Release notes for Red Hat Trusted Application Pipeline 1.3


Red Hat Trusted Application Pipeline 1.3

Explore new features in this release and learn about known issues.

Red Hat Customer Content Services

Abstract

This document provides information about the latest features and known issues in Red Hat Trusted Application Pipeline 1.3.

Preface

The release notes for Red Hat Trusted Application Pipeline summarize new features and enhancements, notable technical changes, features in Technology Preview, bug fixes, known issues, and other related advisories or information.

Chapter 1. About this release

Red Hat Trusted Application Pipeline 1.3 is now generally available. To learn more about support for all versions, refer to the RHTAP life cycle policy.

Note

The products that the RHTAP installer deploys are production ready, but they are sized for a proof of concept or a very small team. For larger teams, manual reconfiguration of the products is most likely necessary and should be done by following procedures documented for each individual product.

Chapter 2. New features and enhancements

This section lists new features and feature enhancements available in Red Hat Trusted Application Pipeline 1.3.

Bitbucket Cloud is now supported

You can now choose Bitbucket Cloud as your Git repository hosting service to create components in RHTAP applications. You can combine source code from different Git platforms (GitHub, GitLab, and Bitbucket) to build an application. To use Bitbucket, integrate it during the RHTAP installation and then configure it using the Setting up Bitbucket guide.

GitLab CI is now supported

You can now use GitLab CI as your CI provider. To use it, integrate GitLab during the RHTAP installation and then configure GitLab CI to ensure secure CI/CD workflows. Additionally, you can choose to customize GitLab pipelines. If you don’t integrate GitLab CI, RHTAP defaults to Tekton.

Technology Preview: GitHub Actions is now supported

You can now choose GitHub Actions as your CI provider. You can integrate GitHub Actions during the RHTAP installation, otherwise, RHTAP defaults to Tekton. This feature is available as a Technology Preview, and it is not fully supported, may not be functionally complete, and is not intended for production use.

JFrog Artifactory is now supported

You can now choose JFrog Artifactory as your container images registry when you create your application. To use Artifactory, refer to the Integrating JFrog Artifactory section in the Installation guide. If you don’t integrate JFrog Artifactory, RHTAP defaults to Quay.

Technology Preview: A new software template is now available

RHTAP introduces a new secure software template called Import User Repository. It allows you to import code from the existing Git repository and create a new repository that includes software supply chain security functionality provided by RHTAP. To learn more, view the Bring your source template on GitHub. Note that this is a Technology Preview feature.

Changes to the RHTAP installation

The RHTAP installer now includes all the resources needed for RHTAP deployment in the single binary to simplify installation. The new installer also provides extra monitoring to watch over Kubernetes resource status for improved reliability during installation.

Changes to the MinIO installation

Installing MinIO through OpenShift OperatorHub subscription is no longer available. As a result, the Operator will no longer update the MinIO installation automatically.

In Red Hat Trusted Application Pipeline 1.3, MinIO is still installed automatically, however now the MinIO Operator Helm chart is used. It allows you to customize the RHTAP installation process.

SBOMs are now automatically uploaded to RHTPA

RHTAP now automatically publishes your software bill of materials (SBOM) to Red Hat Trusted Profile Analyzer when you use any of the supported CI providers: Tekton, Jenkins, GitLab CI or GitHub Actions. Note that GitHub Actions is a Technology Preview feature and has not been fully tested.

If you prefer, you can extract the SBOM manually by referring to Inspecting your SBOM with RHTPA.

Chapter 3. Compatibility and support matrix

Red Hat Trusted Application Pipeline installs on OpenShift Container Platform.

Expand
ProductVersion

OpenShift Container Platform

4.15, 4.16, 4.17

RHTAP installs the following products and components during installation:

Expand
Products installed with RHTAPVersion

Red Hat Developer Hub

1.3

Red Hat Trusted Artifact Signer

1.1

Red Hat Trusted Profile Analyzer

1.1

OpenShift Pipelines

1.16

OpenShift GitOps

1.14

Advanced Cluster Security

4.5

Quay

3.13

Red Hat Developer Hub plugins

RHTAP enables a selection of RHDH dynamic plugins to support creation and monitoring of trusted secure supply chain applications. Some of the plugins enabled by RHTAP include Technology Preview and community plugins that may not be functionally complete.

Regardless of the plugins levels of support, pipelines produced by the RHTAP software templates are fully supported and leverage the security features of Trusted Software Supply Chain products and features: Red Hat Trusted Application Signer, Red Hat Trusted Profile Analyzer, and Enterprise Contract.

Technology Preview and community plugins enabled by RHTAP:

Expand
Level of supportName

Technology Preview plugins

JFrog Artifactory

Community plugins

Jenkins
GitHub Actions
GitLab
Bitbucket Cloud

To learn more about the supported levels of the individual dynamic plugins, refer to the Developer Hub documentation.

Chapter 4. Bug fixes

This section describes bug fixes available in Red Hat Trusted Application Pipeline 1.3.

GitLab authentication is now supported on RHDH

Previously, you could only use GitHub authentication as a sign-in option in Red Hat Developer Hub, to access RHTAP. Now you can also use GitLab authentication to sign in RHDH and access RHTAP.

Chapter 5. Known issues

This section describes known issues in Red Hat Trusted Application Pipeline 1.3.

Pipeline fails if you create a new Deployment Namespace

When you create a new component with a new Deployment Namespace, the pipeline fails with the error tasks.tekton.dev "rhtap-dev-namespace-setup" not found. To work around this issue, use the default Deployment Namespace called rhtap-app.

View logs and View SBOM icons don’t link to correct information

After a Pipeline Run is finished, you should be able to access the build summary and SBOM by clicking the View logs and View SBOM icons in the Actions menu. However, these icons don’t always show the correct information. To access the correct steps in logs, click either of these two icons, and in the pop-up window with logs, select the step you need: show-sbom or show-summary.

Vulnerabilities tab in RHTPA may show Internal server error

When RHTAP uploads the SBOM to Red Hat Trusted Profile Analyzer, RHTPA accepts the SBOM but may show Internal server error in the Vulnerabilities tab. If you encounter this issue, contact rhtpa-support@redhat.com.

RHDH doesn’t display the Image Registry tab if RHTAP cannot detect your registry type

The Red Hat Developer Hub UI doesn’t display the Image Registry tab on the component’s page if RHTAP is unable to detect which container image registry you’re using. RHTAP analyzes your registry URL to annotate your components, and if that annotation is missing, the tab will not appear in the RHDH UI. To work around this issue, you can manually enable the Image Registry tab.

Jenkins can only use one Git hosting provider

The default Jenkins configuration uses a global credential called GITOPS_AUTH_PASSWORD to authenticate when updating the gitops repository with a newly built image. Because only one such global variable is available, a single Jenkins instance can only be configured to work with one Git repository provider at a time, GitHub, GitLab, or Bitbucket Cloud.

RHTAP doesn’t automatically find a Rekor server when running Jenkins pipelines

When running a Jenkins pipeline, RHTAP cannot find a Rekor server if your Jenkins instance runs outside the RHTAP cluster. To work around this problem, you must manually provide the external routes for the Rekor and TUF services by configuring the REKOR_HOST and TUF_MIRROR environment variables in the env.sh file. Their values should include your cluster URL. For details and instructions, refer to Customizing sample software templates for Jenkins.

Note

GitLab: If RHTAP cannot reach the Rekor and TUF services when running GitLab pipelines, check that you’ve added their correct URLs as CI/CD variables in GitLab. For instructions, refer to Adding secrets to GitLab CI for secure integration.

When you use GitLab, you might see an error: namespaces "rhtap-acs" not found

When you use GitLab as an authentication option, a Git hosting platform and a CI provider, and you also disable ACS and integrate Quay, at the end of the RHTAP installation you might see the following error:

[INFO] Configure internal Quay integration with internal ACS
Error from server (NotFound): namespaces "rhtap-acs" not found
Copy to Clipboard Toggle word wrap

Despite this error, RHTAP is installed correctly and its functionality isn’t affected.

RHTAP doesn’t support some environments

RHTAP 1.3 does not support the following environments: any air-gapped environment, IBM Power Platform, IBM Z Platform, ARM64, and Federal Information Processing Standards (FIPS) mode OCP.

Uninstallation of RHTAP is not supported

Uninstallation of RHTAP is not currently supported, but it can be done by removing all rhtap namespaces from the cluster.





Revised on 2024-12-12 18:58:38 UTC

Legal Notice

Copyright © 2024 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat