Skip to content

Releases: backstage/backstage

v1.28.4

04 Jul 11:19
2a0bdac
Compare
Choose a tag to compare

This release fixes an issue where search had the wrong set of dependencies in the new frontend system.

v1.29.0-next.1

02 Jul 10:28
ea6fb59
Compare
Choose a tag to compare
v1.29.0-next.1 Pre-release
Pre-release

v1.28.3

26 Jun 10:48
31a1b16
Compare
Choose a tag to compare

This release fixes a number of small issues:

  • Fixing issue with EntityPicker and MultiEntityPicker with large Catalogs in the Scaffolder
  • Fixing ISO Duration parsing in schedules
  • Fixing validation for RepoUrlPicker when using Azure repositories
  • Fixing the ability to opt out of the default route binding
  • Fixing issue with github:environment:create and environment variables not being created properly due to Octokit breaking change

v1.29.0-next.0

25 Jun 14:09
48fd7e8
Compare
Choose a tag to compare
v1.29.0-next.0 Pre-release
Pre-release

v1.28.2

19 Jun 18:05
b9909b2
Compare
Choose a tag to compare

This release fixes two issues:

  • Fixing issue with versions:bump script not working correctly since 1.28.0
  • Fixing issue with MiddlewareFactory deprecated type not being compatible with the old type

If you updated to an earlier 1.28 patch and keep running into errors similar to Error: Failed to parse yarn.lock entry ..., you can upgrade the backstage CLI separately like this to get unblocked:

yarn up @backstage/cli

v1.28.1

19 Jun 15:36
934359f
Compare
Choose a tag to compare

This release fixes the following issues:

  • Fixing issues with missing dependencies like morgan.
  • Fixing issues with deprecated imports being of the wrong type in backend-app-api and backend-common.
  • Fixed an issue with typescript not resolving the correct types for subpath exports

v1.28.0

18 Jun 14:30
5bf78d7
Compare
Choose a tag to compare

These are the release notes for the v1.28.0 release of Backstage.

A huge thanks to the whole team of maintainers and contributors as well as the amazing Backstage Community for the hard work in getting this release developed and done.

Highlights

BREAKING: Proxy backend plugin protected by default

The proxy backend plugin is now protected by Backstage auth, by default. Unless specifically configured (see below), all proxy endpoints will reject requests immediately unless a valid Backstage user or service token is passed along with the request. This aligns the proxy with how other Backstage backends behave out of the box, and serves to protect your upstreams from unauthorized access.

Here's an example of how to configure:

  proxy:
    endpoints:
      '/pagerduty':
        target: https://api.pagerduty.com
+       credentials: require
        headers:
          Authorization: Token token=${PAGERDUTY_TOKEN}

There are three credentials settings:

  • require: Callers need Backstage credentials. These are not forwarded to the target.
  • forward: Callers need Backstage credentials, which are forwarded to the target.
  • dangerously-allow-unauthenticated: No Backstage credentials needed. Target can apply its own checks. Incoming tokens of any sort will be allowed but ignored, and will also be forwarded if allowedHeaders: ['Authorization'] is included.

The new default is require, replacing the old dangerously-allow-unauthenticated. This means some previously permitted requests may now result in 401 Unauthorized responses. This does not apply if backend.auth.dangerouslyDisableDefaultAuthPolicy is set to true.

For proxy endpoints still requiring unauthenticated access, add credentials: dangerously-allow-unauthenticated in your app-config.

See the proxy documentation for more information.

BREAKING: Gerrit integration breaking changes

  • The workdir argument have been removed from The GerritUrlReader constructor;
  • The Gerrit readTree implementation will now only use the Gitiles api, so the support for using git to clone the repo has been removed;
  • The gitilesBaseUrl is now mandatory for the Gerrit integration and the ability to override this requirement using the DISABLE_GERRIT_GITILES_REQUIREMENT environment variable has been removed.

Contributed by @anicke in #25123.

BREAKING: Github integration breaking changes

  • Removed deprecated code from when casing was changed from GitHub to Github nearly two years ago. The following items have been removed:
    • getGitHubFileFetchUrl (use getGithubFileFetchUrl instead)
    • GitHubIntegrationConfig (use GithubIntegrationConfig instead)
    • GitHubIntegration (use GithubIntegration instead)
    • readGitHubIntegrationConfig (use readGithubIntegrationConfig instead)
    • readGitHubIntegrationConfigs (use readGithubIntegrationConfigs instead)
    • replaceGitHubUrlType (use replaceGithubUrlType instead)

Contributed by @awanlin in #25100.

BREAKING: OAuth Scope Updates

The way that OAuth-based auth providers handle scopes has received several updates. There is now a new .additionalScopes configuration for all OAuth providers, which can be used to request additional scopes for all sessions. Many providers already had a similar configuration, but in most cases this did not work correctly as scopes requested by the client would override the configured set.

Many providers now also have a set of required scopes that will always be present. This is in contrast to the previous solution where the client would be responsible for including a set of baseline scopes.

A bug has also been fixed in the handling of persistent scopes, which could break session refresh for some providers, such as GitHub.

BREAKING: User Info service

Limited-access user tokens (as used in cookies) no longer contain the ent ownership claim. This is notably used by TechDocs and the app-backend. If you use those services, you may want to log out and in again.

Background: As part of the previous auth improvements, we added the coreServices.userInfo service. This service can extract user details from incoming credentials - notably the so-called ent claim with its ownership information.

In this release, the auth backend part of this has been implemented, such that the information returned by your sign-in resolver gets persisted and can be acquired after the fact. With this in place, we could finally start slimming down on token sizes, starting with the cookie tokens. Unfortunately this has to be done in such a way that it’s breaking in the short term.

If any issues persist, try clearing your cookies, and then reach out to us on Discord or with an issue if necessary.

Contributed by @kuangp in #24729.

New Backend System API movement towards 1.0 release

As part of finalizing the New Backend System, we are restructuring the out-of-the-box functionality a bit. As part of this release, you will see a large amount of deprecations on the @backstage/backend-common package (which will be deleted in a future release), and also on the @backstage/backend-app-api package (which is just being slimmed down to its essentials). Instead, you will see that the @backstage/backend-defaults package has received new subpath exports that neatly arrange all of these factories and default implementations.

As an example, the rootLoggerServiceFactory export on @backstage/backend-app-api has been deprecated, and should now be imported from @backstage/backend-defaults/rootLogger. Most other deprecations follow the same pattern. Each deprecated symbol should have a deprecation message on it, which clearly states from where you should now be importing that particular functionality instead.

This rearrangement was one of the crucial final pieces for settling the API surfaces of this backend system! We hope you’ll find it neater and clearer to understand.

Please update deprecated imports in your own repo code as soon as convenient, to avoid the breaking changes in future releases when these symbols are finally removed.

You will also note that backend features (plugins and modules) no longer are returned as functions, which simplifies interacting with features! You may see this in your editor in the form of deprecations, whose message tells you to remove the trailing parentheses.

Your code may be changed in the following way as an example:

 await startTestBackend({
   features: [
     // service - stays unchanged
     eventsServiceFactory(),
     // module - remove parentheses
-    catalogModuleBitbucketCloudEntityProvider(),
+    catalogModuleBitbucketCloudEntityProvider,

In related news, we have unified some type names. The UrlReader types are now properly prefixed with the service name, so you’ll see that for example ReadTreeOptions is now UrlReaderServiceReadTreeOptions. Functions better follow the proper naming convention for their arguments, for example BackendPluginConfig now becoming CreateBackendPluginOptions.

Package Metadata - Important for Package Publishers!

All @backstage/* packages now include a new set of metadata in package.json that helps associate related plugin packages with each other. This metadata is also required for all packages published through the @backstage/cli to the Backstage ecosystem. For this purpose, a new --publish flag has been added to the repo fix command. You can read more about this requirement and how to generate the metadata in the documentation section on Metadata for Published Packages.

Other Auth Improvements

The OneLogin auth implementation now lives in its own module, @backstage/plugin-auth-backend-module-onelogin-provider.

In some special use cases such as when you have read-replica databases, you may desire to not use the builtin zero-config plugin-to-plugin auth system that stores keys in the database. For those cases, there is now a new static mode where you supply key pairs in config that are used for this purpose. The howto is in the docs.

There is also a new general jwks external access method for those of you who want to externally call Backstage plugins using already-established token flows! Check out the docs. Contributed by @ryan-hanchett in #24681.

Scaffolder ui:widget: password notice

Using ui:widget: password does not treat the input as a secret in the Scaffolder, and can lead to exposing some secrets in plaintext, this implementation has been overridden to provide warnings to users that mistakenly use this component and will now render a warning message along with rendering the input in plaintext for additional indication.

Please use the ui:field: Secret option instead, as is mentioned in the using secrets documentation.

New Scaffolder Permissions

The Scaffolder plugin has been upgraded to include additional permissions:

  • scaffolder.task.create
  • scaffolder.task.cancel
  • scaffolder.task.read

The new permissions allow you to control who should have read or write access to tasks.

Contributed by @Zaperex in #24518.

Rou...

Read more

v1.27.7

12 Jun 12:56
9b48dd5
Compare
Choose a tag to compare

This release fixes an issue where the scaffolder had sometimes lost the ability to redact secrets

v1.28.0-next.3

11 Jun 17:25
c70976b
Compare
Choose a tag to compare
v1.28.0-next.3 Pre-release
Pre-release

v1.28.0-next.2

04 Jun 16:43
c8c0bb9
Compare
Choose a tag to compare
v1.28.0-next.2 Pre-release
Pre-release