Skip to content

OADP-7566: Add 1.4.9 RNs#109004

Open
vashirova wants to merge 1 commit intoopenshift:enterprise-4.18from
vashirova:OADP-7566-RN-149
Open

OADP-7566: Add 1.4.9 RNs#109004
vashirova wants to merge 1 commit intoopenshift:enterprise-4.18from
vashirova:OADP-7566-RN-149

Conversation

@vashirova
Copy link
Member

@vashirova vashirova commented Mar 25, 2026

Version(s):
OCP 4.14-4.18

Issue:
OADP-7566

Link to docs preview:

QE review:

  • QE has approved this change.

Changes:

  • Add OADP 1.4.9 Release Notes and update attributes.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Mar 25, 2026
@openshift-ci-robot
Copy link

openshift-ci-robot commented Mar 25, 2026

@vashirova: This pull request references OADP-7566 which is a valid jira issue.

Details

In response to this:

Version(s):
OCP 4.14-4.18

Issue:
OADP-7566

Link to docs preview:

QE review:

  • QE has approved this change.

Changes:

  • Add OADP 1.4.9 Release Notes and update attributes.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@vashirova
Copy link
Member Author

/label OADP

@openshift-ci openshift-ci bot added OADP Label for all OADP PRs size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Mar 25, 2026
@ocpdocs-previewbot
Copy link

🤖 Wed Mar 25 16:34:55 - Prow CI generated the docs preview:
https://109004--ocpdocs-pr.netlify.app
Complete list of updated preview URLs: artifacts/updated_preview_urls.txt

@openshift-ci
Copy link

openshift-ci bot commented Mar 25, 2026

@vashirova: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Mar 25, 2026

@vashirova: This pull request references OADP-7566 which is a valid jira issue.

Details

In response to this:

Version(s):
OCP 4.14-4.18

Issue:
OADP-7566

Link to docs preview:

QE review:

  • QE has approved this change.

Changes:

  • Add OADP 1.4.9 Release Notes and update attributes.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@vashirova
Copy link
Member Author

@weshayutin, @akarol, @anarnold97, could you please review OADP 1.4.9 release notes? Are they accurate and complete? Note that I didn't include OADP-5473 based on Fix versions and Status, but lemme know if I should. Thank you!

@weshayutin
Copy link

THANK YOU!!
/LGTM

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Mar 25, 2026
+
link:https://redhat.atlassian.net/browse/OADP-3143[OADP-3143]

DPA reconciliation fails with a clear error when a VSL references missing credential key::
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
DPA reconciliation fails with a clear error when a VSL references missing credential key::
DPA reconciliation fails with a clear error when a VSL references a missing credential key::

link:https://redhat.atlassian.net/browse/OADP-4833[OADP-4833]

Restricted permissions for Velero cloud credentials::
Before this update, Velero `/credentials/cloud` secret was mounted with incorrect permissions, making it world-readable. As a consequence, any process or user with access to the container file system could read sensitive cloud credential data. With this release, the Velero secret default permissions were changed to `0640`. As a result, access to the credentials file is limited to the intended owner or group.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Before this update, Velero `/credentials/cloud` secret was mounted with incorrect permissions, making it world-readable. As a consequence, any process or user with access to the container file system could read sensitive cloud credential data. With this release, the Velero secret default permissions were changed to `0640`. As a result, access to the credentials file is limited to the intended owner or group.
Before this update, the Velero `/credentials/cloud` secret was mounted with incorrect permissions, making it world-readable. As a consequence, any process or user with access to the container file system could read sensitive cloud credential data. With this release, the Velero secret default permissions were changed to `0640`. As a result, access to the credentials file is limited to the intended owner or group.

== Resolved issues

File system backups no longer create `PodVolumeBackup` CRs for excluded PVCs::
Before this update, when performing a file system (FS) backup with `defaultVolumesToFsBackup: true` and explicitly excluding `persistentvolumeclaims` (PVCs) via `includedResources`, `PodVolumeBackup` resources were still created for these excluded PVCs.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Before this update, when performing a file system (FS) backup with `defaultVolumesToFsBackup: true` and explicitly excluding `persistentvolumeclaims` (PVCs) via `includedResources`, `PodVolumeBackup` resources were still created for these excluded PVCs.
Before this update, when performing a file system (FS) backup with `defaultVolumesToFsBackup: true` and explicitly excluding `persistentvolumeclaims` (PVCs) using `includedResources`, `PodVolumeBackup` resources were still created for these excluded PVCs.

Not sure we should "via" in this context

link:https://redhat.atlassian.net/browse/OADP-3009[OADP-3009]

S3 storage uses proxy values with `insecureSkipTLSVerify: "true"`::
Before this update, when running image registry backups to S3 storage in a proxy-required environment, setting `insecureSkipTLSVerify: "true"` caused the S3 storage to ignore the configured proxy environment. As a consequence, image registry backups could fail or hang in proxy environments. With this release, the image registry backup path is updated. As a result, backups with `backupImages: true` complete successfully with both `insecureSkipTLSVerify:` set to `"true"` and `"false"`.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Before this update, when running image registry backups to S3 storage in a proxy-required environment, setting `insecureSkipTLSVerify: "true"` caused the S3 storage to ignore the configured proxy environment. As a consequence, image registry backups could fail or hang in proxy environments. With this release, the image registry backup path is updated. As a result, backups with `backupImages: true` complete successfully with both `insecureSkipTLSVerify:` set to `"true"` and `"false"`.
Before this update, when running image registry backups to S3 storage in a proxy-required environment, setting `insecureSkipTLSVerify: "true"` caused the system to ignore the configured proxy, leading to backups hanging or failing. With this release, the backup logic has been updated to properly respect proxy settings. As a result, backups using `backupImages: true` now complete successfully regardless of whether `insecureSkipTLSVerify` is set to "true" or "false".

pedantic

Copy link
Contributor

@anarnold97 anarnold97 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A few suggestions but nothing that needs to be changed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. OADP Label for all OADP PRs size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants