Skip to content

Commit f9e5d1f

Browse files
authored
Merge pull request #97856 from DCChadwick/cmp3405
CMP-3405: adding SPO 0.9.0 bugs to release notes
2 parents 99fbb93 + 9548918 commit f9e5d1f

File tree

1 file changed

+34
-19
lines changed

1 file changed

+34
-19
lines changed

security/security_profiles_operator/spo-release-notes.adoc

Lines changed: 34 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,33 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
The Security Profiles Operator provides a way to define secure computing (https://kubernetes.io/docs/tutorials/security/seccomp/[seccomp]) and SELinux profiles as custom resources, synchronizing profiles to every node in a given namespace.
9+
The Security Profiles Operator provides a way to define secure computing (http://kubernetes.io/docs/tutorials/security/seccomp/[seccomp]) and SELinux profiles as custom resources, synchronizing profiles to every node in a given namespace.
1010

1111
These release notes track the development of the Security Profiles Operator in {product-title}.
1212

1313
For an overview of the Security Profiles Operator, see xref:../../security/security_profiles_operator/spo-overview.adoc#spo-overview[Security Profiles Operator Overview].
1414

15+
[id="spo-release-notes-0-9-0"]
16+
== Security Profiles Operator 0.9.0
17+
18+
The following advisory is available for the Security Profiles Operator 0.9.0:
19+
link:http://access.redhat.com/errata/RHBA-2025:15655[RHBA-2025:15655 - OpenShift Security Profiles Operator update]
20+
21+
This update manages security profiles as cluster-wide resources rather than namespace resources. To update Security Profiles Operator to a version later than 0.8.6 requires manual migration. For migration instructions, see link:http://access.redhat.com/articles/7130594[Security Profiles Operator 0.9.0 Update Migration Guide].
22+
23+
[id="spo-0-9-0-bug-fixes"]
24+
=== Bug fixes
25+
26+
* Before this update, the spod pods could fail to start and enter into a `CrashLoopBackOff` state due to an error in parsing the semanage configuration file. This issue is caused by a change to the RHEL 9 image naming convention beginning in {product-title} 4.19. (link:http://issues.redhat.com/browse/OCPBUGS-55829[*OCPBUGS-55829*])
27+
28+
* Before this update, the Security Profiles Operator would fail to apply a `RawSelinuxProfile` to newly added nodes due to a reconciler type mismatch error. With this update, the operator now correctly handles `RawSelinuxProfile` objects and policies are applied to all nodes as expected. (link:http://issues.redhat.com/browse/OCPBUGS-33718[*OCPBUGS-33718*])
29+
1530
[id="spo-release-notes-0-8-6"]
1631
== Security Profiles Operator 0.8.6
1732

1833
The following advisory is available for the Security Profiles Operator 0.8.6:
1934

20-
* link:https://access.redhat.com/errata/RHBA-2024:10380[RHBA-2024:10380 - OpenShift Security Profiles Operator update]
35+
* link:http://access.redhat.com/errata/RHBA-2024:10380[RHBA-2024:10380 - OpenShift Security Profiles Operator update]
2136

2237
This update includes upgraded dependencies in underlying base images.
2338

@@ -26,12 +41,12 @@ This update includes upgraded dependencies in underlying base images.
2641

2742
The following advisory is available for the Security Profiles Operator 0.8.5:
2843

29-
* link:https://access.redhat.com/errata/RHBA-2024:5016[RHBA-2024:5016 - OpenShift Security Profiles Operator bug fix update]
44+
* link:http://access.redhat.com/errata/RHBA-2024:5016[RHBA-2024:5016 - OpenShift Security Profiles Operator bug fix update]
3045

3146
[id="spo-0-8-5-bug-fixes"]
3247
=== Bug fixes
3348

34-
* When attempting to install the Security Profile Operator from the web console, the option to enable Operator-recommended cluster monitoring was unavailable for the namespace. With this update, you can now enabled Operator-recommend cluster monitoring in the namespace. (link:https://issues.redhat.com/browse/OCPBUGS-37794[*OCPBUGS-37794*])
49+
* When attempting to install the Security Profile Operator from the web console, the option to enable Operator-recommended cluster monitoring was unavailable for the namespace. With this update, you can now enabled Operator-recommend cluster monitoring in the namespace. (link:http://issues.redhat.com/browse/OCPBUGS-37794[*OCPBUGS-37794*])
3550

3651
* Previously, the Security Profiles Operator would intermittently be not visible in the OperatorHub, which caused limited access to install the Operator via the web console. With this update, the Security Profiles Operator is present in the OperatorHub.
3752

@@ -40,7 +55,7 @@ The following advisory is available for the Security Profiles Operator 0.8.5:
4055

4156
The following advisory is available for the Security Profiles Operator 0.8.4:
4257

43-
* link:https://access.redhat.com/errata/RHBA-2024:4781[RHBA-2024:4781 - OpenShift Security Profiles Operator bug fix update]
58+
* link:http://access.redhat.com/errata/RHBA-2024:4781[RHBA-2024:4781 - OpenShift Security Profiles Operator bug fix update]
4459

4560
This update addresses CVEs in underlying dependencies.
4661

@@ -54,43 +69,43 @@ This update addresses CVEs in underlying dependencies.
5469

5570
The following advisory is available for the Security Profiles Operator 0.8.2:
5671

57-
* link:https://access.redhat.com/errata/RHBA-2023:5958[RHBA-2023:5958 - OpenShift Security Profiles Operator bug fix update]
72+
* link:http://access.redhat.com/errata/RHBA-2023:5958[RHBA-2023:5958 - OpenShift Security Profiles Operator bug fix update]
5873

5974
[id="spo-0-8-2-bug-fixes"]
6075
=== Bug fixes
6176

62-
* Previously, `SELinuxProfile` objects did not inherit custom attributes from the same namespace. With this update, the issue has now been resolved and `SELinuxProfile` object attributes are inherited from the same namespace as expected. (link:https://issues.redhat.com/browse/OCPBUGS-17164[*OCPBUGS-17164*])
77+
* Previously, `SELinuxProfile` objects did not inherit custom attributes from the same namespace. With this update, the issue has now been resolved and `SELinuxProfile` object attributes are inherited from the same namespace as expected. (link:http://issues.redhat.com/browse/OCPBUGS-17164[*OCPBUGS-17164*])
6378

64-
* Previously, RawSELinuxProfiles would hang during the creation process and would not reach an `Installed` state. With this update, the issue has been resolved and RawSELinuxProfiles are created successfully. (link:https://issues.redhat.com/browse/OCPBUGS-19744[*OCPBUGS-19744*])
79+
* Previously, RawSELinuxProfiles would hang during the creation process and would not reach an `Installed` state. With this update, the issue has been resolved and RawSELinuxProfiles are created successfully. (link:http://issues.redhat.com/browse/OCPBUGS-19744[*OCPBUGS-19744*])
6580

66-
* Previously, patching the `enableLogEnricher` to `true` would cause the `seccompProfile` `log-enricher-trace` pods to be stuck in a `Pending` state. With this update, `log-enricher-trace` pods reach an `Installed` state as expected. (link:https://issues.redhat.com/browse/OCPBUGS-22182[*OCPBUGS-22182*])
81+
* Previously, patching the `enableLogEnricher` to `true` would cause the `seccompProfile` `log-enricher-trace` pods to be stuck in a `Pending` state. With this update, `log-enricher-trace` pods reach an `Installed` state as expected. (link:http://issues.redhat.com/browse/OCPBUGS-22182[*OCPBUGS-22182*])
6782

6883
* Previously, the Security Profiles Operator generated high cardinality metrics, causing Prometheus pods using high amounts of memory. With this update, the following metrics will no longer apply in the Security Profiles Operator namespace:
6984
+
7085
** `rest_client_request_duration_seconds`
7186
** `rest_client_request_size_bytes`
7287
** `rest_client_response_size_bytes`
7388
+
74-
(link:https://issues.redhat.com/browse/OCPBUGS-22406[*OCPBUGS-22406*])
89+
(link:http://issues.redhat.com/browse/OCPBUGS-22406[*OCPBUGS-22406*])
7590

7691
[id="spo-release-notes-0-8-0"]
7792
== Security Profiles Operator 0.8.0
7893

7994
The following advisory is available for the Security Profiles Operator 0.8.0:
8095

81-
* link:https://access.redhat.com/errata/RHBA-2023:4689[RHBA-2023:4689 - OpenShift Security Profiles Operator bug fix update]
96+
* link:http://access.redhat.com/errata/RHBA-2023:4689[RHBA-2023:4689 - OpenShift Security Profiles Operator bug fix update]
8297

8398
[id="spo-0-8-0-bug-fixes"]
8499
=== Bug fixes
85100

86-
* Previously, while trying to install Security Profiles Operator in a disconnected cluster, the secure hashes provided were incorrect due to a SHA relabeling issue. With this update, the SHAs provided work consistently with disconnected environments. (link:https://issues.redhat.com/browse/OCPBUGS-14404[*OCPBUGS-14404*])
101+
* Previously, while trying to install Security Profiles Operator in a disconnected cluster, the secure hashes provided were incorrect due to a SHA relabeling issue. With this update, the SHAs provided work consistently with disconnected environments. (link:http://issues.redhat.com/browse/OCPBUGS-14404[*OCPBUGS-14404*])
87102

88103
[id="spo-release-notes-0-7-1"]
89104
== Security Profiles Operator 0.7.1
90105

91106
The following advisory is available for the Security Profiles Operator 0.7.1:
92107

93-
* link:https://access.redhat.com/errata/RHSA-2023:2029[RHSA-2023:2029 - OpenShift Security Profiles Operator bug fix update]
108+
* link:http://access.redhat.com/errata/RHSA-2023:2029[RHSA-2023:2029 - OpenShift Security Profiles Operator bug fix update]
94109

95110
[id="spo-0-7-1-new-features-and-enhancements"]
96111
=== New features and enhancements
@@ -121,38 +136,38 @@ SPO memory optimization is not enabled by default.
121136
[id="spo-0-7-1-bug-fixes"]
122137
=== Bug fixes
123138

124-
* Previously, a Security Profiles Operator (SPO) SELinux policy did not inherit low-level policy definitions from the container template. If you selected another template, such as net_container, the policy would not work because it required low-level policy definitions that only existed in the container template. This issue occurred when the SPO SELinux policy attempted to translate SELinux policies from the SPO custom format to the Common Intermediate Language (CIL) format. With this update, the container template appends to any SELinux policies that require translation from SPO to CIL. Additionally, the SPO SELinux policy can inherit low-level policy definitions from any supported policy template. (link:https://issues.redhat.com/browse/OCPBUGS-12879[*OCPBUGS-12879*])
139+
* Previously, a Security Profiles Operator (SPO) SELinux policy did not inherit low-level policy definitions from the container template. If you selected another template, such as net_container, the policy would not work because it required low-level policy definitions that only existed in the container template. This issue occurred when the SPO SELinux policy attempted to translate SELinux policies from the SPO custom format to the Common Intermediate Language (CIL) format. With this update, the container template appends to any SELinux policies that require translation from SPO to CIL. Additionally, the SPO SELinux policy can inherit low-level policy definitions from any supported policy template. (link:http://issues.redhat.com/browse/OCPBUGS-12879[*OCPBUGS-12879*])
125140

126141

127142
[id="spo-0-7-1-known-issue"]
128143
=== Known issue
129144

130-
* When uninstalling the Security Profiles Operator, the `MutatingWebhookConfiguration` object is not deleted and must be manually removed. As a workaround, delete the `MutatingWebhookConfiguration` object after uninstalling the Security Profiles Operator. These steps are defined in xref:../../security/security_profiles_operator/spo-uninstalling.adoc#spo-uninstalling[Uninstalling the Security Profiles Operator]. (link:https://issues.redhat.com/browse/OCPBUGS-4687[*OCPBUGS-4687*])
145+
* When uninstalling the Security Profiles Operator, the `MutatingWebhookConfiguration` object is not deleted and must be manually removed. As a workaround, delete the `MutatingWebhookConfiguration` object after uninstalling the Security Profiles Operator. These steps are defined in xref:../../security/security_profiles_operator/spo-uninstalling.adoc#spo-uninstalling[Uninstalling the Security Profiles Operator]. (link:http://issues.redhat.com/browse/OCPBUGS-4687[*OCPBUGS-4687*])
131146

132147
[id="spo-release-notes-0-5-2"]
133148
== Security Profiles Operator 0.5.2
134149

135150
The following advisory is available for the Security Profiles Operator 0.5.2:
136151

137-
* link:https://access.redhat.com/errata/RHBA-2023:0788[RHBA-2023:0788 - OpenShift Security Profiles Operator bug fix update]
152+
* link:http://access.redhat.com/errata/RHBA-2023:0788[RHBA-2023:0788 - OpenShift Security Profiles Operator bug fix update]
138153

139154
This update addresses a CVE in an underlying dependency.
140155

141156

142157
[id="spo-0-5-2-known-issue"]
143158
=== Known issue
144159

145-
* When uninstalling the Security Profiles Operator, the `MutatingWebhookConfiguration` object is not deleted and must be manually removed. As a workaround, delete the `MutatingWebhookConfiguration` object after uninstalling the Security Profiles Operator. These steps are defined in xref:../../security/security_profiles_operator/spo-uninstalling.adoc#spo-uninstalling[Uninstalling the Security Profiles Operator]. (link:https://issues.redhat.com/browse/OCPBUGS-4687[*OCPBUGS-4687*])
160+
* When uninstalling the Security Profiles Operator, the `MutatingWebhookConfiguration` object is not deleted and must be manually removed. As a workaround, delete the `MutatingWebhookConfiguration` object after uninstalling the Security Profiles Operator. These steps are defined in xref:../../security/security_profiles_operator/spo-uninstalling.adoc#spo-uninstalling[Uninstalling the Security Profiles Operator]. (link:http://issues.redhat.com/browse/OCPBUGS-4687[*OCPBUGS-4687*])
146161

147162
[id="spo-release-notes-0-5-0"]
148163
== Security Profiles Operator 0.5.0
149164

150165
The following advisory is available for the Security Profiles Operator 0.5.0:
151166

152-
* link:https://access.redhat.com/errata/RHBA-2022:8762[RHBA-2022:8762 - OpenShift Security Profiles Operator bug fix update]
167+
* link:http://access.redhat.com/errata/RHBA-2022:8762[RHBA-2022:8762 - OpenShift Security Profiles Operator bug fix update]
153168

154169

155170
[id="spo-0-5-0-known-issue"]
156171
=== Known issue
157172

158-
* When uninstalling the Security Profiles Operator, the `MutatingWebhookConfiguration` object is not deleted and must be manually removed. As a workaround, delete the `MutatingWebhookConfiguration` object after uninstalling the Security Profiles Operator. These steps are defined in xref:../../security/security_profiles_operator/spo-uninstalling.adoc#spo-uninstalling[Uninstalling the Security Profiles Operator]. (link:https://issues.redhat.com/browse/OCPBUGS-4687[*OCPBUGS-4687*])
173+
* When uninstalling the Security Profiles Operator, the `MutatingWebhookConfiguration` object is not deleted and must be manually removed. As a workaround, delete the `MutatingWebhookConfiguration` object after uninstalling the Security Profiles Operator. These steps are defined in xref:../../security/security_profiles_operator/spo-uninstalling.adoc#spo-uninstalling[Uninstalling the Security Profiles Operator]. (link:http://issues.redhat.com/browse/OCPBUGS-4687[*OCPBUGS-4687*])

0 commit comments

Comments
 (0)