2022.1.39 Maintenance Release

Prev Next

Release Notes

Bug Fixes

This maintenance release of Itential Platform includes fixes for bugs that were reported to Itential Product Support.

Key ID Release Note
ENG-10352 A series of fixes have been implemented to address multiple issues that occurred when utilizing an incoming or outgoing JST schema. These issues have been resolved to ensure proper functionality at runtime.
ENG-10751 Resolved a JST bug that allowed references to deleted steps to persist within the context of other steps, ensuring that the integrity of the workflow remains intact and that users are not misled by outdated references.
ENG-12445 When importing a pre-built automation with GBAC assigned, the imported automation does not appear in the Operations Manager side navigation bar. Fixed pre-built automation import to ensure all GBAC id are strings and the automation is displayed in the side navigation bar.
ENG-12646 When Itential Platform fails to connect to RabbitMQ, the RabbitMQ credentials are exposed in the error logs. To resolve this issue, redacted the RabbitMQ error message for eventDeduplication that contained credentials.

Improvements

This section highlights quality improvements to Itential Platform's functionality in this maintenance release.

Key ID Release Note
ENG-12523 The NSO adapter has been updated to incorporate a global-timeout setting, which acts as a boolean flag. When set to 'true', this global-timeout setting allows services to bypass local timeout values and instead adhere to the global timeout configuration. If the global-timeout is not activated or is set to 'false', the system will revert to either a custom value or the default timeout of 60 seconds, as specified by the user.

Security Changes

This section highlights fixes and measures to prevent and minimize security risks and vulnerabilities.

Key ID Release Note
ENG-12785 When running security scans, it showed affected versions of the tar-fs and undici packages in Admin Essentials were vulnerable to security risks. Upgraded the tar-fs package dependency to 2.1.3 and the undici package to 5.29.0 to resolve this vulnerability.

Automation Platform Versions

component version
itential/adapter-automation_gateway 4.26.1-2022.1.22
itential/adapter-azure_aaa 1.4.2-2022.1.11
itential/adapter-email 4.2.8-2022.1.7
itential/adapter-ldap 2.13.8-2022.1.6
itential/adapter-local_aaa 4.3.6-2022.1.3
itential/adapter-nso 7.8.20-2022.1.52
itential/adapter-radius 2.1.7-2022.1.3
itential/app-admin_essentials 3.13.12-2022.1.74
itential/app-ag_manager 1.18.3-2022.1.13
itential/app-automation_catalog 2.12.11-2022.1.10
itential/app-automation_studio 4.1.2-2022.1.179
itential/app-configuration_manager 3.97.6-2022.1.65
itential/app-form_builder 4.11.26-2022.1.5
itential/app-json_forms 1.34.12-2022.1.47
itential/app-jst 1.8.5-2022.1.52
itential/app-mop 6.11.25-2022.1.23
itential/app-nso_manager 2.23.3-2022.1.4
itential/app-operations_manager 1.171.4-2022.1.213
itential/app-service_catalog 3.12.0-2022.1.3
itential/app-service_management 2.24.9-2022.1.10
itential/app-template_builder 2.6.7-2022.1.11
itential/app-workflow_builder 5.44.64-2022.1.85
itential/app-workflow_engine 9.13.31-2022.1.144
itential/audit-trail 1.5.3
itential/database 1.11.11
itential/event-system 1.1.31
itential/itential-utils 2.10.1
itential/logger 2.1.17
itential/network 3.4.8
itential/pronghorn-core 13.28.27-2022.1.163
itential/search 1.1.25-2022.1.2
itential/service 2.11.10
itential/tags 3.1.12-2022.1.4