v2.20.6 Armory Release (OSS Spinnaker™ v1.20.8)
2020/09/17 Release Notes
Note: If you’re experiencing production issues after upgrading Spinnaker, rollback to a previous working version and please report issues to http://go.armory.io/support.
Required Halyard version
Armory 2.20.5 requires one of the following:
- Armory-extended Halyard 1.9.4 or later.
- Armory Operator 1.0.2 or later.
Breaking changes
Kubernetes deployment namespace
Upgrading to 2.20x or later introduces a breaking change in the Kubernetes provider for Spinnaker. Spinnaker now correctly interprets the namespace declared in your kubeconfig file and uses that namespace. Previously, Spinnaker deployed to the default namespace called default
because of an error in how Spinnaker interpreted the namespace in the Kubernetes context.
Solutions
Armory recommends using one of the following methods, which involve explicitly setting the namespace:
-
In your deployment manifests, declare the namespace you want to deploy to. Set to
default
if you want to maintain the previous behavior:apiVersion: batch/v1 kind: Job metadata: generateName: <someName> # Set namespace to default if you want to maintain the previous behavior. namespace: <targetNamespace>
-
In your kubeconfig, declare the namespace you want to deploy to. Set to
default
if you want to maintain the previous behavior:contexts: - context: cluster: <someCluster> # Set namespace to default if you want to maintain the previous behavior. namespace: <targetNamespace>
For more information, see the following links:
Introduced in: Armory 2.20
Spinnaker metrics
Metrics data, specifically the metric names, for Spinnaker changed. These changes are not backwards compatible and may result in broken third-party dashboards, such as Grafana dashboards.
Workarounds:
-
Observability Plugin: Armory is working on updates to the Observability Plugin to remedy this issue. The plugin currently supports New Relic & Prometheus. Note that this resolution requires you to make updates to use the new metric names.
For information about how to configure the Observability Plugin, see Monitoring Spinnaker with Prometheus.
For information about how to install a plugin, see Plugin Users Guide.
-
Update existing dashboards: Change your dashboards and alerts to use the new metric names.
Although both workarounds involve updating your dashboards to use the new metric names, Armory recommends switching to the Observability plugin. Due to changes the Spinnaker project is making, the Observability plugin provides a long-term solution.
Affected versions: Armory 2.20.x or later (OSS 1.20.x)
HTTP sessions for Gate
Armory 2.19.x and higher include an upgrade to the Spring Boot dependency. This requires you to flush all the Gate sessions for your Spinnaker deployment. For more information, see Flushing Gate Sessions.
Scheduled removal of Kubernetes V1 provider
The Kubernetes V1 provider will be removed in Spinnaker 1.21 (Armory 2.21). Please see the RFC for more details.
Breaking change: Kubernetes accounts with an unspecified providerVersion will now default to V2. Update your Halconfig to specify providerVersion: v1
for any Kubernetes accounts you are currently using with the V1 provider.
Known Issues
Spinnaker liveManifestCalls set to true
can cause major pipeline errors
Enabling liveManifestCalls: true
causes the environment to exhibit odd behaviors. Resources that have been deployed/changed in previous stages are not being taken in to consideration in current stages, leading to errors and issues in the pipeline deployment.
This can be especially detrimental to any pipelines that use a rollout strategy along with a strategy.spinnaker.io/max-version-history
annotation, which causes inconsistent deployment target state as well as pipeline failures.
Workaround
Consult the KB Article detailing solutions on this issue for how to work around this issue.
Impact
This issue has existed for a while, but has only been documented recently. A fix has been added to OSS 1.23 and will be available in Armory 2.23.x once it is released.
Armory Support recommends turning off lifeManifestCalls
by setting liveManifestCalls: false
if you have any dynamic lookups in your pipelines.
Introduced In: OSS 1.12
Dynamic Accounts for Kubernetes
Fixed in: 2.21
There is an issue with Dynamic Accounts for Kubernetes where the following issues occur:
- Agents get removed but still run on schedule.
- Force cache refresh times out.
- If you have the clean up agent setup, your data randomly disappears and reappears.
These issues do not occur immediately, and you may even see modified accounts appear.
Upgrading from 2.18.x with MySQL used for Front50 renames the plugin_artifacts table
As a part of the upgrade from 2.18.x to 2.19.x or later, the table plugin_artifacts gets renamed to plugin_info
. Downgrades from 2.19.x to 2.18.x do not revert the table name. The table remains named plugin_info
, preventing access to the table.
You will see errors similar to the following:
2020-06-22 21:52:27.001 INFO 1 --- [ main] .s.f.m.p.DefaultPluginArtifactRepository : Warming Cache
2020-06-22 21:52:27.723 ERROR 1 --- [ main] .s.f.m.p.DefaultPluginArtifactRepository : Unable to warm cache: {}
org.springframework.jdbc.BadSqlGrammarException: jOOQ; bad SQL grammar [select max(last_modified_at) as `last_modified_at` from plugin_artifacts]; nested exception is java.sql.SQLSyntaxErrorException: Table 'front50_kinnon.plugin_artifacts' doesn't exist
at org.jooq_3.12.3.MYSQL.debug(Unknown Source) ~[na:na]
at org.springframework.jdbc.support.SQLExceptionSubclassTranslator.doTranslate(SQLExceptionSubclassTranslator.java:93) ~[spring-jdbc-5.1.14.RELEASE.jar:5.1.14.RELEASE]
This issue only occurs if you upgrade to 2.19.x or later and then downgrade to a version earlier than 2.19.x.
Workaround
You can resolve this issue by rolling back changes to the MySQL database. For more information, see MySQL Table Name Change Error When Rolling Back Spinnaker (Undo Renamed Values).
Security update
We continue to make Spinnaker’s security a top priority. Although several CVEs are resolved, the following still exist:
Multiple services
CVE-2020-5410
was resolved in a previous version of Armory; however, this CVE introduced a regression for users of Spring Cloud and has been rolled back. Armory will continue to monitor releases for a fix.
Orca
- CVE-2020-13790
This is an embedded dependency in OpenJDK11. A version of OpenJDK11 that addresses
this CVE has only recently been released. The CVE will be fixed in an upcoming release. The risk to services users is low. The CVE deals with processing jpeg
images in the Java Runtime Environment, a task Spinnaker services do not perform.
The following CVEs have been recently identified and will be addressed in an upcoming release:
- CVE-2020-14155
Clouddriver
The following CVEs still exist in Clouddriver:
- CVE-2020-1747
- CVE-2017-18342
- CVE-2020-13757
- CVE-2016-10745
All of them are embedded dependencies in the Google Cloud SDK. A version of the Google Cloud SDK addressing these CVEs has not been released. The risk to Clouddriver users is low. All four CVEs deal with untrusted input, which Clouddriver does not provide to the Google Cloud SDK. Additionally, users deploying to other cloud providers are not at risk for this vulnerability.
The following CVE also exists for Clouddriver:
- CVE-2020-7014 deals with an Elasticsearch exploit related to token generation. Clouddriver only makes use of entity tags and does not allow for token generation or authentication.
Terraformer
Armory has identified and is triaging the following CVEs in Terraformer, the service for the Terraform integration:
- CVE-2020-14422
- CVE-2020-13757
Highlighted Updates
Armory
Summary of changes in the latest release.
Terraform Integration
Fixed an issue where an InvalidClientTokenId
error occurs when using Named Profiles for AWS credentials with assumeRole.
Spinnaker Community Contributions
<! – Copy/paste highlights from the corresponding OSS version. –>
There have also been numerous enhancements, fixes and features across all of Spinnaker’s other services. See their changes here:
Spinnaker v1.20.8
Detailed Updates
Bill of Materials
Here’s the bom for this version.
Expand
version: 2.20.6
timestamp: "2020-09-17 12:19:02"
services:
clouddriver:
commit: c8bde2ba
version: 2.20.11
deck:
commit: "29152797"
version: 2.20.7
dinghy:
commit: 0482189c
version: 2.20.6
echo:
commit: ae9df3d9
version: 2.20.12
fiat:
commit: 3b54af70
version: 2.20.6
front50:
commit: 23d3f79c
version: 2.20.8
gate:
commit: eb28cbf9
version: 2.20.7
igor:
commit: f9c155c0
version: 2.20.11
kayenta:
commit: 84b54034
version: 2.20.6
monitoring-daemon:
version: 2.20.0
monitoring-third-party:
version: 2.20.0
orca:
commit: 3703a361
version: 2.20.5
rosco:
commit: 052bd22d
version: 2.20.6
terraformer:
commit: e91b49ba
version: 2.20.10
dependencies:
redis:
version: 2:2.8.4-2
artifactSources:
dockerRegistry: docker.io/armory
Armory
Dinghy™ - 2.20.6…2.20.6
Armory Kayenta - 2.20.6…2.20.6
Armory Deck - 2.20.4…2.20.7
- chore(cve): fix CVE-2020-11984 (#640) (#642)
- feat(build): add details on how to build from a OSS forked release branch (#652) (#655)
- chore(build): push images to dockerhub (bp #631) (#660)
Armory Echo - 2.20.12…2.20.12
Armory Igor - 2.20.11…2.20.11
Armory Rosco - 2.20.6…2.20.6
Armory Orca - 2.20.5…2.20.5
Armory Clouddriver - 2.20.8…2.20.11
- fix(build): Add gcloud app-engine-go component (#156) (#174)
- fix(cve): Security fixes (#181)
- fix(dynamicAccounts): Server unable to start with vault (#188) (#190)
Armory Fiat - 2.20.6…2.20.6
Armory Front50 - 2.20.8…2.20.8
Armory Gate - 2.20.4…2.20.7
- fix(cve): CVE fixes (#155) (#157)
- fix(saml): Esapi dependency exact version (downgrade) (#160) (#162)
Terraformer™ - 2.20.8…2.20.10
- fix(profiles): add session token for AWS assume role (#251)
- chore(security): upgrade to alpine:3.12 (#253)
Feedback
Was this page helpful?
Thank you for letting us know!
Sorry to hear that. Please tell us how we can improve.
Last modified March 4, 2021: (d84aa0d)