Skip to content

Commit

Permalink
Merge pull request #1484 from owncloud/1.1.0_release_notes
Browse files Browse the repository at this point in the history
[docs-only] 1.1.0 release notes
  • Loading branch information
kulmann authored Jan 26, 2021
2 parents c554427 + 6f5b346 commit e34cadf
Show file tree
Hide file tree
Showing 58 changed files with 1,510 additions and 497 deletions.
25 changes: 25 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,11 +11,13 @@ The following sections list the changes for unreleased.
* Change - Add "expose" information to docker images: [#1366](https://github.com/owncloud/ocis/pull/1366)
* Change - Generate cryptographically secure state token: [#1203](https://github.com/owncloud/ocis/pull/1203)
* Change - Move k6 to cdperf: [#1358](https://github.com/owncloud/ocis/pull/1358)
* Change - Move runtime code on refs/pman over to owncloud/ocis/ocis: [#1483](https://github.com/owncloud/ocis/pull/1483)
* Change - Update go version: [#1364](https://github.com/owncloud/ocis/pull/1364)
* Change - Update ownCloud Web to v1.0.1: [#1191](https://github.com/owncloud/ocis/pull/1191)
* Enhancement - Add OCIS_URL env var: [#1148](https://github.com/owncloud/ocis/pull/1148)
* Enhancement - Use sync.cache for roles cache: [#1367](https://github.com/owncloud/ocis/pull/1367)
* Enhancement - Add named locks and refactor cache: [#1212](https://github.com/owncloud/ocis/pull/1212)
* Enhancement - Update reva to v1.5.2-0.20210125114636-0c10b333ee69: [#1482](https://github.com/owncloud/ocis/pull/1482)
* Enhancement - Update reva to v1.5.1: [#1372](https://github.com/owncloud/ocis/pull/1372)
* Enhancement - Update reva to v1.4.1-0.20210111080247-f2b63bfd6825: [#1194](https://github.com/owncloud/ocis/pull/1194)

Expand Down Expand Up @@ -65,6 +67,16 @@ The following sections list the changes for unreleased.

https://github.com/owncloud/ocis/pull/1358

* Change - Move runtime code on refs/pman over to owncloud/ocis/ocis: [#1483](https://github.com/owncloud/ocis/pull/1483)

Tags: ocis, runtime

Currently, the runtime is under the private account of an oCIS developer. For future-proofing
we don't want oCIS mission critical components to depend on external repositories, so we're
including refs/pman module as an oCIS package instead.

https://github.com/owncloud/ocis/pull/1483

* Change - Update go version: [#1364](https://github.com/owncloud/ocis/pull/1364)

Tags: go
Expand Down Expand Up @@ -140,6 +152,19 @@ The following sections list the changes for unreleased.
https://github.com/owncloud/ocis/issues/966
https://github.com/owncloud/ocis/pull/1212

* Enhancement - Update reva to v1.5.2-0.20210125114636-0c10b333ee69: [#1482](https://github.com/owncloud/ocis/pull/1482)

* initial checksum support for ocis [cs3org/reva#1400](https://github.com/cs3org/reva/pull/1400)
* Use updated etag of home directory even if it is cached [cs3org/reva#1416](https://github.com/cs3org/reva/pull/#1416)
* Indicate in EOS containers that TUS is not supported [cs3org/reva#1415](https://github.com/cs3org/reva/pull/#1415)
* Get status code from recycle response [cs3org/reva#1408](https://github.com/cs3org/reva/pull/#1408)

https://github.com/owncloud/ocis/pull/1482
https://github.com/cs3org/reva/pull/1400
https://github.com/cs3org/reva/pull/1416
https://github.com/cs3org/reva/pull/1415
https://github.com/cs3org/reva/pull/1408

* Enhancement - Update reva to v1.5.1: [#1372](https://github.com/owncloud/ocis/pull/1372)

Summary -------
Expand Down
2 changes: 1 addition & 1 deletion accounts/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ require (
contrib.go.opencensus.io/exporter/ocagent v0.6.0
contrib.go.opencensus.io/exporter/zipkin v0.1.1
github.com/cs3org/go-cs3apis v0.0.0-20201118090759-87929f5bae21
github.com/cs3org/reva v1.5.1
github.com/cs3org/reva v1.5.2-0.20210125114636-0c10b333ee69
github.com/go-chi/chi v4.1.2+incompatible
github.com/go-chi/render v1.0.1
github.com/gofrs/uuid v3.3.0+incompatible
Expand Down
68 changes: 2 additions & 66 deletions accounts/go.sum

Large diffs are not rendered by default.

7 changes: 7 additions & 0 deletions changelog/unreleased/move-pman-to-ocis.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
Change: Move runtime code on refs/pman over to owncloud/ocis/ocis

Tags: ocis, runtime

Currently, the runtime is under the private account of an oCIS developer. For future-proofing we don't want oCIS mission critical components to depend on external repositories, so we're including refs/pman module as an oCIS package instead.

https://github.com/owncloud/ocis/pull/1483
12 changes: 12 additions & 0 deletions changelog/unreleased/update-reva-to-0c10b333.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
Enhancement: Update reva to v1.5.2-0.20210125114636-0c10b333ee69

* initial checksum support for ocis [cs3org/reva#1400](https://github.com/cs3org/reva/pull/1400)
* Use updated etag of home directory even if it is cached [cs3org/reva#1416](https://github.com/cs3org/reva/pull/#1416)
* Indicate in EOS containers that TUS is not supported [cs3org/reva#1415](https://github.com/cs3org/reva/pull/#1415)
* Get status code from recycle response [cs3org/reva#1408](https://github.com/cs3org/reva/pull/#1408)

https://github.com/owncloud/ocis/pull/1482
https://github.com/cs3org/reva/pull/1400
https://github.com/cs3org/reva/pull/1416
https://github.com/cs3org/reva/pull/1415
https://github.com/cs3org/reva/pull/1408
2 changes: 2 additions & 0 deletions deployments/examples/cs3_users_ocis/.env
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down
10 changes: 9 additions & 1 deletion deployments/examples/cs3_users_ocis/docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ services:
- "/var/run/docker.sock:/var/run/docker.sock:ro"
- "certs:/certs"
labels:
- "traefik.enable=true"
- "traefik.enable=${TRAEFIK_DASHBOARD:-false}"
- "traefik.http.routers.traefik.entrypoints=http"
- "traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)"
- "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_BASIC_AUTH_USERS:-admin:$apr1$4vqie50r$YQAmQdtmz5n9rEALhxJ4l.}" # defaults to admin:admin
Expand All @@ -38,6 +38,8 @@ services:
- "traefik.http.routers.traefik-secure.tls=true"
- "traefik.http.routers.traefik-secure.tls.certresolver=http"
- "traefik.http.routers.traefik-secure.service=api@internal"
logging:
driver: "local"
restart: always

ocis:
Expand Down Expand Up @@ -86,6 +88,8 @@ services:
- "traefik.http.routers.ocis-secure.service=ocis"
- "traefik.http.services.ocis.loadbalancer.server.port=9200"
- "traefik.http.services.ocis.loadbalancer.server.scheme=https"
logging:
driver: "local"
restart: always

ldap-server:
Expand All @@ -103,6 +107,8 @@ services:
- "127.0.0.1:636:636"
volumes:
- ./config/ldap/ldif:/container/service/slapd/assets/config/bootstrap/ldif/custom
logging:
driver: "local"
restart: always

ldap-manager:
Expand All @@ -122,6 +128,8 @@ services:
- "traefik.http.routers.ldap-manager-secure.tls.certresolver=http"
- "traefik.http.routers.ldap-manager-secure.service=ldap-manager"
- "traefik.http.services.ldap-manager.loadbalancer.server.port=80"
logging:
driver: "local"
restart: always

volumes:
Expand Down
2 changes: 2 additions & 0 deletions deployments/examples/ocis_keycloak/.env
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down
10 changes: 9 additions & 1 deletion deployments/examples/ocis_keycloak/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ services:
- "/var/run/docker.sock:/var/run/docker.sock:ro"
- "certs:/certs"
labels:
- "traefik.enable=true"
- "traefik.enable=${TRAEFIK_DASHBOARD:-false}"
- "traefik.http.routers.traefik.entrypoints=http"
- "traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)"
- "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_BASIC_AUTH_USERS:-admin:$apr1$4vqie50r$YQAmQdtmz5n9rEALhxJ4l.}" # defaults to admin:admin
Expand All @@ -39,6 +39,8 @@ services:
- "traefik.http.routers.traefik-secure.tls=true"
- "traefik.http.routers.traefik-secure.tls.certresolver=http"
- "traefik.http.routers.traefik-secure.service=api@internal"
logging:
driver: "local"
restart: always

ocis:
Expand Down Expand Up @@ -73,6 +75,8 @@ services:
- "traefik.http.routers.ocis-secure.service=ocis"
- "traefik.http.services.ocis.loadbalancer.server.port=9200"
- "traefik.http.services.ocis.loadbalancer.server.scheme=https"
logging:
driver: "local"
restart: always

postgres:
Expand All @@ -83,6 +87,8 @@ services:
POSTGRES_DB: keycloak
POSTGRES_USER: keycloak
POSTGRES_PASSWORD: keycloak
logging:
driver: "local"
restart: always

keycloak:
Expand Down Expand Up @@ -112,6 +118,8 @@ services:
- "traefik.http.services.keycloak.loadbalancer.server.scheme=http"
depends_on:
- postgres
logging:
driver: "local"
restart: always

volumes:
Expand Down
2 changes: 2 additions & 0 deletions deployments/examples/ocis_traefik/.env
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down
6 changes: 5 additions & 1 deletion deployments/examples/ocis_traefik/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ services:
- "/var/run/docker.sock:/var/run/docker.sock:ro"
- "certs:/certs"
labels:
- "traefik.enable=true"
- "traefik.enable=${TRAEFIK_DASHBOARD:-false}"
- "traefik.http.routers.traefik.entrypoints=http"
- "traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)"
- "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_BASIC_AUTH_USERS:-admin:$apr1$4vqie50r$YQAmQdtmz5n9rEALhxJ4l.}" # defaults to admin:admin
Expand All @@ -38,6 +38,8 @@ services:
- "traefik.http.routers.traefik-secure.tls=true"
- "traefik.http.routers.traefik-secure.tls.certresolver=http"
- "traefik.http.routers.traefik-secure.service=api@internal"
logging:
driver: "local"
restart: always

ocis:
Expand All @@ -63,6 +65,8 @@ services:
- "traefik.http.routers.ocis-secure.service=ocis"
- "traefik.http.services.ocis.loadbalancer.server.port=9200"
- "traefik.http.services.ocis.loadbalancer.server.scheme=https"
logging:
driver: "local"
restart: always

volumes:
Expand Down
2 changes: 2 additions & 0 deletions deployments/examples/owncloud10_with_oc_web/.env
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down
12 changes: 11 additions & 1 deletion deployments/examples/owncloud10_with_oc_web/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ services:
- "/var/run/docker.sock:/var/run/docker.sock:ro"
- "certs:/certs"
labels:
- "traefik.enable=true"
- "traefik.enable=${TRAEFIK_DASHBOARD:-false}"
- "traefik.http.routers.traefik.entrypoints=http"
- "traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)"
- "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_BASIC_AUTH_USERS:-admin:$apr1$4vqie50r$YQAmQdtmz5n9rEALhxJ4l.}" # defaults to admin:admin
Expand All @@ -38,6 +38,8 @@ services:
- "traefik.http.routers.traefik-secure.tls=true"
- "traefik.http.routers.traefik-secure.tls.certresolver=http"
- "traefik.http.routers.traefik-secure.service=api@internal"
logging:
driver: "local"
restart: always

ocis:
Expand Down Expand Up @@ -114,6 +116,8 @@ services:
- "traefik.http.routers.ocis-secure.tls.certresolver=http"
- "traefik.http.routers.ocis-secure.service=ocis"
- "traefik.http.services.ocis.loadbalancer.server.port=9200"
logging:
driver: "local"
restart: always

oc10:
Expand Down Expand Up @@ -156,6 +160,8 @@ services:
- "traefik.http.routers.oc10-secure.tls.certresolver=http"
- "traefik.http.routers.oc10-secure.service=oc10"
- "traefik.http.services.oc10.loadbalancer.server.port=8080"
logging:
driver: "local"
restart: always

db:
Expand All @@ -175,6 +181,8 @@ services:
volumes:
- mysql:/var/lib/mysql
- backup:/var/lib/backup
logging:
driver: "local"
restart: always

redis:
Expand All @@ -183,6 +191,8 @@ services:
- REDIS_DATABASES=1
volumes:
- redis:/var/lib/redis
logging:
driver: "local"
restart: always


Expand Down
10 changes: 7 additions & 3 deletions docs/ocis/deployment/basic-remote-setup.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,11 +56,11 @@ In this example we do not change the default port (`9200`). But this could be ch

You need to configure `your-host` in some services to provide the needed public resources.

This snippet will start the ocis server with auto generated self signed certificates:

```bash
PROXY_HTTP_ADDR=0.0.0.0:9200 \
OCIS_URL=https://your-server:9200 \
PROXY_TRANSPORT_TLS_KEY=./certs/your-host.key \
PROXY_TRANSPORT_TLS_CERT=./certs/your-host.crt \
KONNECTD_TLS=0 \
./bin/ocis server
```
Expand All @@ -69,7 +69,11 @@ For more configuration options check the configuration section in [ocis](https:/

{{< hint info >}}
**TLS Certificate**\
In this example, we are replacing the default self-signed cert with a CA signed one to avoid the certificate warning when accessing the login page.
If you have a CA signed certificate for your domain, add the following configurations:
```
PROXY_TRANSPORT_TLS_KEY=./certs/your-host.key \
PROXY_TRANSPORT_TLS_CERT=./certs/your-host.crt \
```
{{< /hint >}}

## Use Docker Compose
Expand Down
4 changes: 3 additions & 1 deletion docs/ocis/deployment/ocis_keycloak.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,8 @@ See also [example server setup]({{< ref "preparing_server.md" >}})
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down Expand Up @@ -83,7 +85,7 @@ See also [example server setup]({{< ref "preparing_server.md" >}})

You are installing oCIS on a server and Traefik will obtain valid certificates for you so please remove `INSECURE=true` or set it to `false`.

Set your domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.
If you want to use the Traefik dashboard, set TRAEFIK_DASHBOARD to `true` (default is `false` and therefore not active). If you activate it, you must set a domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.

The Traefik dashboard is secured by basic auth. Default credentials are the user `admin` with the password `admin`. To set your own credentials, generate a htpasswd (eg. by using [an online tool](https://htpasswdgenerator.de/) or a cli tool).

Expand Down
4 changes: 3 additions & 1 deletion docs/ocis/deployment/ocis_traefik.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,8 @@ See also [example server setup]({{< ref "preparing_server.md" >}})
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand All @@ -66,7 +68,7 @@ See also [example server setup]({{< ref "preparing_server.md" >}})

You are installing oCIS on a server and Traefik will obtain valid certificates for you so please remove `INSECURE=true` or set it to `false`.

Set your domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.
If you want to use the Traefik dashboard, set TRAEFIK_DASHBOARD to `true` (default is `false` and therefore not active). If you activate it, you must set a domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.

The Traefik dashboard is secured by basic auth. Default credentials are the user `admin` with the password `admin`. To set your own credentials, generate a htpasswd (eg. by using [an online tool](https://htpasswdgenerator.de/) or a cli tool).

Expand Down
4 changes: 3 additions & 1 deletion docs/ocis/deployment/owncloud10_with_oc_web.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,8 @@ See also [example server setup]({{< ref "preparing_server.md" >}})
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand All @@ -79,7 +81,7 @@ See also [example server setup]({{< ref "preparing_server.md" >}})

You are installing oCIS on a server and Traefik will obtain valid certificates for you so please remove `INSECURE=true` or set it to `false`.

Set your domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.
If you want to use the Traefik dashboard, set TRAEFIK_DASHBOARD to `true` (default is `false` and therefore not active). If you activate it, you must set a domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.

The Traefik dashboard is secured by basic auth. Default credentials are the user `admin` with the password `admin`. To set your own credentials, generate a htpasswd (eg. by using [an online tool](https://htpasswdgenerator.de/) or a cli tool).

Expand Down
13 changes: 13 additions & 0 deletions docs/ocis/release_notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,19 @@ geekdocEditPath: edit/master/docs/ocis
geekdocFilePath: release_notes.md
---

## ownCloud Infinite Scale 1.1.0 Technology Preview

Version 1.1.0 is a hardening and patch release. It ships with the latest version of ownCloud Web and brings a couple of minor improvements. The minor version increase is needed due to non-backwards compatible changes in configuration. The documentation has been updated to reflect the changes. Please note that this version is still a Technology Preview and not suited for production use.

The most prominent changes in version 1.1.0 comprise
- Performance and stability improvements for installations with multiple concurrent users
- Simplified configuration by introducing the new environment variable OCIS_URL
- Beta release of [ownCloud performance scripts](https://github.com/owncloud/cdperf)
- Update ownCloud web to [v1.0.1](https://github.com/owncloud/web/releases/tag/v1.0.1)
- Update reva to [v1.5.1](https://github.com/cs3org/reva/releases/tag/v1.5.1)

You can also read the full [ownCloud Infinite Scale changelog](https://github.com/owncloud/ocis/blob/master/CHANGELOG.md) for further details on what has changed.

## ownCloud Infinite Scale 1.0.0 Technology Preview

We are pleased to announce the availability of ownCloud Infinite Scale 1.0.0 Technology Preview which is released as the first public version of the new Infinite Scale platform.
Expand Down
2 changes: 1 addition & 1 deletion ocis-pkg/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ require (
github.com/ascarter/requestid v0.0.0-20170313220838-5b76ab3d4aee
github.com/coreos/go-oidc v2.2.1+incompatible
github.com/cs3org/go-cs3apis v0.0.0-20201118090759-87929f5bae21
github.com/cs3org/reva v1.4.1-0.20210111080247-f2b63bfd6825
github.com/cs3org/reva v1.5.2-0.20210125114636-0c10b333ee69
github.com/go-chi/chi v4.1.2+incompatible
github.com/haya14busa/goverage v0.0.0-20180129164344-eec3514a20b5
github.com/iancoleman/strcase v0.1.2
Expand Down
Loading

0 comments on commit e34cadf

Please sign in to comment.