Version 6.0.0-alpha.16
Packages
We have made new alpha release 16:
Agent image:
public.ecr.aws/q8a6e1s5/public-agent:v6.0.0-alpha.1-8-g22f83c3e4
lenses/public-agent:v6.0.0-alpha.1-8-g22f83c3e4
HQ image:
public.ecr.aws/q8a6e1s5/public-hq:v6.0.0-alpha.16
lenses/public-hq:v6.0.0-alpha.16
New Helm version 16 for agent and for the HQ: https://lenses.jfrog.io/ui/native/helm-charts-preview/
HQ Changelog
Introducing License
With the new version of HQ, we are introducing licence. Every customer will receive licence separately.
Additional field acceptEULA has been introduced as well and has to be accepted otherwise HQ will fail on startup.
license:
# -- (string) Enables usage of secret for licence.
# **Required: false**
referenceFromSecret: false
# -- (string) Secret name where licence is stored.
# **Required: false**
secretName: ""
# -- (string) Secret key where within a secret where licence is sotred.
# **Required: false**
secretKeyName: ""
# Marks the end-user license agreement (EULA) as accepted.
acceptEULA: true
New authentication method (Password based)
In the new release, password-based authentication has been introduced as an optional method alongside SAML / SSO.
lensesHq_
auth:
# -- Adds uses for password based auth
# **Required: false**
users:
- username: admin
# bcrypt("changeme").
password: $2a$12$dTSwP3jgCQPoBNDYXNoLy.6l7fMcHYgonl0u8GYCOrkfGM4a.8jze
SAML / SSO is now optional
In previous versions, SAML / SSO was a mandatory requirement for authentication. However, with the new release, it becomes optional, allowing you to choose between password-based authentication and SAML / SSO according to your needs.
Existing alpha users will have to introduce lensesHq.saml.enabled
property into their values.yaml
files
lensesHq:
auth:
saml:
# -- Enables SAML / SSO authentication
# **Required: true**
enabled: false
Ingress structure changes + new agent ingress
In this release, the ingress configuration has been enhanced to provide more flexibility.
Previously, the HQ chart supported a single ingress setting, but now you can define separate ingress configurations for HTTP and the agent.
This addition allows you to tailor ingress rules more specifically to your deployment needs, with dedicated rules for handling HTTP traffic and TCP-based agent connections.
The http
ingress is intended only for HTTP/S traffic, while the agents
ingress is designed specifically for TCP protocol. Ensure appropriate ingress configuration for your use case.
ingress:
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.middlewares: common-traefik-basic-auth@kubernetescrd
enabled: true
host: example.com
Agent
Due to new changes in provisioning structure, the database to which agent is connected must be recreated.
Changes in provisioning connection to HQ
In the provisioning, there has been slight adjustment in connection naming with HQ.
Changes:
grpcServer has been renamed to lensesHq
apiKey has been renamed to agentKey
lenses:
provision:
enabled: true
version: "2"
path: /mnt/provision-secrets
connections:
grpcServer: # Property that has changed
- name: lenses-hq
version: 1
tags: ['hq']
configuration:
server:
value: [HQ_URL]
port:
value: 10000
apiKey: # Property that has changed
value: ${LENSESHQ_AGENT_KEY}
Known issues
With the new version of Agent, HQ connection in provisioning has changed which requires complete recreation of database. Following log message will indicate it:
liquibase.exception.ValidationFailedException: Validation Failed: │
│ 1 change sets check sum │
│ io/lenses/store/jdbc/migration/6.0.0/02_new_template_data.xml::2::lenses was: 8:357e3bd4e93a5cc938420eb2521c4b7c but is now: 8:03dad3472f5facacdd10a985e5e02da3 │
Last updated
Was this helpful?