Catalyst Canton - Version 1.8 Release notes
What’s new
-
Extended Identity Provider Integration - Catalyst now supports integration with additional identity providers beyond Keycloak, enabling broader compatibility with enterprise authentication systems such as Auth0 and Okta.
-
Custom Authorization Controls - Introduced a configurable authorization mechanism that allows manual definition of clients and users to enhance flexibility for custom access control and tighter security policies.
Improvements
-
Validator Provisioning Flow Enhancements - Streamlined the creation and configuration process for validators with improved component orchestration and resource management, reducing setup time and potential misconfigurations.
-
Bug Fixes. - Includes various UI and backend corrections to improve stability and consistency.
Patches
-
v1.8.1 - Fixed application creation issue with custom Identity Providers.
-
v1.8.2 - Resolved volume sizing bug affecting Operator stability.
-
v1.8.3 - Updated Helm charts and removed deprecated replicated labels; internal CI/CD improvements.
-
v1.8.4 - Enabled license key injection via Kubernetes secrets.
-
v1.8.5 - Fixed port conflict in validator UI Docker images for versions >0.3.15.
-
v1.8.6 - Corrected Canton Name Server image reference from
cns-web-ui
toans-web-ui
for version 0.3.17. -
v1.8.7 - Added option to disable Role-Based Access Control and use a single Admin role.
-
…
-
v1.8.10 - Resolved a regression introduced in build v1.8.7.
-
v1.8.11 - Introduced ability to define default images (e.g., Postgres, NGINX).
-
v1.8.12 - Added configuration option to disable
typ
header verification. -
v1.8.13 - Enabled Postgres deployment customization via the Validator CRD.
-
v1.8.14 - Updated Postgres deployment strategy to support rolling updates.
Since v1.8.4 the license key can be passed as a secret, please update your values.yaml with the respective values.
|