- Security updates
- RollingUpdate and replicas increase are available now under a flag (turned off by default - 'low resources' config option in 'advanced settings')
Technical upgrade of Travis CI Enterprise software stack.
Removing unnecessary calls to Stripe in Travis CI Enterprise (cleanup of codebase shared with Travis CI).
Minor fix for crashing Travis Admin when Version Control System other than GitHub is used by the user account.
Minor bugfixes for integration with GitLab Enterprise/Community Edition (Beta feature) related to access rights scope requested by Travis CI Enterprise.
Now Travis CI Enterprise 3.x will not request docker registry access rights when signing up using GitLab.
New Git repository settings introduced: Security Settings. These allow to determine whether the repository will share encrypted environment variables and (in case of private repositories) Custom SSH Keys with the forks of a particular repository when a pull request in fork-to-base collaboration model would trigger build at Travis CI.
Repositories activated in Travis CI Enterprise before March 1st, 2022 will have the
Share encrypted environment variables with forks (PRs) setting set to OFF. Please verify your collaboration model if necessary (especially for public repositories). The
Share SSH keys with forks (PRs) will be set to ON in order to not break too many existing collaboration set ups.
Repository settings will be set by default to OFF for any repository activated in Travis CI Enterprise after March 1st, 2022. For repositories activated in Travis CI Enterprise after March 1st, 2022 you may want to consider changing the default settings depending on your collaboration model.