Skip to content

Commit

Permalink
retiring travis
Browse files Browse the repository at this point in the history
RHDEVDOCS-5999: Removal of Fixed Issues and JIRA links from GitOps 1.9.4, 1.10.2, 1.11.1 releases
  • Loading branch information
aireilly authored and Dhruv-Soni11 committed Apr 5, 2024
1 parent e311eb7 commit dc2bed2
Show file tree
Hide file tree
Showing 4 changed files with 0 additions and 36 deletions.
File renamed without changes.
12 changes: 0 additions & 12 deletions modules/gitops-release-notes-1-10-2.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -26,15 +26,3 @@ If you have installed the {gitops-title} Operator, view the container images in
----
$ oc describe deployment gitops-operator-controller-manager -n openshift-operators
----

[id="fixed-issues-1-10-2_{context}"]
== Fixed issues

The following issue has been resolved in the current release:

* Before this update, all versions of Argo CD `v2.8.3` and later were vulnerable to cross-server request forgery (CSRF) attacks. As a result, Argo CD accepted non-GET requests even if they did not specify a content type. This update fixes the issue by upgrading the Argo CD version to `v.2.8.9` and patches this vulnerability in the Argo CD API. link:https://issues.redhat.com/browse/GITOPS-3922[GITOPS-3922]
+
[IMPORTANT]
====
Breaking change: The Argo CD API will no longer accept non-GET requests that do not specify application or JSON as their content type. Although the accepted content types list is configurable, do not disable the content type check completely.
====
12 changes: 0 additions & 12 deletions modules/gitops-release-notes-1-11-1.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -26,15 +26,3 @@ If you have installed the {gitops-title} Operator, view the container images in
----
$ oc describe deployment gitops-operator-controller-manager -n openshift-operators
----

[id="fixed-issues-1-11-1_{context}"]
== Fixed issues

The following issue has been resolved in the current release:

* Before this update, all versions of Argo CD `v2.9.2` and later were vulnerable to cross-server request forgery (CSRF) attacks. As a result, Argo CD accepted non-GET requests even if they did not specify a content type. This update fixes the issue by upgrading the Argo CD version to `v.2.9.5` and patches this vulnerability in the Argo CD API. link:https://issues.redhat.com/browse/GITOPS-3923[GITOPS-3923]
+
[IMPORTANT]
====
Breaking change: The Argo CD API will no longer accept non-GET requests that do not specify application or JSON as their content type. Although the accepted content types list is configurable, do not disable the content type check completely.
====
12 changes: 0 additions & 12 deletions modules/gitops-release-notes-1-9-4.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -26,15 +26,3 @@ If you have installed the {gitops-title} Operator, view the container images in
----
$ oc describe deployment gitops-operator-controller-manager -n openshift-operators
----

[id="fixed-issues-1-9-4_{context}"]
== Fixed issues

The following issue has been resolved in the current release:

* Before this update, all versions of Argo CD `v2.7.2` and later were vulnerable to cross-server request forgery (CSRF) attacks. As a result, Argo CD accepted non-GET requests even if they did not specify a content type. This update fixes the issue by upgrading the Argo CD version to `v.2.7.16` and patches this vulnerability in the Argo CD API. link:https://issues.redhat.com/browse/GITOPS-3921[GITOPS-3921]
+
[IMPORTANT]
====
Breaking change: The Argo CD API will no longer accept non-GET requests that do not specify application or JSON as their content type. Although the accepted content types list is configurable, do not disable the content type check completely.
====

0 comments on commit dc2bed2

Please sign in to comment.