11 | +== New features |
| 12 | +This section highlights what is new in {servicebinding-title} 1.1: |
| 13 | + |
| 14 | +* Service Binding Options |
| 15 | +** Workload resource mapping: Define exactly where binding data needs to be projected for the secondary workloads. |
| 16 | +** Bind new workloads using a label selector. |
| 17 | + |
| 18 | + |
| 19 | +[id="fixed-issues-1-1_{context}"] |
| 20 | +== Fixed issues |
| 21 | +* Before this update, service bindings that used label selectors to pick up workloads did not project service binding data into the new workloads that matched the given label selectors. As a result, the Service Binding Operator could not periodically bind such new workloads. With this update, service bindings now project service binding data into the new workloads that match the given label selector. The Service Binding Operator now periodically attempts to find and bind such new workloads. link:https://issues.redhat.com/browse/APPSVC-1083[APPSVC-1083] |
| 22 | + |
| 23 | + |
| 24 | +[id="known-issues-1-1_{context}"] |
| 25 | +== Known issues |
| 26 | +* There is currently a known issue with installing {servicebinding-title} in a single namespace installation mode. The absence of an appropriate namespace-scoped role-based access control (RBAC) rule prevents the successful binding of an application to a few known Operator-backed services that the {servicebinding-title} can automatically detect and bind to. When this happens, it generates an error message similar to the following example: |
| 27 | ++ |
| 28 | +.Example error message |
| 29 | +[source,text] |
| 30 | +---- |
| 31 | +`postgresclusters.postgres-operator.crunchydata.com "hippo" is forbidden: |
| 32 | + User "system:serviceaccount:my-petclinic:service-binding-operator" cannot |
| 33 | + get resource "postgresclusters" in API group "postgres-operator.crunchydata.com" |
| 34 | + in the namespace "my-petclinic"` |
| 35 | +---- |
| 36 | ++ |
| 37 | +Workaround 1: Install the {servicebinding-title} in the `all namespaces` installation mode. As a result, the appropriate cluster-scoped RBAC rule now exists and the binding succeeds. |
| 38 | ++ |
| 39 | +Workaround 2: If you cannot install the {servicebinding-title} in the `all namespaces` installation mode, install the following role binding into the namespace where the {servicebinding-title} is installed: |
| 40 | ++ |
| 41 | +.Example: Role binding for Crunchy Postgres Operator |
| 42 | +[source,yaml] |
| 43 | +---- |
| 44 | +kind: RoleBinding |
| 45 | +apiVersion: rbac.authorization.k8s.io/v1 |
| 46 | +metadata: |
| 47 | + name: service-binding-crunchy-postgres-viewer |
| 48 | +subjects: |
| 49 | + - kind: ServiceAccount |
| 50 | + name: service-binding-operator |
| 51 | +roleRef: |
| 52 | + apiGroup: rbac.authorization.k8s.io |
| 53 | + kind: ClusterRole |
| 54 | + name: service-binding-crunchy-postgres-viewer-role |
| 55 | +---- |
| 56 | +link:https://issues.redhat.com/browse/APPSVC-1062[APPSVC-1062] |
| 57 | + |
| 58 | +* Currently, when you modify the `ClusterWorkloadResourceMapping` resources, the {servicebinding-title} does not implement correct behavior. As a workaround, perform the following steps: |
| 59 | ++ |
| 60 | +-- |
| 61 | +. Delete any `ServiceBinding` resources that use the corresponding `ClusterWorkloadResourceMapping` resource. |
| 62 | +. Modify the `ClusterWorkloadResourceMapping` resource. |
| 63 | +. Re-apply the `ServiceBinding` resources that you previously removed in step 1. |
| 64 | +-- |
| 65 | ++ |
| 66 | +link:https://issues.redhat.com/browse/APPSVC-1102[APPSVC-1102] |
0 commit comments