Questo contenuto non è disponibile nella lingua selezionata.
Chapter 1. Red Hat OpenShift Pipelines release notes
For additional information about the OpenShift Pipelines lifecycle and supported platforms, refer to the OpenShift Operator Life Cycles and Red Hat OpenShift Container Platform Life Cycle Policy.
Release notes contain information about new and deprecated features, breaking changes, and known issues. The following release notes apply for the most recent OpenShift Pipelines releases on OpenShift Container Platform.
Red Hat OpenShift Pipelines is a cloud-native CI/CD experience based on the Tekton project which provides:
- Standard Kubernetes-native pipeline definitions (CRDs).
- Serverless pipelines with no CI server management overhead.
- Extensibility to build images using any Kubernetes tool, such as S2I, Buildah, JIB, and Kaniko.
- Portability across any Kubernetes distribution.
- Powerful CLI for interacting with pipelines.
- Integrated user experience with the Developer perspective of the OpenShift Container Platform web console, up to OpenShift Container Platform version 4.19.
For an overview of Red Hat OpenShift Pipelines, see Understanding OpenShift Pipelines.
1.1. Compatibility and support matrix Copia collegamentoCollegamento copiato negli appunti!
Some features in this release are currently in Technology Preview. These experimental features are not intended for production use.
In the table, features are marked with the following statuses:
TP | Technology Preview |
GA | General Availability |
Red Hat OpenShift Pipelines Version | Component Version | OpenShift Version | Support Status | |||||||
---|---|---|---|---|---|---|---|---|---|---|
Operator | Pipelines | Triggers | CLI | Chains | Hub | Pipelines as Code | Results | Manual Approval Gate | ||
1.19 | 1.0.x | 0.32.x | 0.41.x | 0.25.x (GA) | 1.21.x (TP) | 0.35.x (GA) | 0.15.x (GA) | 0.6.x (TP) | 4.15, 4.16, 4.17, 4.18, 4.19 | GA |
1.18 | 0.68.x | 0.31.x | 0.40.x | 0.24.x (GA) | 1.20.x (TP) | 0.33.x (GA) | 0.14.x (GA) | 0.5.x (TP) | 4.15, 4.16, 4.17, 4.18 | GA |
1.17 | 0.65.x | 0.30.x | 0.39.x | 0.23.x (GA) | 1.19.x (TP) | 0.29.x (GA) | 0.13.x (TP) | 0.4.x (TP) | 4.15, 4.16, 4.17 | GA |
1.16 | 0.62.x | 0.29.x | 0.38.x | 0.22.x (GA) | 1.18.x (TP) | 0.28.x (GA) | 0.12.x (TP) | 0.3.x (TP) | 4.15, 4.16, 4.17 | GA |
For questions and feedback, you can send an email to the product team at pipelines-interest@redhat.com.
1.2. Release notes for Red Hat OpenShift Pipelines 1.19 Copia collegamentoCollegamento copiato negli appunti!
With this update, Red Hat OpenShift Pipelines General Availability (GA) 1.19 is available on OpenShift Container Platform 4.15 and later versions.
1.2.1. New features Copia collegamentoCollegamento copiato negli appunti!
In addition to fixes and stability improvements, the following sections highlight what is new in Red Hat OpenShift Pipelines 1.19:
1.2.1.1. Pipelines Copia collegamentoCollegamento copiato negli appunti!
With this update, you can now specify custom
securityContext
settings in theEventListener
resource. When you enable a customsecurityContext
, user-defined values override the default configuration. Otherwise, the defaultsecurityContext
settings are applied automatically.Example
securityContext
configuration in theEventListener
resourceCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2.1.2. Tekton Results Copia collegamentoCollegamento copiato negli appunti!
With this update, you can configure custom database credentials for Tekton Results by using the
TektonConfig
custom resource (CR). This eliminates the need to rely on the default PostgreSQL secrets that use default usernames and passwords.Example for adding custom database credentials for Tekton Results
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
With this update, the Tekton Results API supports response field filtering or partial responses to reduce payload size and improve network efficiency. You can specify what fields to include in API responses, which benefits
List
operations by preventing the retrieval of entire objects, thus optimizing response latency and I/O performance. With this update, you can configure retry timings for OCI bundle lookups, such as initial retry delay, backoff factor, and maximum retry duration, in the
config-resolver-bundle
config map underbundle.resolver.backoff
. This helps reduce load on busy registries by preventing aggressive retry behavior.Example for configuring retry timings
Copy to Clipboard Copied! Toggle word wrap Toggle overflow With this update, the Git resolver can now use personal access tokens to authenticate with GitHub or GitLab, avoiding rate limits associated with anonymous
git clone
API usage. To enable this feature, add agitToken:
field to your git resolver parameter specification. Tekton automatically injects the token as an HTTP header during resolution to reduce the risk of quota-related errors during remote resolution.Example for configuring the
gitToken:
fieldCopy to Clipboard Copied! Toggle word wrap Toggle overflow With this update, the default log level for SQL in Tekton Results has been set to
warn
. You can override this setting by specifying theSQL_LOG_LEVEL
environment variable in the Tekton Results deployment.Example for enabling the
SQL_LOG_LEVEL
environment variableCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
With this update, the Tekton Results watcher retries reconciliation before removing the finalizer, until the
storedDeadline
duration is reached. This reduces the risk of missingTaskRun
orPipelineRun
storage. With this update, Tekton Results users can retrieve logs from Splunk that were forwarded by OpenShift Logging. To enable this functionality, set the following environment variables in the Tekton Results API deployment:
- SPLUNK\_SEARCH\_TOKEN, LOGGING\_PLUGIN\_QUERY\_PARAMS
LOGGING\_PLUGIN\_API\_URL
Example for retrieving forwarded logs by OpenShift Logging
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note-
The
LOGGING\_PLUGIN\_API\_URL
variable must be configured with the Splunk endpoint and port number.
-
The
With this update, the Tekton Results watcher uses
StatefulSet
ordinals to improve high availability and workload distribution as an alternative to the leader election mechanism.Example for enabling
StatefulSet
ordinals for the Tekton Results watcherCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantUsing
StatefulSet
ordinals for high availability is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
1.2.1.3. Pipelines as Code Copia collegamentoCollegamento copiato negli appunti!
-
With this update, Pipelines as Code no longer creates a
Pending
status on GitHub pull requests when an unauthorized bot user attempts to trigger aPipelineRun
. Instead of generating a blocking status check, such requests are now silently disallowed. -
With this update, a new
pipelines_as_code_git_provider_api_request_count
metric tracks the number of API calls made by Pipelines as Code to Git providers, such as GitHub, GitLab, and Gitea. The metric also helps monitor API rate limit usage per Git provider, namespace, event type, and repository. -
With this update, URLs in the
Repository
CR are now validated during creation to ensure they are properly formatted and use valid schemes, such as http or https. This enhancement helps prevent configuration errors and runtime errors. -
With this update,
PipelineRun
status comments now render correctly in markdown on Bitbucket Data Center and Bitbucket Cloud, instead of appearing as raw strings in the pull request UI.
1.2.1.4. Operator Copia collegamentoCollegamento copiato negli appunti!
With this update, you can generate the
cosign
key pair by setting thegenerateSigningSecret
field in theTektonConfig
custom resource (CR) totrue
. The Red Hat OpenShift Pipelines Operator generates acosign
key pair, acosign.key
private key and acosign.pub
public key.Example of enabling
cosign
key pairsCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
With this update, the
/ok-to-test
memory feature is disabled by default. This precaution helps mitigate the risk of malicious code execution within testing environments. - With this update, dynamic variables can be expanded from remote pipeline definitions. This enhancement improves pipeline composition capabilities.
-
With this update, the Git resolver included in the remote resolution feature now uses the native git binary instead of the pure Go
go-git
library. This change reduces memory consumption and improves clone performance, especially for large repositories. This enhancement uses shallow-clone flags, for example--depth 1
, to reduce resource usage. No changes to pipeline manifests are required. -
With this update, the
onError
field in Red Hat OpenShift Pipelines supports Tekton parameter substitution. Previously, theonError
field only accepted the literal valuesstopAndFail
andcontinue
. You can use the$(params.strategy)
substitution token to dynamically determine failure handling behavior at runtime. This allows a single Pipeline definition to adapt itsonError
policy based on parameters, context, or results. -
With this release,
StepAction
definitions are updated from alpha to stable and are now enabled by default. Theenable-step-actions
flag used in the earlier versions is no longer used and will be removed in a future release. - With this update, the Pipeline scheduler now correctly evaluates result references in fan-out/fan-in patterns. Previously, such pipelines could fail unpredictably when matrix tasks relied on result refs.
-
With this update, the
remember-ok-to-test
value in theTektonConfig
CR is set tofalse
by default to reduce the risk of running untrusted code in test environments.
1.2.1.5. Tekton Cache Copia collegamentoCollegamento copiato negli appunti!
-
With this update, parameter naming conventions across the
StepAction
feature are unified for consistency. The casing ofcache-fetch
andcache-upload
step actions is now consistent with that ofgit-clone
. -
With this update, the
tekton-caches
tool can push to and retrieve from Google Cloud Storage (GCS) buckets, in addition to existing OCI registry support. To enable this, set the cache backend to ags://bucket/path
URI. -
With this update, you can store cache archives in any S3 compatible bucket, including on-premises solutions such as MinIO or cloud providers such as AWS. To use this feature, specify a URL, such as
s3://my-bucket/cache
as the cache backend. -
With this update, cache archives are compressed using
Gzip
before being uploaded. This reduces object storage costs and speeds up data transfer, especially for large caches such asGo
modules. -
With this update, restored caches default to
0777
permission, ensuring that executable scripts and other permission-sensitive files function correctly. Previously, restored files defaulted to0600
permissions, which could prevent scripts from running as expected. - With this update, running on Google Kubernetes Engine (GKE) with Workload Identity Federation (WIF) no longer requires embedding key files in tasks. Instead, you can now mount projected volume tokens, eliminating the need for long-lived credentials and improving security.
-
With this update, the code paths for GCS and S3 backends are unified using the
gocloud.dev
library. This abstraction simplifies support of additional storage providers, such as Azure Blob Storage or local filesystems. -
With this update, the
fetch
command is improved to automatically create the destination folder if it does not exist in a new workspace. Previously, the command would fail in such cases, requiring you to create a directory manually. With this update, registry authentication is no longer limited to the
/tekton/home/.docker/config.json
default path. You can now mount any Docker configuration file and specify its location by using thedockerConfig
parameter in yourTask
resource. However, the custom location forDOCKER_CONFIG
must include a validconfig.json
file.Example for enabling the
dockerConfig
parameter in a taskCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2.1.6. Tekton Chains Copia collegamentoCollegamento copiato negli appunti!
With this update, the Tekton Chains controller uses
StatefulSet
ordinals to improve high availability and workload distribution as an alternative to the leader election mechanism.Example of enabling the StatefulSet ordinals for the the
Chains
controllerCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantUsing
StatefulSet
ordinals for high availability is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
1.2.1.7. Pipelines as Code Copia collegamentoCollegamento copiato negli appunti!
-
With this release, Pipelines as Code introduces the
pipelines_as_code_git_provider_api_request_count
metric. This metric tracks the number of API requests made by Pipelines as Code to a Git provider in response to an event. With this release, the
TektonConfig
custom resource provides support for two new fields to enable thecancel-in-progress
feature for pipeline runs in Pipelines as Code globally:-
enable-cancel-in-progress-on-pull-requests
enable-cancel-in-progress-on-push
When set to
true
, these fields automatically cancel any in-progress pipeline run triggered by pull request or push events when there is a new commit. By default, both these fields are set to false.NoteIf a
PipelineRun
resource includes thepipelinesascode.tekton.dev/cancel-in-progress
annotation, it overrides the correspondingTektonConfig
setting.Example enabling auto-cancel on pull requests and push events with
TektonConfig
CRCopy to Clipboard Copied! Toggle word wrap Toggle overflow
-
With this release, Pipelines as Code supports the
git_tag
dynamic variable. This variable is used during tag push events and reflects the value of the Git tag. For example, if the tagv1.0
is pushed to theRepository
CR, thegit_tag
variable holds the valuev1.0
.Example configuration for git_tag
Copy to Clipboard Copied! Toggle word wrap Toggle overflow With this release, the
TektonConfig
CR includes theskip-push-event-for-pr-commits
field. When enabled, Pipelines as Code does not trigger pipeline runs for push events if the commit SHA is included in an open pull request. This prevents duplicate pipeline runs for the same commit. By default, this field is set totrue
.Example configuration for
skip-push-event-for-pr-commits
inTektonConfig
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
With this release, an OpenAPI schema is now integrated into Pipelines as Code for the Repository CR. This schema enables IDE autocompletion for Repository CR writing and allows repository explanations via the
oc explain
command. -
With this update, when you set the
on-cel-expression
,on-event
, oron-target-branch
annotations in a repository, theon-cel-expression
annotation takes precedence. Theon-event
andon-target-branch
annotations are ignored in this case. To alert users, a warning log and Kubernetes event are generated to indicate this behavior.
1.2.1.8. Event-based Pruner Copia collegamentoCollegamento copiato negli appunti!
The Pruner component is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
With this update, the
Pruner
component introduces automated cleanup ofPipelineRun
andTaskRun
resources in Red Hat OpenShift Pipelines. It supports the following features:-
Time-based pruning (TTL). This feature automatically deletes completed
PipelineRun
andTaskRun
resources after a specified duration. This is controlled through thettlSecondsAfterFinished
setting. History-based pruning. This feature retains a limited number of successful and failed runs. it is configured through the following parameters:
-
successfulHistoryLimit
-
failedHistoryLimit
-
historyLimit
-
Flexible configuration levels. There are two configurable levels:
-
Global. This option applies to all namespaces except those prefixed with
kube-
andopenshift-
. Namespace. This option applies to all resources in a specific namespace
NoteIn this release, only
Global
andNamespace
configurations are available.
-
Global. This option applies to all namespaces except those prefixed with
-
Time-based pruning (TTL). This feature automatically deletes completed
With this update, you can disable or enable the event-based pruner in the
TektonConfig
CR by settingspec.tektonpruner.disabled
totrue
orfalse
. Fine-grained configuration is not yet supported in theTektonConfig
CR and must be managed through config maps.NoteThe existing job-based pruner must be disabled before enabling the event-based pruner.
1.2.2. Breaking changes Copia collegamentoCollegamento copiato negli appunti!
-
With this release, the
hub clustertask
command is removed from the CLI because theClusterTask
functionality is no longer available on Tekton Hub. -
With this release, support for
ClusterTask
objects is removed. As a result, thetkn clustertask
andtkn task create
commands are no longer available. -
With this release, the
opc results list
command is replaced with theopc results result list
command. -
With this update, the
disable-affinity-assistant
flag is removed from the Red Hat OpenShift Pipelines Operator. This flag is deprecated in Red Hat OpenShift Pipelines v1.13 and does not have any effect in Red Hat OpenShift Pipelines v1.19. Thedisable-affinity-assistant flag is still available in the `TektonConfig
custom resource (CR) for backward compatibility, but it does not impact the behavior of the Red Hat OpenShift Pipelines Operator. To maintain the same behavior, set thecoschedule
feature flag todisabled
.
1.2.3. Known issues Copia collegamentoCollegamento copiato negli appunti!
-
Currently, the event-based pruner does not strictly validate the contents of the
tekton-pruner-default-spec
config map. If invalid configuration keys or malformed values with incorrect field names are provided, the configuration is ignored. As a result, the pruner might fall back to default behavior or skip pruning altogether.
1.2.4. Fixed issues Copia collegamentoCollegamento copiato negli appunti!
-
Before this update, the
s2i-java
task failed with an error message,/usr/libexec/s2i/assemble: No such file or directory
. This error occurred due to incorrect script path references. With this update, the default script path for thes2i-java
task is modified to/usr/local/s2i
. Other S2I tasks, such as those for Go or .NET, continue to use the/usr/libexec/s2i/assemble
script path. -
Before this update, YAML syntax errors in
PipelineRun
were only reported in logs and Kubernetes events, making them difficult to detect and troubleshoot. With this update, Pipelines as Code comments directly on pull requests whenPipelineRun
YAML validation errors occur. This improves error visibility and simplifies troubleshooting on GitHub, GitLab, and Gitea providers. Before this update, in the GitLab integration, Pipelines as Code posted comments on merge requests at the start and end of each
PipelineRun
. This behavior led to excessive comments appearing on merge requests when multiple pipelineruns were triggered. With this update, you can now disable all GitLab comments by settingdisable_all
totrue
in theRepository
custom resource (CR).Example of enabling the Repository CR
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Before this update, logs retrieved from the Amazon Web Services (AWS) S3 bucket were displayed in a random order, making debugging and troubleshooting difficult. With this update, logs from AWS S3 are now correctly ordered chronologically, improving readability and the overall debugging experience.
-
Before this update, Pipelines as Code required all custom parameters defined in a
Repository
CR to include predefined values. With this update, custom parameters can now be defined without specifying default values in theRepository
CR. This change enables values to be supplied through webhook payloads and preserves backward compatibility. -
Before this update, when using the
github-push
ClusterTriggerBinding
, thegit-clone
command could fail withHTTP 403
errors. This issue occurred because the$(body.repository.url)
parameter pointed to the GitHub API URL instead of a valid Git clone URL. With this update, a newgit-repo-clone-url
parameter uses$(body.repository.html_url)
to ensure that the cloning uses the correct repository URL. -
Before this update, the
buildah
task failed to process build arguments that contained spaces when used with the cluster resolver. This issue affected users migrating from the deprecatedClusterTask
custom resource (CR). With this update, theBUILD_ARGS
parameter in thebuildah
task now correctly supports arguments with spaces, for example,EXAMPLE="abc def"
, restoring compatibility with previous functionality. -
Before this update, the PipelineRun details page in the OpenShift Container Platform web console failed to load correctly, preventing users from viewing pipeline run details. With this update, the web console displays the
PipelineRun
information correctly. -
Before this update, the console plugin styling was outdated due to the upgrade to PatternFly 6 and the removal of deprecated
co-
classes. This caused alignment and spacing issues in the Pipelines section of the OpenShift Container Platform web console. With this update, the console plugin styling is updated to use the appropriate PatternFly equivalent classes, ensuring consistent alignment and visual integration with the current OpenShift Container Platform web console design standards - Before this update, the OpenShift Pipelines console plugin failed due to a default Tekton Results TLS secret creation issue in OpenShift Pipelines 1.18. This caused the console to be inaccessible, making pipeline details unviewable. With this release, the default Tekton Results TLS secret creation is skipped in OpenShift Pipelines 1.18, resolving the issue.
-
Before this update, links for
PipelineRun
in the OpenShift Container Platform web console incorrectly pointed to the deprecatedv1beta1
Red Hat OpenShift Pipelines APIs instead of the currentv1
APIs. With this update, the links point to the appropriatev1
APIs. -
Before this update, Red Hat OpenShift Pipelines and Tekton Results incorrectly displayed
TaskRun
resources from previousPipelineRun
resource that shared the same name. This led to confusion about whichTaskRun
resources were associated with the current execution. With this update, Tekton Results now correctly isolates and displays only theTaskRun
resources associated with the currentPipelineRun
resource, preventing the mixing of archived and active execution data. - Before this update, end-to-end (E2E) tests were unstable due to GitOps comments being incorrectly associated with cancelled pipeline runs. This behavior caused intermittent test failures and reduced reliability in CI/CD pipelines. With this update, GitOps comments are no longer mixed with cancelled pipeline runs, resulting in stable and predictable E2E tests.
-
Before this update, the
tekton-caches
tarit
tool did not keep file permissions when compressing cached directories. As a result, executable files and scripts sometimes stopped working after being unpacked. This caused problems especially when artifacts were used by different users or SELinux-enforcing base images. With this update, file permissions are kept correctly during caching and files work as expected in all user environments. -
Before this update, when a
TaskRun
failed due toImagePullBackOff
errors, thePipelineRun
log snippet displayed unclear messages, such as “pods not found,” after switching between tabs in the Pipelines section of the OpenShift Container Platform web console. With this update, errors include clear error messages, such asTaskRunImagePullFailed
orfailing to pull image
, to improve the troubleshooting experience. -
Before this update, certain elements within the Red Hat OpenShift Pipelines Start interface in the OpenShift Container Platform web console, such as
deployment-name
,Hr
,Min
, andSec
, always showed in English, no matter the user’s regional settings. With this update, all interface elements are fully localized and now display according to the user’s selected region. -
Before this update, the Tekton pruner job encountered
ImagePullBackOff
errors during Helm-based installation due to missingSHA256 digests
in image tags. With this update, image tag includes the requiredSHA256 digests
and the error no longer occurs. -
Before this update, the Pipelines as Code controller could crash with an
index out of range
error during push events from Bitbucket Data Center. This behavior occurred when the changes array in the event payload was empty. With this update, Pipelines as Code now handles empty changes arrays gracefully, preventing the controller from crashing. -
Before this update, adding labels to pull requests would unintentionally trigger a
PipelineRun
. With this update, this issue is resolved. -
Before this update, closing a pull request would cancel ongoing
PipelineRun
even if thecancel-in-progress
annotation was not set. With this update, pipeline runs are only canceled on pull request closure when you configure thecancel-in-progress
annotation. - Before this update, the GitLab integration in Pipelines as Code encountered API call failures caused by an incorrect API URL. With this update, this issue is fixed by introducing URL validation, which prevents such misconfigurations and ensures successful API communication.
-
Before this update, Pipelines as Code did not cancel a
PipelineRun
created with thegenerateName
field, even when thecancel-in-progress
annotation was set. With this update, Pipelines as Code correctly cancels an in-progressPipelineRun
that contains thegenerateName
field. -
Before this update, when provenance was configured in GitLab, Pipelines as Code retrieved an incorrect
PipelineRun
template from the Git repository. With this update, Pipelines as Code correctly identifies and retrieves the intended template in GitLab provenance setups. -
Before this update, if you used the
/ok-to-test
GitOps command in a push commit comment, it triggered a pipeline run. With this update, the/ok-to-test
command no longer triggers a pipeline run when used outside of pull requests. -
Before this update,
TaskRun
andPipelineRun
resources failed with thekind param must be task or pipeline
error when referencingStepAction
definitions by the Artifact Hub resolver. This happened because theStepAction
definition was not recognized as a valid resource type. With this update, the Artifact Hub resolver supportsStepAction
references, allowing users to include remote step actions in their tasks and pipelines. -
Before this update,
PipelineRun
failed with the errorfailed to create subPath directory for volumeMount
, even though OpenShift Container Platform would eventually recover and create the required pod. This led to unnecessaryPipelineRun
failures and a poor user experience, often requiring manual restarts. With this update,PipelineRun
implements a grace period and retry mechanism forsubPath
directory creation errors. This allows OpenShift Container Platform time to resolve the issue automatically, reducing false failures and improving reliability. -
Before this update, the Tekton Results API server encountered an error when a log query was made for a non-existent
TaskRun
orPipelineRun
. With this update, the issue is fixed. -
Before this update, users had to wrap the CLI in separate
Task
resources to back up or restore build caches. With this update,StepAction
definitions supportfetch
andupload
, so you can handle cache operations with a single step inside anyTask
orPipeline
. -
Before this update, pushing a cache to a registry with a self-signed certificate failed due to TLS errors. With this update, the CLI and
Task
resource support new--insecure
flag, which enables those pushes and makes it easier to work with air-gapped development clusters and local registries. - Before this update, in GitLab, pipeline runs for Merge Requests (MRs) were automatically re-triggered when non-code changes occurred in Pipelines as Code, such as updating the MR description or modifying reviewers. This behavior caused unnecessary pipeline executions. With this update, this issue is fixed, and pipeline runs are only triggered by new commits.
-
Before this update, in Pipelines as Code, a push
PipelineRun
with theon-path-change
annotation was not triggered on pull request merge events, even when the merged pull request modified the specified paths. With this update, this issue is fixed by ensuring that the pipeline is correctly triggered when relevant path changes are introduced through a pull request merge. -
Before this update, Pipelines as Code attempted to parse and validate every YAML file in the
.tekton directory
, resulting in false errors for unrelated or invalid non-Tekton resources. With this update, Pipelines as Code validates only explicitly defined Tekton resources, reducing noise in pull request feedback and improving the accuracy of CI validation. - Before this update, a non-domain-qualified finalizer name was used, leading to warnings in the Pipelines as Code watcher from the Kubernetes API. This issue is now resolved by using a domain-qualified finalizer name that aligns with Kubernetes conventions.
- Before this update, the Pipelines as Code controller terminated unexpectedly when validating GitHub webhook secrets with an invalid or expired token. With this update, this issue is fixed. The controller logs a clear error message and continues running, ensuring webhook functionality and controller availability are not disrupted.
1.3. Release notes for Red Hat OpenShift Pipelines 1.19.1 Copia collegamentoCollegamento copiato negli appunti!
With this update, Red Hat OpenShift Pipelines General Availability (GA) 1.19.1 is available on OpenShift Container Platform 4.15 and later versions.
1.3.1. Fixed issues Copia collegamentoCollegamento copiato negli appunti!
- Before this update, installing the Red Hat OpenShift Pipelines 1.19 displayed the Tekton Pruner API in the console. With this update, this issue is fixed and the API is no longer displayed.
-
Before this update, installing OpenShift Pipelines on a FIPS-enabled cluster caused the Tekton entrypoint binary to display an error with the
FIPS mode is enabled, but this binary is not compiled with FIPS compliant mode enabled
message. With this update, this issue is fixed. OpenShift Pipelines functions correctly on FIPS-enabled clusters, and the Red Hat OpenShift Pipelines Operator is designed and validated for use on FIPS enabled clusters.
1.4. Release notes for Red Hat OpenShift Pipelines 1.19.2 Copia collegamentoCollegamento copiato negli appunti!
With this update, Red Hat OpenShift Pipelines General Availability (GA) 1.19.2 is available on OpenShift Container Platform 4.15 and later versions.
1.4.1. Fixed issues Copia collegamentoCollegamento copiato negli appunti!
-
Before this update, when you installed the OpenShift Pipelines Operator 1.19.0 by using the web console, the
Tekton Pruner
API was incorrectly visible in the Details section. With this update, theTekton Pruner`
API is no longer visible in the web console, as intended by the pruner design. - Before this update, there were only limited tasks fetched from ArtifactHUB in the pipeline builder page, and on search for a task, if the task was not available in the first fetched list, then that task was not displayed. With this update, UI makes an API call to ArtifactHub to search for a task in Pipeline builder quick search and lists them to install.
- Before this update, the Pipeline Builder page only fetched a limited number of tasks from Artifact Hub. If a searched task was not included in that initial list, it would not appear in the results. With this update, the UI now makes a direct API call to Artifact Hub during quick search, allowing users to find and list additional tasks for installation.
-
Before this update, the Events tab for a
PipelineRun
did not display any events. With this update, the tab now correctly shows events, allowing you to view relevant activity for eachPipelineRun
. -
Before this update,
onError
variable substitution did not work with thev1beta1
API. With this update, the issue has been fixed. -
Before this update, the Git resolver did not use the provided
gitToken
andgitTokenKey
for remote authentication, which caused HTTP token-based authentication to fail. With this update, all Git resolver operations now use the providedgitToken
for remote authentication.
1.5. Release notes for Red Hat OpenShift Pipelines 1.19.3 Copia collegamentoCollegamento copiato negli appunti!
With this update, Red Hat OpenShift Pipelines General Availability (GA) 1.19.3 is available on OpenShift Container Platform 4.15 and later versions.
1.5.1. Fixed issues Copia collegamentoCollegamento copiato negli appunti!
-
Before this update, upgrading to version 1.19.0 of the Red Hat OpenShift Pipelines Operator could cause the Operator pod to crash. This issue was caused by an empty pointer reference at startup when the
spec.tektonpruner.disabled
field in thetektonconfig
custom resource (CR) wasnil
. With this update, the issue is fixed. -
Before this update, the
tekton_pipelines_controller_running_pipelineruns
metric included pendingPipelineRun
objects in its count, causing inaccurate reporting. With this update, the metric counts only actively runningPipelineRun
objects, excluding those in a pending state, improving monitoring accuracy. - Before this update, the default Tekton Results TLS secret was mistakenly deleted during pre-upgrade steps on the OpenShift Container Platform. This deletion caused the Tekton Results API to fail during the upgrade process. With this update, OpenShift Pipelines prevents the deletion of the TLS secret, ensuring the Tekton Results API remains operational throughout the upgrade.
-
Before this update, a recent regression caused the git resolver to bypass the
Proxy
custom-configured public key infrastructure (PKI), which could prevent it from resolving references to self-hosted Git providers. With this update, the git resolver trusts the full CA bundle configured in theProxy
, including any certificates in your custom PKI, restoring secure connectivity to self-hosted Git providers. -
Before this update, if a
TaskRun
object failed to create a PersistentVolumeClaim (PVC) due to aResourceQuota
conflict, such as a concurrent update or exhausted quota, theTaskRun
was immediately marked asFailed
. With this update, when aTaskRun
encounters a PVC creation failure caused by aResourceQuota
issue, it remains in a pending state and retries PVC creation instead of failing immediately.