Skip to content
This repository has been archived by the owner on Feb 8, 2023. It is now read-only.

Latest commit

 

History

History
76 lines (64 loc) · 5.81 KB

v201807-1.md

File metadata and controls

76 lines (64 loc) · 5.81 KB

PTFE Release v201807-1

CHANGELOG

ADDITIONAL STEPS REQUIRED FOR ALL UPGRADING INSTALLS USING EXTERNAL SERVICES

NOTE: The parameters used to configure access to the PostgreSQL instance for an external services installation have changed. You must have your PostgreSQL connection information on hand to perform the upgrade.

Perform the following steps to properly upgrade:

  • BEFORE UPGRADING: Retrieve PostgreSQL connection details and database credentials for reentry. These are available from the Settings screen before upgrading.
  • After clicking Install, you will see an error starting the application similar to container ... exited with non-zero.
  • Proceed to the Settings screen where you will need to re-enter the connection details (username, password, hostname and port, database name) in the settings screen.
  • When asked if you wish to restart on the Settings screen, answer yes.
  • The system will then begin booting properly.

Refer to the Automated Installation guide for more details for performing automated installs.

APPLICATION LEVEL FEATURES:

  1. Added ability to cancel a run during a Sentinel policy check.
  2. Added ability for user to update their username and email in the UI.
  3. Added ability to rename a workspace.
  4. Added user's email address to account details API.
  5. Added a new API for configuring an installation's Twilio settings, and a migration from previous settings.
  6. Added a link to runs created from pull requests to the pull request.
  7. Added a new first user creation page for new PTFE installations.
  8. Added a new API for configuring an installation's SMTP settings, and a migration from previous settings.
  9. Changed runs page to display Terraform logs by default when they are last event.
  10. Added a new API for configuring an installations SAML settings, and a migration from previous settings.
  11. Added a new site admin user interface, and a link to it in the account drop down.
  12. Added a periodic worker to kill Sentinel jobs that hang or otherwise error out in a way that does not send a correct response back to TFE and mark the run as errored.
  13. Added validation of OAuth client API URL at creation time.
  14. Changed the GitLab.com base API URL to the v4 API for new OAuth clients.
  15. Added current user avatar in site header when it is available.
  16. Removed "Plan successfully queued" notification.
  17. Added confirmation dialog when deleting a Sentinel policy.
  18. Added a debug setting for SAML SSO that allows an admin to see the SAMLResponse XML and processed values when login fails.
  19. Added a copyable signup link when adding new team members.
  20. Added ability to migrate legacy environments to workspaces. When creating a workspace, select the "Import from legacy (Atlas) environment" tab. For more information, see the Upgrade guide.
  21. Added an error when unpacking an unknown file type from a slug.
  22. Added warning log and halt execution of runs when any Terraform state file is detected in the configuration version.
  23. Change regsitry module repo validation to disallow uppercase characters.
  24. Enable bootstrap-less workflow in PTFE
  25. Split the PostgreSQL URI into component parts

APPLICATION LEVEL BUG FIXES:

  1. Fixed an issue where duplicate headers were being sent to Bitbucket Server, sometimes causing a 400 response.
  2. Fixed an issue where Bitbucket Server would send malformed webhook settings.
  3. Fixed an issue that brok browser history when API or network errors were encountered.
  4. Fixed an issue when Bitbucket Cloud sends a webhook payload with a changeset with no commits.
  5. Fixed an issue where Bitbucket Server returns an empty body during an unauthorized request.
  6. Fixed an issue where an organization could not be deleted due to dependencies being referenced.
  7. Fixed an issue where a run would attempt to queue up the wrong operation.
  8. Fixed an issue where changing workspace VCS settings then navigating away and back resulted in a broken VCS settings page.
  9. Fixed an issue with publishing registry modules inside of organizations with long names.
  10. Fixed an issue that prevented X-Forwarded-For headers from be respected and used for audit log entries.
  11. Fixed an issue where no_proxy environment variable was being ignored.
  12. Fixed an issue that prevented editing a variable name immediately after creating it
  13. Fixed an issue where auto-apply combined with a Sentinel policy check would prevent some runs from applying after confirmation.
  14. Fixed an issue that caused git branches ending in master to be treated as the default branch.
  15. Fixed an issue that prevented SAML SSO for admins logging in when SMTP was not properly configured.
  16. Fixed an issue that prevented GitLab merge request webhooks from creating plans and reporting back the plans status.
  17. Fixed an issue that caused tage creation events to sometimes incorrectly cause a run to be created.
  18. Fixed an issue that prevented providers from being filtered properly during module registry downloads.
  19. Fixed an issue where renaming organizations with published registry modules did not correctly re-namespace the modules and remain published in the same organization.
  20. Fixed an issue that prevented password managers from working well when updating a user's password.
  21. Fixed an issue that prevented sensitive variables from being edited in the UI.
  22. Fixed an issue where the first run on a workspace when using Gitlab as the VCS provider displayed a malformed commit url.
  23. Fixed an issue where run that take longer than 3 hours will no longer fail to upload their state when finished applying. Applies will still time out after 24 hours.
  24. Fixed an issue that prevented registry modules with plus signs in their version number from being accessed.

APPLICATION API BREAKING CHANGES:

APPLICATION LEVEL SECURITY FIXES: