Catalyst Canton - Version 1.8 Release notes

What’s new

  • Extended Identity Provider Integration - Catalyst now supports integration with additional identity providers beyond Keycloak, enabling broader compatibility with enterprise authentication systems such as Auth0 and Okta.

  • Custom Authorization Controls - Introduced a configurable authorization mechanism that allows manual definition of clients and users to enhance flexibility for custom access control and tighter security policies.

Improvements

  • Validator Provisioning Flow Enhancements - Streamlined the creation and configuration process for validators with improved component orchestration and resource management, reducing setup time and potential misconfigurations.

  • Bug Fixes. - Includes various UI and backend corrections to improve stability and consistency.

Patches

  • v1.8.1 - Fixed application creation issue with custom Identity Providers.

  • v1.8.2 - Resolved volume sizing bug affecting Operator stability.

  • v1.8.3 - Updated Helm charts and removed deprecated replicated labels; internal CI/CD improvements.

  • v1.8.4 - Enabled license key injection via Kubernetes secrets.

  • v1.8.5 - Fixed port conflict in validator UI Docker images for versions >0.3.15.

  • v1.8.6 - Corrected Canton Name Server image reference from cns-web-ui to ans-web-ui for version 0.3.17.

  • v1.8.7 - Added option to disable Role-Based Access Control and use a single Admin role.

  • …​

  • v1.8.10 - Resolved a regression introduced in build v1.8.7.

  • v1.8.11 - Introduced ability to define default images (e.g., Postgres, NGINX).

  • v1.8.12 - Added configuration option to disable typ header verification.

  • v1.8.13 - Enabled Postgres deployment customization via the Validator CRD.

  • v1.8.14 - Updated Postgres deployment strategy to support rolling updates.

Since v1.8.4 the license key can be passed as a secret, please update your values.yaml with the respective values.

 licenseKey:
    key: ""  # Set licenseKey if NOT using a Kubernetes secret
    secret:
      enabled: false  # Set to 'true' to use a Kubernetes Secret
      name: ""        # Name of the Kubernetes secret
      key: ""         # Key inside the secret that contains licenseKey