Release 2022-07-05 - (expected chart version 4.18.0)#2540
Closed
Release 2022-07-05 - (expected chart version 4.18.0)#2540
Conversation
After Vedran asked about it
glibc 2.34 uses the clone3 syscall, which is not part of the seccomp filters that moby ships on older versions. While as a workaround you might be able to run containers with `--privileged`, it's the better call to just run a more recent Docker runtime. References: - docker/buildx#772 - moby/buildkit#2379 - moby/moby#42836 - NixOS/nixpkgs#170900
docs/src/how-to/install/dependencies.rst: require Docker >= 20.10.14
Lint remaining tools
Reverted back to sequence+map to avoid GHC issue when dealing with Arbitrary instances
Merge master back into develop for release 2022-06-08
Lint remaining services
Co-authored-by: Zebot <zebot@users.noreply.github.com>
Co-authored-by: Stefan Matting <stefan@wire.com>
add more details on grabbing metrics
Docs/fs 698 docs improvements
…ion-when-provisioning-users-with-scim Added preferred language field to mapping scheme.
Added more examples to Schema Profuctor docs.
Fix squashed problem
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Co-authored-by: Leif Battermann <leif.battermann@wire.com>
Backup and disaster recovery instructions
* Only log IO exceptions, not polysemy errors * Make sure that the Resource effect is run last * Remove redundant Error Wai.Error effect
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
[2022-07-05] (Chart Release 4.18.0)
Release notes
For users of the (currently alpha) coturn Helm chart:
manual intervention may be required when upgrading to
this version of the chart from a prior version, due to a bug in
Kubernetes which
may interfere with applying changes to pod and service port configuration
correctly.
If, after updating this chart, the coturn pods do not have both a
coturn-udpport and a
coturn-tcpport, then the coturnStatefulSetmust be manuallydeleted from the cluster, and then recreated by re-running Helm. Similarly, if
the coturn
Servicedoes not have both acoturn-udpport and acoturn-tcpport, this
Servicemust also be deleted and recreated. (Add UDP endpoints to coturn Helm chart #2500)The
nginz{-tcp,-http}services have been unified into anginzservice, andmoved into the nginz chart.
The nginz-ingress-services chart simply targets the
nginzservice, so there'sno need to set matching
service.nginz.external{Http,Tcp}Portinside thenginx-ingress-serviceschart anymore.The
config.http.httpPortandconfig.ws.wsPortvalues in thenginzchartstill configure the ports the
nginzservice is listening on.Metrics were moved from
config.http.httpPortto a newhttp-metricsport.The
nginzchart also gained support formetrics.serviceMonitor.enabled,creating a
ServiceMonitorresource to scrape metrics, like for other wireservices.
(//services/nginz/third_party/nginx-module-vts: update #2476)
Upgrade webapp version to 2022-06-30-production.0-v0.30.5-0-3e2aaf6 (Update webapp version in Helm chart [skip ci] #2302)
In the helm charts, the
wireServicelabel has been removed.In some cases, we were already setting the
applabel too.Now we consistently use the
applabel to label different wire services.The
wireServicelabel was also used in thespec.selector.matchLabelsfieldon existing
Deployment/StatefulSetresources.As these fields being immutable, changing them isn't possible without recreation.
If you encounter an issue like
you need to manually delete these StatefulSet and Deployment resources, and apply helm again, which will recreate them.
This means downtime, so plan a maintenance window for it.
The
wire-server-metricschart was previously running some customconfiguration to automatically add all payloads with a
wireServicelabel intometrics scraping.
With the removal of the
wireServicelabel, this custom configuration has beenremoved.
Instead, all services that expose metrics will now create
ServiceMonitorresources, if their helm chart is applied with
metrics.serviceMonitor.enableset to true.
This prevents scraping agents from querying services that don't expose metrics
at /i/metrics unnecessarily.
Additionally, makes it easier to run other metric scraping operators, like
grafana-agent-operator, without the need to also create some customwireServicelabel config there.Generally, if you have any monitoring solution installed in your cluster that
uses the Prometheus CRDs, set
metrics.serviceMonitor.enablefor the following charts:API changes
The request body of
POST /conversationsendpoint can now contain an optionalcreator_clientfield. Thecreator_clientfield is only relevant for MLS conversations, in which case it must be set to the ID of the client making the request. (Fix handling of creator client in MLS conversations #2486)Retire deprecated feature config API endpoints for API version V2 (SQSERVICES-1529 Swagger docs and endpoint deprecation for API version V2 #2492)
Features
Prevent race conditions in concurrent MLS commit requests. (Prevent race conditions in concurrent MLS commit requests #2525)
charts/wire-server: Optionally include backoffice (Optionally include backoffice when installing wire-server helm chart #2490)
The coturn chart has new functionality to enable graceful pod termination, by
waiting for all active allocations on a coturn instance to drain first. When
combined with a suitable external service discovery mechanism which can steer
client traffic away from terminating coturn pods, this can be used to implement
graceful rolling restarts of clusters of coturn instances. (Add graceful termination to coturn chart #2456)
./deploy/services-demo/create_team_members.shcreates users with given roles now (Accept roles when creating teams with demo script. #2137)MLS implementation progress:
conversation participants. (Propagate MLS messages to remotes #2415)
charts/nginz: Serve swagger-ui for viewing swagger-1.2 docs (charts/nginz: Serve swagger-ui #2466)
GET teams/:tidresponse now contains an optional fieldsplash_screenwhich contains the asset key of the team's splash screen.PUT teams/:tidnow supports updating the splash screen asset key. (Sqservices 759 backend splash screen store image #2474)Missing feature config mapping added (Add missing config mapping and sort feature flags by name #2494)
Add MLS team feature configuration (Add MLS feature config #2499)
Team feature API now includes endpoints to get and set the
searchVisibilityInboundfeature (SQSERVICES-1441 Search visibility rules #2503)Bug fixes and other updates
charts/backoffice: Fix version of frontend and auto-bump version of stern on every release (Optionally include backoffice when installing wire-server helm chart #2490)
The service definitions in the coturn Helm chart were missing the control plane
UDP port used by coturn. (Add UDP endpoints to coturn Helm chart #2500)
In nginx-ingress-services chart, when enabling useCertManager, now correctly creates the required issuer by default. (correctly set default nginx-ingress-services-issuer-creation variable #2532)
Fix handling of creator client in MLS conversations (Fix handling of creator client in MLS conversations #2486)
Fix all clients having the same MLS public key ([FS-705] Fix Repeated MLS Public Keys #2501)
A user now cannot delete an identity provider that they are authenticated with any more (SQSERVICES-1628-dont-allow-deleting-id-ps-if-the-deleting-user-is-authenticated-by-it #2519)
Internal changes
brig-types: remove all re-exports (brig-types: remove all re-exports #2505)
Fixed flakiness of email update test, related to the test user account being suspended, causing subsequent runs of the test to fail. (#PR_NOT_FOUND)
Do not log polysemy errors in Galley (Only log IO exceptions, not polysemy errors #2531)
galley-types: remove all re-exports (galley-types: remove all re-exports #2504)
Enforce some IdP invariants (Improve IdP invariants #2533)
Switch to new MLS test CLI (https://github.com/wireapp/mls-test-cli) (New MLS test tool #2508)
Forward /i/users/:uid/features/:feature to brig (charts/nginz: Forward /i/users/:uid/features/:feature to brig #2468)
charts/nginz: Forward
/i/legalhold/whitelisted-teamsto galley instead of brig (charts/nginz: Forward/i/legalhold/whitelisted-teamsto galley instead of brig #2460)make the ldap-scim-bridge chart deployable once per team, and improve docs. (Contact with reality #1843)
Refactored and simplified the feature config API (Simplify Feature Configuration #2435)
Removed deprecated internal feature config API endpoints (Sqservices 1529 remove redundant endpoints internal and view feature permissions #2496)
Deactivated gundeck's integration tests for local steps (
make ci). (ignore RealAWS integration tests in local setup #2510)retry gundeck's Redis connection in case of network errors such as IP changes or network outages (retry Redis connection in case of network errors #2512)
Remove old crypto-cli tool from the ubuntu image (Remove old crypto-cli tool from the ubuntu image #2538)
Add AWS security token metrics to all services (Add AWS security token metrics to brig #2473)