Skip to content

Commit ad033ca

Browse files
committed
Update release note texts
1 parent ff89067 commit ad033ca

9 files changed

+54
-57
lines changed

assemblies/assembly-release-notes-fixed-issues.adoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,9 @@ include::modules/release-notes/snip-bug-fix-rhidp-4013.adoc[leveloffset=+1]
6565
include::modules/release-notes/snip-bug-fix-rhidp-4046.adoc[leveloffset=+1]
6666

6767

68+
include::modules/release-notes/snip-bug-fix-rhidp-4069.adoc[leveloffset=+1]
69+
70+
6871
include::modules/release-notes/snip-bug-fix-rhidp-4200.adoc[leveloffset=+1]
6972

7073

assemblies/assembly-release-notes-known-issues.adoc

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,10 @@ This section lists known issues in {product} {product-version}.
88
include::modules/release-notes/snip-known-issue-rhidp-4378.adoc[leveloffset=+1]
99

1010

11-
include::modules/release-notes/snip-known-issue-rhidp-4069.adoc[leveloffset=+1]
12-
13-
1411
include::modules/release-notes/snip-known-issue-rhidp-4067.adoc[leveloffset=+1]
1512

1613

17-
include::modules/release-notes/snip-known-issue-rhidp-3931.adoc[leveloffset=+1]
14+
include::modules/release-notes/snip-known-issue-rhidp-3396.adoc[leveloffset=+1]
1815

1916

2017

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
[id="bug-fix-rhidp-4069"]
2+
= Conditional alias `$ownerRefs` does not work
3+
4+
Before this update, a conditional alias that uses `$ownerRefs` did not work.
5+
6+
With this update, a conditional alias can use `$ownerRefs`.
7+
8+
.Additional resources
9+
* link:https://issues.redhat.com/browse/RHIDP-4069[RHIDP-4069]
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
[id="known-issue-rhidp-3396"]
2+
= Topology plugin permission does not show up in rbac frontend ui
3+
4+
Some permissions that only have frontend plugins will not show up in the UI due to a requirement of needing a backend plugin to expose the permission framework's wellknow endpoint. As a workaround, you can either apply these permissions through the use of the CSV file or by directly calling the REST API of the RBAC backend plugin. Known plugins affected are Topology topology.view.read, Tekton tekton.view.read, ArgoCD argocd.view.read, and Quay quay.view.read.
5+
6+
.Additional resources
7+
* link:https://issues.redhat.com/browse/RHIDP-3396[RHIDP-3396]

modules/release-notes/snip-known-issue-rhidp-3931.adoc

Lines changed: 0 additions & 10 deletions
This file was deleted.

modules/release-notes/snip-known-issue-rhidp-4069.adoc

Lines changed: 0 additions & 9 deletions
This file was deleted.

modules/release-notes/snip-known-issue-rhidp-4378.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[id="known-issue-rhidp-4378"]
22
= Admin users should have high privilage
33

4-
A conditional alias that uses `$ownerRefs` doesn't work.
5-
4+
A conditional alias that uses `$ownerRefs` doesn't work.
5+
66
There is no workaround.
77

88
.Additional resources

modules/release-notes/snip-removed-functionality-rhidp-3074.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
[id="removed-functionality-rhidp-3074"]
22
= Signing in without user in the software catalog is now disabled by default
33

4-
By default, it is now required for the user entity to exist in the software catalog to allow sign in.
5-
This is required for production ready deployments since identities need to exist and originate from a trusted source (i.e. the Identity Provider) in order for security controls such as RBAC and Audit logging to be effective.
6-
To bypass this, enable the `dangerouslySignInWithoutUserInCatalog` configuration that allows sign in without the user being in the catalog.
4+
By default, it is now required for the user entity to exist in the software catalog to allow sign in.
5+
This is required for production ready deployments since identities need to exist and originate from a trusted source (i.e. the Identity Provider) in order for security controls such as RBAC and Audit logging to be effective.
6+
To bypass this, enable the `dangerouslySignInWithoutUserInCatalog` configuration that allows sign in without the user being in the catalog.
77
Enabling this option is dangerous as it might allow unauthorized users to gain access.
88

99
.Additional resources

modules/release-notes/snip-removed-functionality-rhidp-4293.adoc

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,35 @@
11
[id="removed-functionality-rhidp-4293"]
22
= Plugins with updated scope
33

4-
With this update, three plugins previously under the `@janus-idp` scope have moved to `@backstage-community`:
5-
6-
[%header,cols=2*]
7-
|===
8-
|*RHDH 1.2 Plugin Name* |*RHDH 1.3 Plugin Name*
9-
10-
| `@janus-idp/backstage-plugin-argocd`
11-
| `@backstage-community/plugin-redhat-argocd`
12-
13-
| `@janus-idp/backstage-plugin-3scale-backend`
14-
| `@backstage-community/plugin-3scale-backend`
15-
16-
| `@janus-idp/backstage-plugin-catalog-backend-module-scaffolder-relation-processor`
17-
| `@backstage-community/plugin-catalog-backend-module-scaffolder-relation-processor`
18-
|===
19-
20-
As the scope of the previous plugins has been updated, the dynamic plugin configuration has also changed.
21-
22-
[%header,cols=2*]
23-
|===
24-
|*RHDH 1.2 Configuration* |*RHDH 1.3 Configuration*
25-
26-
| link:https://github.com/janus-idp/backstage-showcase/blob/1.2.x/dynamic-plugins.default.yaml[dynamic-plugins.default.yaml]
27-
| link:https://github.com/janus-idp/backstage-showcase/blob/release-1.3/dynamic-plugins.default.yaml[dynamic-plugins.default.yaml]
28-
|===
29-
30-
.Procedure
31-
* If your workload requires plugins with an updated scope, revise your configuration to use the latest plugins from the new scope.
32-
4+
With this update, three plugins previously under the `@janus-idp` scope have moved to `@backstage-community`:
5+
6+
[%header,cols=2*]
7+
|===
8+
|*RHDH 1.2 Plugin Name* |*RHDH 1.3 Plugin Name*
9+
10+
| `@janus-idp/backstage-plugin-argocd`
11+
| `@backstage-community/plugin-redhat-argocd`
12+
13+
| `@janus-idp/backstage-plugin-3scale-backend`
14+
| `@backstage-community/plugin-3scale-backend`
15+
16+
| `@janus-idp/backstage-plugin-catalog-backend-module-scaffolder-relation-processor`
17+
| `@backstage-community/plugin-catalog-backend-module-scaffolder-relation-processor`
18+
|===
19+
20+
As the scope of the previous plugins has been updated, the dynamic plugin configuration has also changed.
21+
22+
[%header,cols=2*]
23+
|===
24+
|*RHDH 1.2 Configuration* |*RHDH 1.3 Configuration*
25+
26+
| link:https://github.com/janus-idp/backstage-showcase/blob/1.2.x/dynamic-plugins.default.yaml[dynamic-plugins.default.yaml]
27+
| link:https://github.com/janus-idp/backstage-showcase/blob/release-1.3/dynamic-plugins.default.yaml[dynamic-plugins.default.yaml]
28+
|===
29+
30+
.Procedure
31+
* If your workload requires plugins with an updated scope, revise your configuration to use the latest plugins from the new scope.
32+
3333
//See https://github.com/redhat-developer/red-hat-developer-hub/blob/main/dynamic-plugins.default.yaml for examples.
3434

3535
.Additional resources

0 commit comments

Comments
 (0)