Skip to content

Commit fdf0b9c

Browse files
authored
Merge pull request #66747 from gwynnemonahan/OSSM-5165
OSSM-5165 OSSM 2.4.5: [DOC] Release Notes, Known Issues and Bug Fixes
2 parents 30bcecf + 5902033 commit fdf0b9c

File tree

3 files changed

+106
-4
lines changed

3 files changed

+106
-4
lines changed

_attributes/common-attributes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ endif::[]
146146
:product-rosa: Red Hat OpenShift Service on AWS
147147
:SMProductName: Red Hat OpenShift Service Mesh
148148
:SMProductShortName: Service Mesh
149-
:SMProductVersion: 2.4.4
149+
:SMProductVersion: 2.4.5
150150
:MaistraVersion: 2.4
151151
//Service Mesh v1
152152
:SMProductVersion1x: 1.1.18.2

modules/ossm-rn-fixed-issues.adoc

Lines changed: 28 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,42 @@ Provide the following info for each issue if possible:
1414
*Result* - How has the behavior changed as a result? Try to avoid “It is fixed” or “The issue is resolved” or “The error no longer presents”.
1515
////
1616

17-
The following issues have been resolved in the current release:
17+
The following issue has been resolved in the current release:
1818

19-
* https://issues.redhat.com/browse/OSSM-4851[OSSM-4851] Previously, an error occurred in the operator deploying new pods in a namespace scoped inside the mesh when `runAsGroup`, `runAsUser`, or `fsGroup` parameters were `nil`. Now, a yaml validation has been added to avoid the `nil` value.
19+
* https://issues.redhat.com/browse/OSSM-3647[OSSM-3647] Previously, in the {SMProductShortName} control plane (SMCP) v2.2 (Istio 1.12), WasmPlugins were applied only to inbound listeners. Since SMCP v2.3 (Istio 1.14), WasmPlugins have been applied to inbound and outbound listeners by default, which introduced regression for users of the 3scale WasmPlugin. Now, the environment variable `APPLY_WASM_PLUGINS_TO_INBOUND_ONLY` is added, which allows safe migration from SMCP v2.2 to v2.3 and v2.4.
20+
+
21+
The following setting should be added to the SMCP config:
22+
+
23+
[source, yaml]
24+
----
25+
spec:
26+
runtime:
27+
components:
28+
pilot:
29+
container:
30+
env:
31+
APPLY_WASM_PLUGINS_TO_INBOUND_ONLY: "true"
2032
21-
* https://issues.redhat.com/browse/OSSM-3771[OSSM-3771] Previously, OpenShift routes could not be disabled for additional ingress gateways defined in a Service Mesh Control Plane (SMCP). Now, a `routeConfig` block can be added to each `additionalIngress` gateway so the creation of OpenShift routes can be enabled or disabled for each gateway.
33+
----
34+
+
35+
To ensure safe migration, perform the following steps:
36+
+
37+
--
38+
. Set `APPLY_WASM_PLUGINS_TO_INBOUND_ONLY` in SMCP v2.2.
39+
. Upgrade to 2.4.
40+
. Set `spec.match[].mode: SERVER` in WasmPlugins.
41+
. Remove the previously-added environment variable.
42+
--
2243
2344
The following issues have been resolved in previous releases:
2445
2546
[id="ossm-rn-fixed-issues-ossm_{context}"]
2647
== {SMProductShortName} fixed issues
2748
49+
* https://issues.redhat.com/browse/OSSM-4851[OSSM-4851] Previously, an error occurred in the operator deploying new pods in a namespace scoped inside the mesh when `runAsGroup`, `runAsUser`, or `fsGroup` parameters were `nil`. Now, a yaml validation has been added to avoid the `nil` value.
50+
51+
* https://issues.redhat.com/browse/OSSM-3771[OSSM-3771] Previously, OpenShift routes could not be disabled for additional ingress gateways defined in a Service Mesh Control Plane (SMCP). Now, a `routeConfig` block can be added to each `additionalIngress` gateway so the creation of OpenShift routes can be enabled or disabled for each gateway.
52+
2853
* https://issues.redhat.com/browse/OSSM-4197[OSSM-4197] Previously, if you deployed a v2.2 or v2.1 of the 'ServiceMeshControlPlane' resource, the `/etc/cni/multus/net.d/` directory was not created. As a result, the `istio-cni` pod failed to become ready, and the `istio-cni` pods log contained the following message:
2954
+
3055
[source,terminal]

modules/ossm-rn-new-features.adoc

Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,33 @@ Module included in the following assemblies:
1515

1616
This release adds improvements related to the following components and concepts.
1717

18+
== New features {SMProductName} version 2.4.5
19+
20+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
21+
22+
=== Component versions included in {SMProductName} version 2.4.5
23+
//Component table updated for 2.4.5, 2.3.9, and 2.2.12
24+
//Kiali updated to 1.65.11 Nov 8, 2023
25+
//According to Distributed Tracing rel notes, Jaeger is unchanged
26+
//Envoy remains unchanged
27+
//Istio remains unchanged
28+
|===
29+
|Component |Version
30+
31+
|Istio
32+
|1.16.7
33+
34+
|Envoy Proxy
35+
|1.24.12
36+
37+
|Jaeger
38+
|1.47.0
39+
40+
|Kiali
41+
|1.65.11
42+
|===
43+
//Component table updated for 2.4.5, 2.3.9, and 2.2.12
44+
1845
== New features {SMProductName} version 2.4.4
1946

2047
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
@@ -259,6 +286,31 @@ endif::openshift-rosa[]
259286
* {SMProductShortName} on ARM64 architecture is not supported.
260287
* OpenTelemetry API remains a Technology Preview feature.
261288

289+
== New features {SMProductName} version 2.3.9
290+
//Update with 2.4.5
291+
292+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
293+
294+
=== Component versions included in {SMProductName} version 2.3.9
295+
//Updated with 2.4.5
296+
//Kiali updated to 1.57.14 Nov 8
297+
|===
298+
|Component |Version
299+
300+
|Istio
301+
|1.14.5
302+
303+
|Envoy Proxy
304+
|1.22.11
305+
306+
|Jaeger
307+
|1.47.0
308+
309+
|Kiali
310+
|1.57.14
311+
|===
312+
313+
262314
== New features {SMProductName} version 2.3.8
263315
//Update with 2.4.4
264316

@@ -538,6 +590,31 @@ Additionally, the SMMR must also be configured for cluster-wide deployment. This
538590
----
539591
<1> Adds all namespaces to the mesh, including any namespaces you subsequently create. The following namespaces are not part of the mesh: kube, openshift, kube-* and openshift-*.
540592

593+
== New features {SMProductName} version 2.2.12
594+
595+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
596+
597+
=== Component versions included in {SMProductName} version 2.2.12
598+
//2.2.12 released with 2.4.5
599+
//Kiali updated to 1.48.11 Nov 8
600+
|===
601+
|Component |Version
602+
603+
|Istio
604+
|1.12.9
605+
606+
|Envoy Proxy
607+
|1.20.8
608+
609+
|Jaeger
610+
|1.47.0
611+
612+
|Kiali
613+
|1.48.11
614+
|===
615+
//2.2.12 being released with 2.4.5
616+
617+
541618
== New features {SMProductName} version 2.2.11
542619

543620
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.

0 commit comments

Comments
 (0)