Skip to content

Commit ec18e44

Browse files
Release Notes for SBO 1.1.1
1 parent 1efb5bb commit ec18e44

File tree

2 files changed

+60
-0
lines changed

2 files changed

+60
-0
lines changed

applications/connecting_applications_to_services/sbo-release-notes.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ Note the following scope of support on the Red Hat Customer Portal for these fea
4848
|*{servicebinding-title}* 2+|*API Group and Support Status*|*OpenShift Versions*
4949

5050
|*Version*|*`binding.operators.coreos.com`* |*`servicebinding.io`* |
51+
|1.1.1 |GA |TP |4.7-4.10
5152
|1.1 |GA |TP |4.7-4.10
5253
|1.0.1 |GA |TP |4.7-4.9
5354
|1.0 |GA |TP |4.7-4.9
@@ -60,6 +61,7 @@ Note the following scope of support on the Red Hat Customer Portal for these fea
6061
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see link:https://www.redhat.com/en/blog/making-open-source-more-inclusive-eradicating-problematic-language[Red Hat CTO Chris Wright's message].
6162

6263
// Modules included, most to least recent
64+
include::modules/sbo-release-notes-1-1-1.adoc[leveloffset=+1]
6365
include::modules/sbo-release-notes-1-1.adoc[leveloffset=+1]
6466
include::modules/sbo-release-notes-1-0-1.adoc[leveloffset=+1]
6567
include::modules/sbo-release-notes-1-0.adoc[leveloffset=+1]

modules/sbo-release-notes-1-1-1.adoc

Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
[id="sbo-release-notes-1-1-1_{context}"]
2+
// Module included in the following assembly:
3+
//
4+
// * applications/connecting_applications_to_services/sbo-release-notes.adoc
5+
:_content-type: REFERENCE
6+
= Release notes for {servicebinding-title} 1.1.1
7+
8+
{servicebinding-title} 1.1.1 is now available on {product-title} 4.7, 4.8, 4.9, and 4.10.
9+
10+
[id="fixed-issues-1-1-1_{context}"]
11+
== Fixed issues
12+
* Before this update, a security vulnerability `CVE-2021-38561` was noted for {servicebinding-title} Helm chart. This update fixes the `CVE-2021-38561` error and updates the `golang.org/x/text` package from v0.3.6 to v0.3.7. link:https://issues.redhat.com/browse/APPSVC-1124[APPSVC-1124]
13+
14+
* Before this update, users of the Developer Sandbox did not have sufficient permissions to read `ClusterWorkloadResourceMapping` resources. As a result, {servicebinding-title} prevented all service bindings from being successful. With this update, the {servicebinding-title} now includes the appropriate role-based access control (RBAC) rules for any authenticated subject including the Developer Sandbox users. These RBAC rules allow the {servicebinding-title} to `get`, `list`, and `watch` the `ClusterWorkloadResourceMapping` resources for the Developer Sandbox users and to process service bindings successfully. link:https://issues.redhat.com/browse/APPSVC-1135[APPSVC-1135]
15+
16+
[id="known-issues-1-1-1_{context}"]
17+
== Known issues
18+
* There is currently a known issue with installing {servicebinding-title} in a single namespace installation mode. The absence of an appropriate namespace-scoped role-based access control (RBAC) rule prevents the successful binding of an application to a few known Operator-backed services that the {servicebinding-title} can automatically detect and bind to. When this happens, it generates an error message similar to the following example:
19+
+
20+
.Example error message
21+
[source,text]
22+
----
23+
`postgresclusters.postgres-operator.crunchydata.com "hippo" is forbidden:
24+
User "system:serviceaccount:my-petclinic:service-binding-operator" cannot
25+
get resource "postgresclusters" in API group "postgres-operator.crunchydata.com"
26+
in the namespace "my-petclinic"`
27+
----
28+
+
29+
Workaround 1: Install the {servicebinding-title} in the `all namespaces` installation mode. As a result, the appropriate cluster-scoped RBAC rule now exists and the binding succeeds.
30+
+
31+
Workaround 2: If you cannot install the {servicebinding-title} in the `all namespaces` installation mode, install the following role binding into the namespace where the {servicebinding-title} is installed:
32+
+
33+
.Example: Role binding for Crunchy Postgres Operator
34+
[source,yaml]
35+
----
36+
kind: RoleBinding
37+
apiVersion: rbac.authorization.k8s.io/v1
38+
metadata:
39+
name: service-binding-crunchy-postgres-viewer
40+
subjects:
41+
- kind: ServiceAccount
42+
name: service-binding-operator
43+
roleRef:
44+
apiGroup: rbac.authorization.k8s.io
45+
kind: ClusterRole
46+
name: service-binding-crunchy-postgres-viewer-role
47+
----
48+
link:https://issues.redhat.com/browse/APPSVC-1062[APPSVC-1062]
49+
50+
* Currently, when you modify the `ClusterWorkloadResourceMapping` resources, the {servicebinding-title} does not implement correct behavior. As a workaround, perform the following steps:
51+
+
52+
--
53+
. Delete any `ServiceBinding` resources that use the corresponding `ClusterWorkloadResourceMapping` resource.
54+
. Modify the `ClusterWorkloadResourceMapping` resource.
55+
. Re-apply the `ServiceBinding` resources that you previously removed in step 1.
56+
--
57+
+
58+
link:https://issues.redhat.com/browse/APPSVC-1102[APPSVC-1102]

0 commit comments

Comments
 (0)