Skip to content

Commit 4108463

Browse files
authored
[release-1.5] RHIDP-4741: RHDH 1.5 Release Notes (#979)
* New Features for RHDH 1.5 RNs * fixed issues for RHDH 1.5 RNs * Breaking changes RHDH 1.5 RNs * Deprecated functionality for RHDH 1.5 RNs * Technology preview features for RHDH 1.5 RNs * Updated new features, deprecations, and fixed issues * Known issues in RHDH 1.5 RNs * Review comments and deprecation entry * review comments incorporated * Review comments incorporated and RHIDP-6398 removing static content of fixed security issues * Fixed minor issue * Removal notice for RHSSO * Known issue 6455 added * Peer review comments incorporated * replaced marketplace with extensions as per RHIDP-2757 * HA update * review comment incorporated * Added doc links in RNs * doc links fixed
1 parent efb2c1a commit 4108463

9 files changed

+586
-19
lines changed

assemblies/assembly-release-notes-fixed-security-issues.adoc

Lines changed: 0 additions & 12 deletions
This file was deleted.

modules/release-notes/ref-release-notes-breaking-changes.adoc

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,5 +5,20 @@
55
This section lists breaking changes in {product} {product-version}.
66

77

8-
None.
8+
[id="breaking-change-rhidp-5812"]
9+
== The `scopes` parameter is now required for GitLab project deploy token creation
910

11+
The `scopes` parameter is now mandatory for the `gitlab:projectDeployToken:create` action. A valid value, such as `['read_repository']`, must be provided.
12+
13+
.Additional resources
14+
* link:https://issues.redhat.com/browse/RHIDP-5812[RHIDP-5812]
15+
16+
[id="breaking-change-rhidp-5568"]
17+
== The `dynamicPlugins.cache.volumeClaimSpec` field is removed from the Helm Chart, dynamic plugin storage is now ephemeral
18+
19+
The `dynamicPlugins.cache.volumeClaimSpec` field has been removed from `values.yaml`, making all dynamic plugin storage ephemeral by default. Instead of the Helm chart managing persistent volume claim (PVC) creation, you must now manually configure ephemeral volume claims under `extraVolumes`.
20+
21+
This change also resolves issues with running multi-replica {product-very-short} deployments, as using a PVC for the Dynamic Plugins cache previously led to potential write conflicts.
22+
23+
.Additional resources
24+
* link:https://issues.redhat.com/browse/RHIDP-5568[RHIDP-5568]

modules/release-notes/ref-release-notes-deprecated-functionalities.adoc

Lines changed: 62 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,67 @@
44

55
This section lists deprecated functionalities in {product} {product-version}.
66

7+
[id="deprecated-functionality-rhidp-5350"]
8+
== Deprecation of `podman` and `ImageStreams` approach for Helm chart mirroring on {ocp-short}
79

8-
None.
10+
The previous method using `podman` and `ImageStreams` for Helm chart mirroring has been deprecated. You are now required to transition to `oc-mirror` for Helm chart and related container image mirroring on {ocp-short}. This change enables support for fully disconnected and partially disconnected environments, ensuring a {company-name}-supported airgapping process.
911

12+
.Additional resources
13+
* link:https://issues.redhat.com/browse/RHIDP-5350[RHIDP-5350]
14+
15+
[id="deprecated-functionality-rhidp-5004"]
16+
== Removal of `useRedisSets` option from Redis backend cache
17+
The `useRedisSets` option in the Redis backend cache was previously enabled by default. With this update, the option has been removed and is no longer effective. If it remains in the configuration, a warning will appear in the application logs.
18+
19+
Required action::
20+
+
21+
* To avoid warnings, remove the `useRedisSets` option from the `backend.cache` section in your `app-config.yaml` file.
22+
23+
.Additional resources
24+
* link:https://issues.redhat.com/browse/RHIDP-5004[RHIDP-5004]
25+
26+
[id="deprecated-functionality-rhidp-2028"]
27+
== Deprecation of ArgoCD front-end plugin from RoadieHQ
28+
29+
The ArgoCD front-end plugin from RoadieHQ has been deprecated and will be removed in a future release. Consider transitioning to the ArgoCD plugin from {company-name} for continued support and enhancements.
30+
31+
.Additional resources
32+
* link:https://issues.redhat.com/browse/RHIDP-2028[RHIDP-2028]
33+
34+
[id="deprecated-functionality-rhidp-5958"]
35+
== Change in sign-in resolver configuration location
36+
37+
Previously, configuring the sign-in resolver to bypass user provisioning in the {product-short} software catalog required setting `dangerouslyAllowSignInWithoutUserInCatalog: true` at the root of the `{my-app-config-file}` file.
38+
39+
In this release, this configuration has been deprecated at the root level and moved to the resolver configuration section. It now applies specifically to that resolver. For more details, see link:{authentication-book-url}[{authentication-book-title}].
40+
41+
.Additional resources
42+
* link:https://issues.redhat.com/browse/RHIDP-5958[RHIDP-5958]
43+
44+
[id="deprecated-functionality-rhidp-6013"]
45+
== Deprecation of legacy dynamic plugin configurations and export options
46+
47+
Due to ongoing improvements in dynamic plugin functionality, the following features are deprecated and will be removed in a future release:
48+
49+
* `apiFactories` configuration: Dynamic plugins must now define API factories directly within their plugin using the `createPlugin` API for better integration and maintainability.
50+
51+
* `export-dynamic-plugin --embed-as-code` and `--no-embed-as-dependencies`: These options, which inline each dependency as code, have been deprecated because plugins exported this way cannot properly access the database. The `--embed-as-dependencies` option, now the default for package `export-dynamic-plugin`, replaces this behavior.
52+
53+
.Additional resources
54+
* link:https://issues.redhat.com/browse/RHIDP-6013[RHIDP-6013]
55+
56+
[id="deprecated-functionality-rhidp-5682"]
57+
== {rhbk-brand-name} `v24` is deprecated as an authentication provider
58+
59+
{rhbk-brand-name} ({rhbk}) `v24` is deprecated as an authentication provider. You can continue to use {rhbk} `v24` until the end of maintenance support. For details, see link:https://access.redhat.com/support/policy/updates/red_hat_build_of_keycloak_notes[{rhbk-brand-name} Life Cycle and Support Policies]. As an alternative, migrate to {rhbk-brand-name} `v26`.
60+
61+
.Additional resources
62+
* link:https://issues.redhat.com/browse/RHIDP-5682[RHIDP-5682]
63+
64+
[id="removed-functionality-rhidp-5218"]
65+
== Removal of {rhsso-brand-name} `7.6` as an authentication provider
66+
67+
{rhsso-brand-name} `7.6` was deprecated as an authentication provider in {product-very-short} version 1.4 and has been removed in {product} {product-version}.
68+
69+
.Additional resources
70+
* link:https://issues.redhat.com/browse/RHIDP-5218[RHIDP-5218]

modules/release-notes/ref-release-notes-fixed-issues.adoc

Lines changed: 229 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,234 @@
44

55
This section lists issues fixed in {product} {product-version}.
66

7+
== Fixed issues in 1.5.0
8+
9+
[id="bug-fix-rhidp-5803"]
10+
=== Entity tab reordering now works as expected
11+
12+
You can now reorder entity tabs by specifying a priority value in the configuration. Tabs with higher priority values appear first, while default tabs can be hidden by assigning a negative priority value.
13+
14+
.Additional resources
15+
* link:https://issues.redhat.com/browse/RHIDP-5803[RHIDP-5803]
16+
17+
[id="bug-fix-rhidp-5119"]
18+
=== Report issue feature and oversized icon in TechDocs
19+
20+
Previously, the *Report a documentation issue* feature in TechDocs was not functional. Additionally, selecting text in a TechDoc displayed an oversized icon instead of the intended tooltip button.
21+
22+
This issue has been fixed, ensuring that users can now select content and report issues correctly using the tooltip button.
23+
24+
.Additional resources
25+
* link:https://issues.redhat.com/browse/RHIDP-5119[RHIDP-5119]
26+
27+
[id="bug-fix-rhidp-5023"]
28+
=== Keycloak access token lifespan and refresh performance
29+
30+
When using {rhbk} as an OIDC provider, the default access token lifespan was set to five minutes, causing frequent refresh token requests as the token neared expiration. This resulted in performance issues due to the frequent token refreshes.
31+
32+
To resolve this, you can increase the access token lifespan on the Keycloak server by adjusting the *Access Token Lifespan* setting under *Configure -> Realm Settings* to a value greater than five minutes. This adjustment prevents unnecessary refresh token calls and improves performance.
33+
34+
.Additional resources
35+
* link:https://issues.redhat.com/browse/RHIDP-5023[RHIDP-5023]
36+
37+
[id="bug-fix-rhidp-5609"]
38+
=== Improved OCI artifact handling and prevented unintended deletion
39+
40+
This update introduces a new `pullPolicy` configuration to enhance support for floating tags in OCI artifacts. The `pullPolicy` setting provides more consistent behavior across platforms handling image containers and offers two options:
41+
42+
* `Always`: Compares the image digest in the remote registry and downloads the artifact if it has changed, even if the plugin was previously downloaded.
43+
* `IfNotPresent`: Downloads the artifact only if it is not already present in the dynamic-plugins-root folder, without checking image digests.
44+
45+
The `pullPolicy` setting is also applied to the NPM downloading method, though `Always` will download the remote artifact without a digest check. While the existing `forceDownload` option remains functional, `pullPolicy` takes precedence, and `forceDownload` might be deprecated in a future release.
46+
47+
Additionally, this update fixes an issue where OCI artifacts were unintentionally deleted during the clean up phase if only the URL was modified.
48+
49+
.Additional resources
50+
* link:https://issues.redhat.com/browse/RHIDP-5609[RHIDP-5609]
51+
52+
[id="bug-fix-rhidp-5594"]
53+
=== Corrected enabled status display for external plugins
54+
55+
Previously, plugins installed from external sources were incorrectly displayed with a *No* in the *Enabled* column on the *Plugins* page. This update fixes the UI logic to ensure that externally installed plugins now correctly appear with a *Yes* in the *Enabled* column as expected.
56+
57+
.Additional resources
58+
* link:https://issues.redhat.com/browse/RHIDP-5594[RHIDP-5594]
59+
60+
[id="bug-fix-rhidp-5573"]
61+
=== Dynamic plugins PVC now ephemeral by default to prevent upgrade issues
62+
In {product-short} Helm Chart version 1.4.2+, it was possible to configure the storage class and access mode for the dynamic plugins persistent volume claim (PVC) using the `dynamicPlugins.cache.volumeClaimSpec` field in the Helm values file.
63+
64+
In version {product-version}, this behavior has been reverted, making the dynamic plugins root PVC ephemeral by default. This change addresses issues encountered when upgrading the Helm Chart or running multiple replicas of {product-short}.
65+
66+
You can still customize the ephemeral volume claim’s storage class and access mode using the `upstream.backstage.extraVolumes` field, as shown in the following example:
67+
68+
.Example configuration
69+
[source,yaml]
70+
----
71+
upstream:
72+
backstage:
73+
extraVolumes:
74+
- name: dynamic-plugins-root
75+
ephemeral:
76+
volumeClaimTemplate:
77+
spec:
78+
accessModes:
79+
# TODO: Change the access mode below
80+
- ReadWriteOnce
81+
resources:
82+
requests:
83+
storage: 5Gi
84+
# TODO: Add your storage class below
85+
storageClassName: "<my-custom-storage-class>"
86+
87+
- name: dynamic-plugins
88+
configMap:
89+
defaultMode: 420
90+
name: '{{ printf "%s-dynamic-plugins" .Release.Name }}'
91+
optional: true
92+
93+
- name: dynamic-plugins-npmrc
94+
secret:
95+
defaultMode: 420
96+
optional: true
97+
secretName: '{{ printf "%s-dynamic-plugins-npmrc" .Release.Name }}'
98+
99+
- name: dynamic-plugins-registry-auth
100+
secret:
101+
defaultMode: 416
102+
optional: true
103+
secretName: '{{ printf "%s-dynamic-plugins-registry-auth" .Release.Name }}'
104+
105+
- name: npmcacache
106+
emptyDir: {}
107+
108+
- name: temp
109+
emptyDir: {}
110+
----
111+
112+
However, ensure that all link:https://github.com/redhat-developer/rhdh-chart/blob/release-1.5/charts/backstage/values.yaml#L145-L181[other volumes] declared in the default Helm Chart are also included.
113+
114+
.Additional resources
115+
* link:https://issues.redhat.com/browse/RHIDP-5573[RHIDP-5573]
116+
117+
[id="bug-fix-rhidp-5342"]
118+
=== Support for multiple replicas across cluster nodes
119+
120+
Previously, the {product-short} Helm Chart did not support running multiple replicas on different cluster nodes due to the automatic creation of a dynamic plugins root persistent volume claim (PVC). This issue has been resolved by reverting the PVC creation and switching to an ephemeral volume by default, allowing multiple replicas to function properly.
121+
122+
.Additional resources
123+
* link:https://issues.redhat.com/browse/RHIDP-5342[RHIDP-5342]
124+
125+
[id="bug-fix-rhidp-5558"]
126+
=== Configurable image and disable option for `test-connection` pod
127+
128+
In previous versions of the {product-short} Helm Chart, the image for the `test-connection` pod could not be configured, which posed challenges for air-gapped environments. The `test-connection` pod is created when running helm test to validate a deployed release.
129+
130+
This issue has been resolved by introducing configuration options to specify the image and allowing the `test-connection` pod to be disabled entirely. The following fields are now available in the Helm Chart:
131+
132+
.Example configuration fields in Helm Chart
133+
[source,yaml]
134+
----
135+
# -- Test pod parameters
136+
test:
137+
# -- Whether to enable the test-connection pod used for testing the Release using `helm test`.
138+
enabled: true
139+
140+
image:
141+
# -- Test connection pod image registry
142+
registry: quay.io
143+
144+
# -- Test connection pod image repository. Note that the image needs to have both the `sh` and `curl` binaries in it.
145+
repository: curl/curl
146+
147+
# -- Test connection pod image tag. Note that the image needs to have both the `sh` and `curl` binaries in it.
148+
tag: latest
149+
----
150+
151+
.Additional resources
152+
* link:https://issues.redhat.com/browse/RHIDP-5558[RHIDP-5558]
153+
154+
[id="bug-fix-rhidp-5476"]
155+
=== `MODULE_NOT_FOUND` error in GitLab org catalog and Notification backend plugin
156+
157+
Previously, the GitLab org catalog backend plugin and Notification backend plugin failed to load when configured, displaying a `MODULE_NOT_FOUND` error. This issue has been fixed by embedding the missing dependencies within the GitLab org catalog backend dynamic plugin, ensuring proper functionality.
158+
159+
.Additional resources
160+
* link:https://issues.redhat.com/browse/RHIDP-5308[RHIDP-5308]
161+
* link:https://issues.redhat.com/browse/RHIDP-5476[RHIDP-5476]
162+
163+
[id="bug-fix-rhidp-5219"]
164+
=== Monorepo detection in `package-dynamic-plugins` CLI command
165+
166+
The `janus-idp` CLI command `package-dynamic-plugins` is designed to work with both monorepos and single plugin projects. This update resolves a bug in the tool’s monorepo detection, which previously caused the tool to fail with the error `TypeError: Cannot read properties of undefined (reading 'packages')` when run in a single plugin project.
167+
168+
.Additional resources
169+
* link:https://issues.redhat.com/browse/RHIDP-5219[RHIDP-5219]
170+
171+
[id="bug-fix-rhidp-5014"]
172+
=== Improved dependency resolution for embedded packages in CLI
173+
174+
Previously, the CLI examined the dependencies of embedded packages during the export process by calling require from the monorepo root. This could lead to incorrect dependency resolution, especially when wrapping an existing plugin.
175+
176+
With this update, the CLI now calls require from the embedded package's parent directory, ensuring that the most relevant dependencies are correctly identified and used.
177+
178+
.Additional resources
179+
* link:https://issues.redhat.com/browse/RHIDP-5014[RHIDP-5014]
180+
181+
[id="bug-fix-rhidp-4828"]
182+
=== Improved CLI handling for dynamic plugin export
183+
184+
Previously, the CLI required each dynamic plugin project to define an `export-dynamic` script for the `package-dynamic-plugin` command to successfully export the plugin.
185+
186+
With this update, defining an `export-dynamic` script is no longer necessary. The `package-dynamic-plugin` command now automatically attempts to run the `export-dynamic-plugin` command with default arguments, simplifying the export process.
187+
188+
.Additional resources
189+
* link:https://issues.redhat.com/browse/RHIDP-4828[RHIDP-4828]
190+
191+
[id="bug-fix-rhidp-6180"]
192+
=== Improved startup performance for RBAC backend plugin
193+
194+
Previously, the startup process would slow down when handling a large number of CSV entries due to roles and permission policies being added individually. In this release, roles and policies are now added in bulk, improving the startup speed of the RBAC backend plugin.
195+
196+
.Additional resources
197+
* link:https://issues.redhat.com/browse/RHIDP-6180[RHIDP-6180]
198+
199+
[id="bug-fix-rhidp-4697"]
200+
=== RBAC performance for large user and group counts
201+
202+
Previously, organizations with a large number of users and groups experienced slower response times due to RBAC permission evaluations. This update includes performance improvements to help mitigate those slowdowns.
203+
204+
.Additional resources
205+
* link:https://issues.redhat.com/browse/RHIDP-4697[RHIDP-4697]
206+
207+
[id="bug-fix-rhidp-6088"]
208+
=== Expanded support for conditional aliases
209+
210+
Previously, conditional aliases were only functional for the catalog conditional rule of `IS_ENTITY_OWNER`. With this update, aliases now apply to all rules, improving flexibility and functionality.
211+
212+
.Additional resources
213+
* link:https://issues.redhat.com/browse/RHIDP-6088[RHIDP-6088]
214+
215+
[id="bug-fix-rhidp-4696"]
216+
=== Rolling update issue with PVCs
217+
218+
Previously, upgrading an existing {product-short} Helm release using rolling updates was blocked due to the automatic creation of a dynamic plugins root persistent volume claim (PVC) with a hardcoded `ReadWriteOnce` access mode. This prevented new replicas from being scheduled on different nodes.
219+
220+
This issue is now resolved by reverting the PVC creation and using an ephemeral volume by default, enabling rolling updates and allowing multiple replicas to function as expected.
221+
222+
.Additional resources
223+
* link:https://issues.redhat.com/browse/RHIDP-4696[RHIDP-4696]
224+
* link:https://issues.redhat.com/browse/RHIDP-5516[RHIDP-5516]
225+
226+
[id="bug-fix-rhidp-4415"]
227+
=== Air-gapped installation script for ROSA clusters
228+
229+
Previously, the installation script for the Operator failed to run on Red Hat OpenShift Service on AWS (ROSA) clusters in air-gapped environments. This issue has now been resolved, ensuring the script functions correctly on ROSA.
230+
231+
.Additional resources
232+
* link:https://issues.redhat.com/browse/RHIDP-4415[RHIDP-4415]
233+
234+
235+
7236

8-
None.
9237

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
:_content-type: REFERENCE
2+
[id="fixed-security-issues"]
3+
= Fixed security issues
4+
5+
You can view the security issues fixed in {product} {product-version} at link:https://access.redhat.com/security/security-updates/cve?q=red+hat+developer+hub&p=1&sort=cve_publicDate+desc,allTitle+desc&rows=10&documentKind=Cve[Red Hat Security Updates].

modules/release-notes/ref-release-notes-known-issues.adoc

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,21 @@
44

55
This section lists known issues in {product} {product-version}.
66

7+
[id="known-issue-rhidp-6455"]
8+
== Add button is misaligned on Bulk Import page
79

8-
None.
10+
On the *Bulk Import* page, the *Add* button may occasionally appear in the top-left corner instead of its intended position in the bottom-right corner. Despite the misalignment, the button remains fully functional.
11+
12+
.Additional resources
13+
* link:https://issues.redhat.com/browse/RHIDP-6455[RHIDP-6455]
14+
15+
16+
[id="known-issue-rhidp-3396"]
17+
== Topology plugin permission is not displayed in the RBAC front-end UI
18+
19+
Permissions associated only with front-end plugins do not appear in the UI because they require a backend plugin to expose the permission framework&#39;s well-known endpoint. As a workaround, you can apply these permissions by using a CSV file or directly calling the REST API of the RBAC backend plugin. Affected plugins include Topology (`topology.view.read`), Tekton (`tekton.view.read`), ArgoCD (`argocd.view.read`), and Quay (`quay.view.read`).
20+
21+
22+
.Additional resources
23+
* link:https://issues.redhat.com/browse/RHIDP-3396[RHIDP-3396]
924

0 commit comments

Comments
 (0)