Skip to content

Commit 75e7781

Browse files
GitHub Actionsjmagak
authored andcommitted
Release notes for Red Hat Developer Hub 1.6.0
1 parent c88abe4 commit 75e7781

File tree

3 files changed

+64
-4
lines changed

3 files changed

+64
-4
lines changed

modules/release-notes/ref-release-notes-deprecated-functionalities.adoc

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,29 @@
44

55
This section lists deprecated functionalities in {product} {product-version}.
66

7+
[id="deprecated-functionality-rhidp-6215"]
8+
== The Topology-specific permission `topology.view.read` is removed
9+
10+
Previously, the Topology plugin used `topology.view.read` permission to control access. Users were unable to configure Topology permissions via RBAC UI. With this update, users can configure Kubernetes plugin permissions via RBAC UI that now governs the access to Topology plugin. You can now use Kubernetes plugin permissions `kubernetes.clusters.read` and `kubernetes.resources.read` for Topology plugin, as topology-specific permission `topology.view.read` is removed.
11+
12+
If you are using csv permission file, please update the following line:
13+
14+
.Old topology permission definition
15+
[source,csv]
16+
----
17+
p, role:default/topology-viewer, topology.view.read, read, allow
18+
----
19+
20+
.New topology permission definition
21+
[source,csv]
22+
----
23+
p, role:default/topology-viewer, kubernetes.clusters.read, read, allow
24+
p, role:default/topology-viewer, kubernetes.resources.read, read, allow
25+
----
26+
27+
28+
.Additional resources
29+
* link:https://issues.redhat.com/browse/RHIDP-6215[RHIDP-6215]
30+
731

8-
None.
932

modules/release-notes/ref-release-notes-fixed-issues.adoc

Lines changed: 26 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,32 @@
22
[id="fixed-issues"]
33
= Fixed issues
44

5-
This section lists issues fixed in {product} {product-version}.
5+
This section lists issues fixed in {product} {product-version} that have a significant impact on users.
6+
7+
== Fixed issues in 1.6.0
8+
9+
[id="bug-fix-rhidp-6042"]
10+
=== Floating Action Button (FAB) positioned in the 'Bottom-Left' slot on {product-short}
11+
12+
Previously, the Floating Action Button (FAB) appeared over the navigation sidebar when the slot was set to 'bottom-left'. This placement obstructed access to navigation elements, potentially hindering user interaction.
13+
14+
With this update, the FAB's position is adjusted to render adjacent to the navigation for the 'bottom-left' slot position. As a result, users can access navigation options without obstruction.
15+
16+
17+
.Additional resources
18+
* link:https://issues.redhat.com/browse/RHIDP-6042[RHIDP-6042]
19+
20+
21+
[id="bug-fix-rhidp-6448"]
22+
=== Manually added resolutions override resolutions added by `--suppress-native-package`
23+
24+
Previously, manually added resolutions were not overwritten by the package export-dynamic-plugin command. This could lead to incorrect package dependencies in the exported dynamic plugin.
25+
26+
With this update, the `package export-dynamic-plugin` overwrites manually added resolutions, ensuring backstage dependencies are hoisted and native dependencies are suppressed from the exported dynamic plugin.
27+
28+
29+
.Additional resources
30+
* link:https://issues.redhat.com/browse/RHIDP-6448[RHIDP-6448]
631

732

8-
None.
933

modules/release-notes/ref-release-notes-new-features.adoc

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,18 @@
44

55
This section highlights new features in {product} {product-version}.
66

7-
None.
7+
[id="feature-rhidp-6253"]
8+
== {product-short} community plugins updated to Backstage 1.36
9+
10+
The {product-short} community plugins have been updated to Backstage version 1.36.
11+
12+
[id="feature-rhidp-6269"]
13+
== Added a new RBAC conditional rule `IS_OWNER` to RBAC plugin
14+
15+
{product} has introduced a new RBAC conditional rule `IS_OWNER` that allows administrators to grant limited access to the RBAC plugin. This enhancement allows administrators to assign ownership to roles and control their team's access. Therefore, users can assign ownership to roles, which can be used to conditionally filter roles, permission policies, and conditional policies.
16+
17+
This enhancement removes the resource type from the `policy.entity.create` permission, preventing conditional rules from being applied to the permission. You can update all permission policies that utilize the resource type `policy-entity` with the action `create` (for example `role:default/some_role, policy-entity, create, allow` to `role:default/some_role, policy.entity.create, create, allow`) to prevent degradation in the future.
18+
19+
20+
821

0 commit comments

Comments
 (0)