Skip to content

Commit 16ee804

Browse files
author
GitHub Actions
committed
Release notes for Red Hat Developer Hub 1.6.0
Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0 Release notes for Red Hat Developer Hub 1.6.0
1 parent 33e9204 commit 16ee804

File tree

5 files changed

+285
-14
lines changed

5 files changed

+285
-14
lines changed

modules/release-notes/ref-release-notes-breaking-changes.adoc

Lines changed: 54 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,59 @@
44

55
This section lists breaking changes in {product} {product-version}.
66

7+
[id="removed-functionality-rhidp-6215"]
8+
== The Topology-specific permission `topology.view.read` is removed
9+
10+
Previously, the Topology plugin used `topology.view.read` permission to control access. Users were unable to configure Topology permissions using the RBAC UI. With this update, users can configure Kubernetes plugin permissions using the RBAC UI, which now governs the access to the Topology plugin. You can now use Kubernetes plugin permissions `kubernetes.clusters.read` and `kubernetes.resources.read` for the Topology plugin, as the topology-specific permission `topology.view.read` is removed.
11+
12+
If you are using a CSV permission file, update the following line:
13+
14+
.Old topology permission definition
15+
[source,csv]
16+
----
17+
p, role:default/topology-viewer, topology.view.read, read, allow
18+
----
19+
20+
.New topology permission definition
21+
[source,csv]
22+
----
23+
p, role:default/topology-viewer, kubernetes.clusters.read, read, allow
24+
p, role:default/topology-viewer, kubernetes.resources.read, read, allow
25+
----
26+
27+
28+
.Additional resources
29+
* link:https://issues.redhat.com/browse/RHIDP-6215[RHIDP-6215]
30+
31+
[id="removed-functionality-rhidp-7365"]
32+
== Migration to the core Auditor service
33+
34+
The Auditor format, including audit fields and event names, and IDs, has been updated to align with the new Auditor service conventions defined by the upstream Backstage Auditor Service. Filtering queries based on the old format may fail to work as expected.
35+
36+
37+
.Additional resources
38+
* link:https://issues.redhat.com/browse/RHIDP-7365[RHIDP-7365]
39+
40+
[id="removed-functionality-rhidp-7373"]
41+
== {product} introduces the Backstage Audit Log Service
42+
43+
{product} {product-version} introduces the Backstage Audit Log Service, which replaces the custom audit logging system. This is a significant structural and behavioral change to how audit events are generated and consumed.
44+
45+
The key changes introduced by this transition include the following:
46+
47+
* Audit logging is now delegated to Backstage plugins. Each plugin in Backstage is responsible for implementing and emitting its own audit events.
48+
49+
* Audit event names, structure, and content may differ per plugin. Audit events are scoped and designed independently within each plugin using the standardized upstream mechanism, which automatically captures actor details and plugin context.
50+
51+
* New Event Structure and Naming: Audit event names now follow Backstage’s conventions (for example, lowercase, kebab-case names), and include structured metadata such as `actionType`. Legacy {product-short} event names (for example, `ScaffolderTaskCreation`, `CatalogEntityDeletion`) are no longer used.
52+
53+
* Enhanced Log Context: Each audit event includes the plugin context, making it easier to filter logs for specific functional areas. You can filter by the event IDs or metadata associated with that plugin.
54+
55+
56+
57+
58+
.Additional resources
59+
* link:https://issues.redhat.com/browse/RHIDP-7373[RHIDP-7373]
60+
761

8-
None.
962

modules/release-notes/ref-release-notes-deprecated-functionalities.adoc

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,16 @@
44

55
This section lists deprecated functionalities in {product} {product-version}.
66

7+
[id="deprecated-functionality-rhidp-6368"]
8+
== Deprecation of dynamic imports with `import(...)`
9+
10+
The use of dynamic imports with `import(...)` has been deprecated and is no longer supported. The Backstage CLI supports native ESM in Node.js code, giving access to the importing of ESM-only packages. Therefore, you must now use `require(...)` as typeof `import(...)` when working with ESM or CommonJS packages.
11+
12+
13+
14+
15+
.Additional resources
16+
* link:https://issues.redhat.com/browse/RHIDP-6368[RHIDP-6368]
17+
718

8-
None.
919

modules/release-notes/ref-release-notes-fixed-issues.adoc

Lines changed: 60 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,66 @@
22
[id="fixed-issues"]
33
= Fixed issues
44

5-
This section lists issues fixed in {product} {product-version}.
5+
This section lists issues fixed in {product} {product-version} that have a significant impact on users.
6+
7+
== Fixed issues in 1.6.0
8+
9+
[id="bug-fix-rhidp-5731"]
10+
=== Updated the air-gapped installation guide for non-OpenShift platforms
11+
12+
Previously, {product} documentation did not highlight the {product-short} installation using Helm Chart in fully and partially air-gapped environments on supported Kubernetes platforms.
13+
14+
With this update, the documentation provides instructions for mirroring required container images, updating Helm values, and installing the chart, without relying on internet access.
15+
16+
17+
.Additional resources
18+
* link:https://issues.redhat.com/browse/RHIDP-5731[RHIDP-5731]
19+
20+
21+
[id="bug-fix-rhidp-6010"]
22+
=== Line wrapping enabled for long menu heading labels
23+
24+
Previously, menu items with long text such as _Platform Engineer Services_ were cut off in the sidebar menu. With this update, line wrapping has been enabled for long menu heading labels, preventing the trimming and ensuring full text visibility.
25+
26+
27+
.Additional resources
28+
* link:https://issues.redhat.com/browse/RHIDP-6010[RHIDP-6010]
29+
30+
31+
[id="bug-fix-rhidp-6015"]
32+
=== Dynamic favicon configuration in `app-config.yaml` is not displayed on the login page
33+
34+
Before this update, the app-config configuration `app.branding.iconLogo` was not applied as the favicon in the browser.
35+
36+
This issue has been fixed, and the app-config configuration `app.branding.iconLogo` now correctly sets the favicon in the browser.
37+
38+
39+
.Additional resources
40+
* link:https://issues.redhat.com/browse/RHIDP-6015[RHIDP-6015]
41+
42+
43+
[id="bug-fix-rhidp-6042"]
44+
=== Floating Action Button (FAB) positioned in the 'Bottom-Left' slot on {product-short}
45+
46+
Previously, the Floating Action Button (FAB) appeared over the navigation sidebar when the slot was set to 'bottom-left'. This placement obstructed access to navigation elements, potentially hindering user interaction.
47+
48+
With this update, the FAB's position is adjusted to render adjacent to the navigation for the 'bottom-left' slot position. As a result, users can access navigation options without obstruction.
49+
50+
51+
.Additional resources
52+
* link:https://issues.redhat.com/browse/RHIDP-6042[RHIDP-6042]
53+
54+
55+
[id="bug-fix-rhidp-6448"]
56+
=== Manually added resolutions override resolutions added by `--suppress-native-package`
57+
58+
Earlier, the `export-dynamic-plugin` command did not overwrite manually added resolutions, which could result in incorrect package dependencies in the exported dynamic plugin.
59+
60+
With this update, the `package export-dynamic-plugin` overwrites manually added resolutions, ensuring backstage dependencies are hoisted and native dependencies are suppressed from the exported dynamic plugin.
61+
62+
63+
.Additional resources
64+
* link:https://issues.redhat.com/browse/RHIDP-6448[RHIDP-6448]
665

766

8-
None.
967

Lines changed: 159 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,159 @@
1-
:_content-type: REFERENCE
2-
[id="new-features"]
3-
= New features
4-
5-
This section highlights new features in {product} {product-version}.
6-
7-
None.
8-
1+
:_content-type: REFERENCE
2+
[id="new-features"]
3+
= New features
4+
5+
This section highlights new features in {product} {product-version}.
6+
7+
[id="feature-rhidp-3597"]
8+
== OpenTelemetry metrics support added to the Keycloak backend plugin
9+
10+
With this update, the Keycloak backend plugin supports OpenTelemetry metrics, which monitors fetch operations and diagnoses potential issues.
11+
12+
The available counters include the following:
13+
14+
* `backend_keycloak_fetch_task_failure_count_total`: Counts fetch task failures where no data was returned due to an error.​
15+
16+
* `backend_keycloak_fetch_data_batch_failure_count_total`: Counts partial data batch failures. Even if some batches fail, the plugin continues fetching others.​
17+
18+
These counters include the `taskInstanceId` label, which uniquely identifies each scheduled fetch task, and allows you to trace failures back to individual task executions.
19+
20+
Example configuration:
21+
22+
```text
23+
backend_keycloak_fetch_data_batch_failure_count_total{taskInstanceId="df040f82-2e80-44bd-83b0-06a984ca05ba"} 1
24+
```
25+
26+
You can export metrics using any OpenTelemetry-compatible backend, such as **Prometheus**.
27+
28+
29+
[id="enhancement-rhidp-5039"]
30+
== Enhanced session duration control and refresh token cookie policy
31+
32+
With this update, the maximum age of the refresh token cookie has been reduced to 400 days to align with the modern web browser policies. Additionally, a new configurable field, `sessionDuration`, has been introduced in the supported authentication providers. This allows administrators to specify custom user session durations, enabling better control over session timeouts and enforced logouts.
33+
34+
For more information, see link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/1.5/html-single/authentication_in_red_hat_developer_hub/index#idm140459408106672[Authentication in {product}].
35+
36+
[id="enhancement-rhidp-5987"]
37+
== Updated Auditor Service
38+
39+
{product} {product-version} introduces an enhancement to the RBAC and Bulk Import plugins, enabling users to utilize Backstage's new Auditor service. The key features include: ​
40+
41+
* Audit log format update:
42+
43+
The audit log format has been updated to align with the new Auditor service conventions. Audit fields and event identifiers have been updated. Filtering queries based on the old format may no longer function as expected.​
44+
45+
* Backend Plugin API integration:
46+
47+
The audit log is now backed by the `@backstage/backend-plugin-api` package.​
48+
49+
* Audit events Grouping:
50+
51+
The Bulk Import backend plugin emits audit events for various operations, with the events are grouped logically by `eventId`.​
52+
53+
54+
55+
56+
[id="feature-rhidp-6158"]
57+
== Renamed `Create` to `Self-service`
58+
59+
The term `Create` has been renamed to `Self-service` across key UI areas to better align with the self-service functionality provided through the Backstage scaffolder, enhancing clarity for users.
60+
61+
This change applies to the following areas:
62+
63+
* Sidebar navigation
64+
* Global header
65+
* Catalog page
66+
* Scaffolder page
67+
68+
[id="enhancement-rhidp-6173"]
69+
== Simplify Operator-backed deployments on OpenShift with automatic `baseUrl` configuration
70+
71+
Previously, deploying {product-short} using the Operator required manually configuring the `baseUrl` settings in the custom app-config ConfigMap.
72+
73+
With this update, the Operator can now automatically compute the default application URL based on the OpenShift cluster ingress domain and the custom Route settings in the `Backstage` Custom Resource. It will then populate this as the default `baseUrl` in the app-config ConfigMap that it generates for the {product-short} instance. This functionality is specific to OpenShift. The Operator fills the following fields in the default app-config ConfigMap: `app.baseUrl`, `backend.baseUrl`, and `backend.cors.origin`. As a result, this eliminates the need to manually set such values for most Operator-backed deployments on OpenShift, though you can still override these settings in your custom app-config ConfigMap.
74+
75+
[id="enhancement-rhidp-6184"]
76+
== New sidebar item visibility configuration
77+
78+
{product} now supports a clean and flexible way to hide sidebar items using a new enabled key in the sidebar menu configuration. If set to false, the specified sidebar item will no longer appear in the UI, while maintaining full backward compatibility with existing configurations.
79+
80+
Example configuration:
81+
[source,yaml]
82+
----
83+
dynamicPlugins:
84+
frontend:
85+
default.main-menu-items:
86+
menuItems:
87+
default.home:
88+
title: Home
89+
icon: home
90+
enabled: false
91+
default.list:
92+
title: References
93+
icon: bookmarks
94+
default.my-group:
95+
parent: default.list
96+
default.learning-path:
97+
parent: default.list
98+
title: ''
99+
default.homepage:
100+
title: HomePage 123
101+
icon: home
102+
enabled: false
103+
default.create:
104+
title: Create
105+
icon: add
106+
parent: default.homepage
107+
----
108+
109+
You can now also toggle visibility of core sidebar elements like the logo, search, settings, and administration as shown:
110+
111+
[source,yaml]
112+
----
113+
app:
114+
sidebar:
115+
search: false # hides sidebar search
116+
logo: false # hides sidebar logo
117+
settings: false # hides settings item
118+
administration: false # hides administration item
119+
----
120+
121+
[id="feature-rhidp-6253"]
122+
== {product-short} community plugins updated to Backstage 1.36
123+
124+
The {product-short} community plugins have been updated to Backstage version 1.36.
125+
126+
[id="feature-rhidp-6269"]
127+
== Added a new RBAC conditional rule `IS_OWNER` to RBAC plugin
128+
129+
{product} introduces a new RBAC conditional rule, `IS_OWNER`, that allows administrators to assign ownership to roles and control access to the RBAC plugin. This enhancement enables more granular access control by allowing ownership-based filtering of roles, permission policies, and conditional policies.
130+
131+
This enhancement removes the resource type from the `policy.entity.create` permission, preventing conditional rules from being applied to the permission. You can update all permission policies that utilize the resource type `policy-entity` with the action `create` (for example `role:default/some_role, policy-entity, create, allow` to `role:default/some_role, policy.entity.create, create, allow`) to prevent degradation in the future.
132+
133+
134+
[id="feature-rhidp-6555"]
135+
== Support for high availability in {aks-brand-name}
136+
137+
{product} now supports high availability setups in {aks-brand-name} ({aks-short}). This enhancement allows the deployment to scale beyond a single replica, ensuring the application remains operational and accessible even in the event of failures or disruptions.
138+
139+
For more information, see link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/1.5/html-single/configuring_red_hat_developer_hub/index#HighAvailability[_Configuring high availability in Red Hat Developer Hub_].
140+
141+
[id="feature-rhidp-6764"]
142+
== Added `@backstage/plugin-scaffolder-backend-module-github` plugin for {product-short}
143+
144+
{product} now supports the `@backstage/plugin-scaffolder-backend-module-github` plugin, enabling GitHub Actions within software templates. With this integration, you can securely create and manage repositories, open pull requests, trigger GitHub Actions workflows, and more, all directly from the software template. This plugin empowers users to automate GitHub interactions and workflows with ease.
145+
146+
[id="enhancement-rhidp-6882"]
147+
== Default OIDC sign-in resolver updated
148+
149+
With this update, the default resolver for OIDC sign-in is set to `oidcSubClaimMatchingKeycloakUserId` to enhance security. This resolver is now also available as a configurable option under the sign-in resolver settings.
150+
151+
[id="feature-rhidp-7424"]
152+
== New dynamic plugin for Kubernetes scaffolder actions
153+
154+
With this update, {product-short} introduces the @backstage-community/plugin-scaffolder-backend-module-kubernetes plugin as a dynamic plugin, enabling Backstage template actions for Kubernetes. Currently, it includes the create-namespace action. This dynamic plugin is disabled by default.
155+
156+
For more information, see link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/1.5/html-single/dynamic_plugins_reference/index#red-hat-supported-plugins[{company-name} supported plugins].
157+
158+
159+

modules/release-notes/ref-release-notes-technology-preview.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,5 +13,4 @@ See: link:https://access.redhat.com/support/offerings/techpreview/[Technology Pr
1313
====
1414

1515

16-
None.
17-
16+
None.

0 commit comments

Comments
 (0)