mirror of https://github.com/docker/docs.git
Release UCP 2.2.5, 2.1.6
This commit is contained in:
parent
a83592ddaf
commit
07f34e677d
|
@ -184,13 +184,13 @@ defaults:
|
|||
values:
|
||||
ucp_org: "docker"
|
||||
ucp_repo: "ucp"
|
||||
ucp_version: "2.2.4"
|
||||
ucp_version: "2.2.5"
|
||||
- scope:
|
||||
path: "datacenter/ucp/2.1"
|
||||
values:
|
||||
ucp_version: "2.1"
|
||||
dtr_version: "2.2"
|
||||
docker_image: "docker/ucp:2.1.5"
|
||||
docker_image: "docker/ucp:2.1.6"
|
||||
- scope:
|
||||
path: "datacenter/ucp/2.0"
|
||||
values:
|
||||
|
|
|
@ -6,6 +6,8 @@
|
|||
|
||||
- ucp-version: "2.1"
|
||||
tar-files:
|
||||
- description: "UCP 2.1.6"
|
||||
url: https://packages.docker.com/caas/ucp_images_2.1.6.tar.gz
|
||||
- description: "UCP 2.1.5"
|
||||
url: https://packages.docker.com/caas/ucp_images_2.1.5.tar.gz
|
||||
- description: "UCP 2.1.4"
|
||||
|
|
|
@ -6,6 +6,12 @@
|
|||
- product: "ucp"
|
||||
version: "2.2"
|
||||
tar-files:
|
||||
- description: "2.2.5 Linux"
|
||||
url: https://packages.docker.com/caas/ucp_images_2.2.5.tar.gz
|
||||
- description: "2.2.5 IBM Z"
|
||||
url: https://packages.docker.com/caas/ucp_images_s390x_2.2.5.tar.gz
|
||||
- description: "2.2.5 Windows"
|
||||
url: https://packages.docker.com/caas/ucp_images_win_2.2.5.tar.gz
|
||||
- description: "2.2.4 Linux"
|
||||
url: https://packages.docker.com/caas/ucp_images_2.2.4.tar.gz
|
||||
- description: "2.2.4 IBM Z"
|
||||
|
|
|
@ -12,6 +12,21 @@ known issues for the latest UCP version.
|
|||
You can then use [the upgrade instructions](../admin/upgrade.md), to
|
||||
upgrade your installation to the latest release.
|
||||
|
||||
## Version 2.1.6
|
||||
|
||||
(16 January 2018)
|
||||
|
||||
**Bug fixes**
|
||||
|
||||
* Security
|
||||
* Role-based access control is now enforced for volumes managed by 3rd party
|
||||
volume plugins (for example using the NetApp or other volume plugins). This is a
|
||||
critical security fix for customers that use 3rd party volume drivers and rely
|
||||
on Docker Universal Control Plane for tenant isolation of workloads and data.
|
||||
**Caution** is advised when applying this update because users or automated
|
||||
workflows may have come to rely on lack of access control enforcement when
|
||||
manipulating volumes created with 3rd party volume plugins.
|
||||
|
||||
## Version 2.1.5
|
||||
|
||||
(20 July 2017)
|
||||
|
@ -62,7 +77,7 @@ by our development team during internal testing
|
|||
* Fixed an issue where a UCP manager might get stuck in a restart loop due to
|
||||
being unable to correctly access the root CA
|
||||
* Fixed an issue where users with view-only permissions received an access denied
|
||||
error when attempting to deploy stacks via the Compose UI, despite having been granted
|
||||
error when attempting to deploy stacks via the Compose UI, despite having been granted
|
||||
label access to do so
|
||||
|
||||
|
||||
|
|
|
@ -10,6 +10,21 @@ known issues for the latest UCP version.
|
|||
You can then use [the upgrade instructions](admin/install/upgrade.md), to
|
||||
upgrade your installation to the latest release.
|
||||
|
||||
## Version 2.2.5
|
||||
|
||||
(16 January 2018)
|
||||
|
||||
**Bug fixes**
|
||||
|
||||
* Security
|
||||
* Role-based access control is now enforced for volumes managed by 3rd party
|
||||
volume plugins (for example using the NetApp or other volume plugins). This is a
|
||||
critical security fix for customers that use 3rd party volume drivers and rely
|
||||
on Docker Universal Control Plane for tenant isolation of workloads and data.
|
||||
**Caution** is advised when applying this update because users or automated
|
||||
workflows may have come to rely on lack of access control enforcement when
|
||||
manipulating volumes created with 3rd party volume plugins.
|
||||
|
||||
## Version 2.2.4
|
||||
|
||||
(2 November 2017)
|
||||
|
|
Loading…
Reference in New Issue