|
4 | 4 |
|
5 | 5 | This section lists issues fixed in {product} {product-version}. |
6 | 6 |
|
| 7 | +== Fixed issues in 1.5.0 |
| 8 | + |
| 9 | +[id="bug-fix-rhidp-5803"] |
| 10 | +=== Entity tab reordering now works as expected |
| 11 | + |
| 12 | +You can now reorder entity tabs by specifying a priority value in the configuration. Tabs with higher priority values appear first, while default tabs can be hidden by assigning a negative priority value. |
| 13 | + |
| 14 | +.Additional resources |
| 15 | +* link:https://issues.redhat.com/browse/RHIDP-5803[RHIDP-5803] |
| 16 | + |
| 17 | +[id="bug-fix-rhidp-5119"] |
| 18 | +=== Report issue feature and oversized icon in TechDocs |
| 19 | + |
| 20 | +Previously, the *Report a documentation issue* feature in TechDocs was not functional. Additionally, selecting text in a TechDoc displayed an oversized icon instead of the intended tooltip button. |
| 21 | + |
| 22 | +This issue has been fixed, ensuring that users can now select content and report issues correctly using the tooltip button. |
| 23 | + |
| 24 | +.Additional resources |
| 25 | +* link:https://issues.redhat.com/browse/RHIDP-5119[RHIDP-5119] |
| 26 | + |
| 27 | +[id="bug-fix-rhidp-5023"] |
| 28 | +=== Keycloak access token lifespan and refresh performance |
| 29 | + |
| 30 | +When using {rhbk} as an OIDC provider, the default access token lifespan was set to five minutes, causing frequent refresh token requests as the token neared expiration. This resulted in performance issues due to the frequent token refreshes. |
| 31 | + |
| 32 | +To resolve this, you can increase the access token lifespan on the Keycloak server by adjusting the *Access Token Lifespan* setting under *Configure -> Realm Settings* to a value greater than five minutes. This adjustment prevents unnecessary refresh token calls and improves performance. |
| 33 | + |
| 34 | +.Additional resources |
| 35 | +* link:https://issues.redhat.com/browse/RHIDP-5023[RHIDP-5023] |
| 36 | + |
| 37 | +[id="bug-fix-rhidp-5609"] |
| 38 | +=== Improved OCI artifact handling and prevented unintended deletion |
| 39 | + |
| 40 | +This update introduces a new `pullPolicy` configuration to enhance support for floating tags in OCI artifacts. The `pullPolicy` setting provides more consistent behavior across platforms handling image containers and offers two options: |
| 41 | + |
| 42 | +* `Always`: Compares the image digest in the remote registry and downloads the artifact if it has changed, even if the plugin was previously downloaded. |
| 43 | +* `IfNotPresent`: Downloads the artifact only if it is not already present in the dynamic-plugins-root folder, without checking image digests. |
| 44 | + |
| 45 | +The `pullPolicy` setting is also applied to the NPM downloading method, though `Always` will download the remote artifact without a digest check. While the existing `forceDownload` option remains functional, `pullPolicy` takes precedence, and `forceDownload` might be deprecated in a future release. |
| 46 | + |
| 47 | +Additionally, this update fixes an issue where OCI artifacts were unintentionally deleted during the clean up phase if only the URL was modified. |
| 48 | + |
| 49 | +.Additional resources |
| 50 | +* link:https://issues.redhat.com/browse/RHIDP-5609[RHIDP-5609] |
| 51 | + |
| 52 | +[id="bug-fix-rhidp-5594"] |
| 53 | +=== Corrected enabled status display for external plugins |
| 54 | + |
| 55 | +Previously, plugins installed from external sources were incorrectly displayed with a *No* in the *Enabled* column on the *Plugins* page. This update fixes the UI logic to ensure that externally installed plugins now correctly appear with a *Yes* in the *Enabled* column as expected. |
| 56 | + |
| 57 | +.Additional resources |
| 58 | +* link:https://issues.redhat.com/browse/RHIDP-5594[RHIDP-5594] |
| 59 | + |
| 60 | +[id="bug-fix-rhidp-5573"] |
| 61 | +=== Dynamic plugins PVC now ephemeral by default to prevent upgrade issues |
| 62 | +In {product-short} Helm Chart version 1.4.2+, it was possible to configure the storage class and access mode for the dynamic plugins persistent volume claim (PVC) using the `dynamicPlugins.cache.volumeClaimSpec` field in the Helm values file. |
| 63 | + |
| 64 | +In version {product-version}, this behavior has been reverted, making the dynamic plugins root PVC ephemeral by default. This change addresses issues encountered when upgrading the Helm Chart or running multiple replicas of {product-short}. |
| 65 | + |
| 66 | +You can still customize the ephemeral volume claim’s storage class and access mode using the `upstream.backstage.extraVolumes` field, as shown in the following example: |
| 67 | + |
| 68 | +.Example configuration |
| 69 | +[source,yaml] |
| 70 | +---- |
| 71 | +upstream: |
| 72 | + backstage: |
| 73 | + extraVolumes: |
| 74 | + - name: dynamic-plugins-root |
| 75 | + ephemeral: |
| 76 | + volumeClaimTemplate: |
| 77 | + spec: |
| 78 | + accessModes: |
| 79 | + # TODO: Change the access mode below |
| 80 | + - ReadWriteOnce |
| 81 | + resources: |
| 82 | + requests: |
| 83 | + storage: 5Gi |
| 84 | + # TODO: Add your storage class below |
| 85 | + storageClassName: "<my-custom-storage-class>" |
| 86 | +
|
| 87 | + - name: dynamic-plugins |
| 88 | + configMap: |
| 89 | + defaultMode: 420 |
| 90 | + name: '{{ printf "%s-dynamic-plugins" .Release.Name }}' |
| 91 | + optional: true |
| 92 | +
|
| 93 | + - name: dynamic-plugins-npmrc |
| 94 | + secret: |
| 95 | + defaultMode: 420 |
| 96 | + optional: true |
| 97 | + secretName: '{{ printf "%s-dynamic-plugins-npmrc" .Release.Name }}' |
| 98 | +
|
| 99 | + - name: dynamic-plugins-registry-auth |
| 100 | + secret: |
| 101 | + defaultMode: 416 |
| 102 | + optional: true |
| 103 | + secretName: '{{ printf "%s-dynamic-plugins-registry-auth" .Release.Name }}' |
| 104 | +
|
| 105 | + - name: npmcacache |
| 106 | + emptyDir: {} |
| 107 | +
|
| 108 | + - name: temp |
| 109 | + emptyDir: {} |
| 110 | +---- |
| 111 | + |
| 112 | +However, ensure that all link:https://github.com/redhat-developer/rhdh-chart/blob/release-1.5/charts/backstage/values.yaml#L145-L181[other volumes] declared in the default Helm Chart are also included. |
| 113 | + |
| 114 | +.Additional resources |
| 115 | +* link:https://issues.redhat.com/browse/RHIDP-5573[RHIDP-5573] |
| 116 | + |
| 117 | +[id="bug-fix-rhidp-5342"] |
| 118 | +=== Support for multiple replicas across cluster nodes |
| 119 | + |
| 120 | +Previously, the {product-short} Helm Chart did not support running multiple replicas on different cluster nodes due to the automatic creation of a dynamic plugins root persistent volume claim (PVC). This issue has been resolved by reverting the PVC creation and switching to an ephemeral volume by default, allowing multiple replicas to function properly. |
| 121 | + |
| 122 | +.Additional resources |
| 123 | +* link:https://issues.redhat.com/browse/RHIDP-5342[RHIDP-5342] |
| 124 | + |
| 125 | +[id="bug-fix-rhidp-5558"] |
| 126 | +=== Configurable image and disable option for `test-connection` pod |
| 127 | + |
| 128 | +In previous versions of the {product-short} Helm Chart, the image for the `test-connection` pod could not be configured, which posed challenges for air-gapped environments. The `test-connection` pod is created when running helm test to validate a deployed release. |
| 129 | + |
| 130 | +This issue has been resolved by introducing configuration options to specify the image and allowing the `test-connection` pod to be disabled entirely. The following fields are now available in the Helm Chart: |
| 131 | + |
| 132 | +.Example configuration fields in Helm Chart |
| 133 | +[source,yaml] |
| 134 | +---- |
| 135 | +# -- Test pod parameters |
| 136 | +test: |
| 137 | + # -- Whether to enable the test-connection pod used for testing the Release using `helm test`. |
| 138 | + enabled: true |
| 139 | +
|
| 140 | + image: |
| 141 | + # -- Test connection pod image registry |
| 142 | + registry: quay.io |
| 143 | +
|
| 144 | + # -- Test connection pod image repository. Note that the image needs to have both the `sh` and `curl` binaries in it. |
| 145 | + repository: curl/curl |
| 146 | +
|
| 147 | + # -- Test connection pod image tag. Note that the image needs to have both the `sh` and `curl` binaries in it. |
| 148 | + tag: latest |
| 149 | +---- |
| 150 | + |
| 151 | +.Additional resources |
| 152 | +* link:https://issues.redhat.com/browse/RHIDP-5558[RHIDP-5558] |
| 153 | + |
| 154 | +[id="bug-fix-rhidp-5476"] |
| 155 | +=== `MODULE_NOT_FOUND` error in GitLab org catalog and Notification backend plugin |
| 156 | + |
| 157 | +Previously, the GitLab org catalog backend plugin and Notification backend plugin failed to load when configured, displaying a `MODULE_NOT_FOUND` error. This issue has been fixed by embedding the missing dependencies within the GitLab org catalog backend dynamic plugin, ensuring proper functionality. |
| 158 | + |
| 159 | +.Additional resources |
| 160 | +* link:https://issues.redhat.com/browse/RHIDP-5308[RHIDP-5308] |
| 161 | +* link:https://issues.redhat.com/browse/RHIDP-5476[RHIDP-5476] |
| 162 | + |
| 163 | +[id="bug-fix-rhidp-5219"] |
| 164 | +=== Monorepo detection in `package-dynamic-plugins` CLI command |
| 165 | + |
| 166 | +The `janus-idp` CLI command `package-dynamic-plugins` is designed to work with both monorepos and single plugin projects. This update resolves a bug in the tool’s monorepo detection, which previously caused the tool to fail with the error `TypeError: Cannot read properties of undefined (reading 'packages')` when run in a single plugin project. |
| 167 | + |
| 168 | +.Additional resources |
| 169 | +* link:https://issues.redhat.com/browse/RHIDP-5219[RHIDP-5219] |
| 170 | + |
| 171 | +[id="bug-fix-rhidp-5014"] |
| 172 | +=== Improved dependency resolution for embedded packages in CLI |
| 173 | + |
| 174 | +Previously, the CLI examined the dependencies of embedded packages during the export process by calling require from the monorepo root. This could lead to incorrect dependency resolution, especially when wrapping an existing plugin. |
| 175 | + |
| 176 | +With this update, the CLI now calls require from the embedded package's parent directory, ensuring that the most relevant dependencies are correctly identified and used. |
| 177 | + |
| 178 | +.Additional resources |
| 179 | +* link:https://issues.redhat.com/browse/RHIDP-5014[RHIDP-5014] |
| 180 | + |
| 181 | +[id="bug-fix-rhidp-4828"] |
| 182 | +=== Improved CLI handling for dynamic plugin export |
| 183 | + |
| 184 | +Previously, the CLI required each dynamic plugin project to define an `export-dynamic` script for the `package-dynamic-plugin` command to successfully export the plugin. |
| 185 | + |
| 186 | +With this update, defining an `export-dynamic` script is no longer necessary. The `package-dynamic-plugin` command now automatically attempts to run the `export-dynamic-plugin` command with default arguments, simplifying the export process. |
| 187 | + |
| 188 | +.Additional resources |
| 189 | +* link:https://issues.redhat.com/browse/RHIDP-4828[RHIDP-4828] |
| 190 | + |
| 191 | +[id="bug-fix-rhidp-6180"] |
| 192 | +=== Improved startup performance for RBAC backend plugin |
| 193 | + |
| 194 | +Previously, the startup process would slow down when handling a large number of CSV entries due to roles and permission policies being added individually. In this release, roles and policies are now added in bulk, improving the startup speed of the RBAC backend plugin. |
| 195 | + |
| 196 | +.Additional resources |
| 197 | +* link:https://issues.redhat.com/browse/RHIDP-6180[RHIDP-6180] |
| 198 | + |
| 199 | +[id="bug-fix-rhidp-4697"] |
| 200 | +=== RBAC performance for large user and group counts |
| 201 | + |
| 202 | +Previously, organizations with a large number of users and groups experienced slower response times due to RBAC permission evaluations. This update includes performance improvements to help mitigate those slowdowns. |
| 203 | + |
| 204 | +.Additional resources |
| 205 | +* link:https://issues.redhat.com/browse/RHIDP-4697[RHIDP-4697] |
| 206 | + |
| 207 | +[id="bug-fix-rhidp-6088"] |
| 208 | +=== Expanded support for conditional aliases |
| 209 | + |
| 210 | +Previously, conditional aliases were only functional for the catalog conditional rule of `IS_ENTITY_OWNER`. With this update, aliases now apply to all rules, improving flexibility and functionality. |
| 211 | + |
| 212 | +.Additional resources |
| 213 | +* link:https://issues.redhat.com/browse/RHIDP-6088[RHIDP-6088] |
| 214 | + |
| 215 | +[id="bug-fix-rhidp-4696"] |
| 216 | +=== Rolling update issue with PVCs |
| 217 | + |
| 218 | +Previously, upgrading an existing {product-short} Helm release using rolling updates was blocked due to the automatic creation of a dynamic plugins root persistent volume claim (PVC) with a hardcoded `ReadWriteOnce` access mode. This prevented new replicas from being scheduled on different nodes. |
| 219 | + |
| 220 | +This issue is now resolved by reverting the PVC creation and using an ephemeral volume by default, enabling rolling updates and allowing multiple replicas to function as expected. |
| 221 | + |
| 222 | +.Additional resources |
| 223 | +* link:https://issues.redhat.com/browse/RHIDP-4696[RHIDP-4696] |
| 224 | +* link:https://issues.redhat.com/browse/RHIDP-5516[RHIDP-5516] |
| 225 | + |
| 226 | +[id="bug-fix-rhidp-4415"] |
| 227 | +=== Air-gapped installation script for ROSA clusters |
| 228 | + |
| 229 | +Previously, the installation script for the Operator failed to run on Red Hat OpenShift Service on AWS (ROSA) clusters in air-gapped environments. This issue has now been resolved, ensuring the script functions correctly on ROSA. |
| 230 | + |
| 231 | +.Additional resources |
| 232 | +* link:https://issues.redhat.com/browse/RHIDP-4415[RHIDP-4415] |
| 233 | + |
| 234 | + |
| 235 | + |
7 | 236 |
|
8 | | -None. |
9 | 237 |
|
0 commit comments