Wave v1.19.6
Feature updates and improvements
- Bypass cache repo for custom build repos by @munishchouhan in #828
Full changelog: https://github.com/seqeralabs/wave/compare/v1.19.5...v1.19.6
Full changelog: https://github.com/seqeralabs/wave/compare/v1.19.5...v1.19.6
Full changelog: https://github.com/seqeralabs/wave/compare/v1.19.6...v1.19.7
parameter
keyword interpolation.array
type parameters in the Launch form.azure_entra
to the provider list of credentials in the OpenAPI spec.This release backports the default Azure image fix from v25.1.1 to v24.2.x:
Azure Batch support for Ubuntu 20.04 LTS ending
The default Azure Batch Ubuntu image has been updated with sku 22.04. This is to ensure there are no issues with the existing Azure Batch Ubuntu image (sku 20.04) which will be deprecated after April 23, 2025. See, https://github.com/Azure/Batch/issues/174 for more information about the deprecation.
Full changelog: https://github.com/seqeralabs/wave/compare/v1.19.4...v1.19.5
Seqera Platform Enterprise version 25.1 introduces Studios GA and a number of bug fixes and performance enhancements.
Studios is Seqera's in-platform tool for secure, on-demand, interactive data analysis using containers created from Seqera-managed container template images or your own organization-managed custom environments. You only pay for the compute your Studio sessions consume, and the compute is adjacent to your data, significantly reducing data transfer costs and wasted time copying data from storage to analysis. This significantly reduces infrastructure management requirements, removes data silos, adheres to strict in-platform role-based access control, and lowers your operational costs. Learn more about Studios.
recommended
or deprecated
) for a Seqera-managed Studio container template version. Users can migrate a Studio to a new base container template when Adding as new.icon
key:value pair defined in the manifest
object of the nextflow.config
file.totalProcesses
to workflow progress responses.lastUpdated
for existing duplicates. Preference is given to the last-updated credentials when there are multiple candidates. A check is also added to avoid duplicates when creating new credentials.ECS_CONTAINER_START_TIMEOUT
to 10 minutes in the ECS settings used by AWS Batch CEs, to prevent Task failed to start - DockerTimeoutError: Could not transition to started; timed out after waiting 3m0s
errors.mainScript
path.preferred_username
as fallback email field for OIDC login.mainScript
parameter in the pipeline-info
API response.javax.mail
transitive dependency.INVALID
status pipelines, fetch for all other statuses including DISABLED
.The auth-oidc-secrets
Micronaut environment has been replaced with oidc-token-import
. If you use this configuration, you must change the MICRONAUT_ENV
environment variable in the manifest during the migration process. If you activate the feature with the TOWER_OIDC_TOKEN_IMPORT
environment variable, no changes are needed.
Customers will no longer be able to pull Seqera Enterprise container images from the legacy Seqera AWS ECR repository after June 1, 2025. All Seqera Enterprise images must be retrieved via the cr.seqera.io
container registry after this cutoff date. The installation and configuration templates provided for both Docker Compose and Kubernetes installations already reference the cr.seqera.io
container image URLs. If you have not yet transitioned to this registry, contact Support to request credentials and for any further assistance.
See Legacy Seqera container image registries for more information on the AWS ECR and other deprecated Seqera container registries.
From Seqera Enterprise version 24.2:
From Seqera Enterprise version 24.2, redisson.*
configuration properties are deprecated. If you have set redisson.*
properties directly previously, do the following:
/redisson/*
references in AWS Parameter Store entries with TOWER_REDIS_*
.redisson.*
references in tower.yml
with TOWER_REDIS_*
.Set TOWER_REDIS_*
values directly in the tower.yml
or AWS Parameter Store entry (for example, TOWER_REDIS_URL: redis://...
).
MariaDB driver 3.x requires a special parameter in the connection URL to connect to a MySQL database:
jdbc:mysql://<domain>:<port>/tower?permitMysqlScheme=true
All deployments using a MySQL database (regardless of version: 5.6, 5.7, or 8) must be updated when upgrading to Seqera Enterprise version 24.1 or later.
The MariaDB driver has dropped support for the jdbcCompliantTruncation
parameter, which was true by default and set the STRICT_TRANS_TABLES
SQL mode. The STRICT_TRANS_TABLES
mode produces an error when the value of a VARCHAR column exceeds its limit, instead of truncating it to fit. Most common installations of MySQL 5.7 and 8 already include this mode at the server level, but the Docker container version of MySQL 5.6 does not.
The SQL mode must be set explicitly through the connection URL for deployments still using MySQL 5.6:
jdbc:mysql://<domain>:<port>/tower?permitMysqlScheme=true&sessionVariables=sql_mode='STRICT_TRANS_TABLES,NO_ENGINE_SUBSTITUTION'
The property that determines the expiration time of the JWT access token (used for authenticating web sessions and Nextflow-Platform interactions) has changed as of Seqera Enterprise version 24.1:
Previous | New |
---|---|
micronaut.security.token.jwt.generator.access-token.expiration | micronaut.security.token.generator.access-token.expiration |
Enterprise deployments that have customized this value previously will need to adopt the new format.
Upgrading to version 25.1 requires backend downtime in order for the database migration to complete successfully.
running
state as active run data may be lost.tower.env
, configmap.yml
, etc.):
JAVA_OPTS: -Xms1000M -Xmx2000M -XX:MaxDirectMemorySize=800m -Dio.netty.maxDirectMemory=0 -Djdk.nio.maxCachedBufferSize=262144
Docker Compose deployments require downtime while upgrading services. Restarting the application may take several minutes. See Docker compose deployment for more information.
For Kubernetes deployments, apply the 25.1 tower-cron.yml
to your cron pod and wait for the cron pod to be running before applying the tower-svc.yml
to your backend pod and restarting the service. If the cron pod update is interrupted, you may need to restore the instance from your DB backup and start again. See Kubernetes deployment for more information.
For custom deployments with third-party services such as ArgoCD, contact support for assistance during upgrade.
enable-native-access=ALL-UNNAMED
to launch options by @pditommaso in 4f0525dacontainerPlatform
to linux/adm64 by @pditommaso dcdb7cf4nf-jdk:corretto-24-al2023-jemalloc
by @pditommaso in bcb14150Full changelog: https://github.com/seqeralabs/wave/compare/v1.19.3...v1.19.4