1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

Merge pull request #68707 from snarayan-redhat/OSDOCS-8813_remove110_4_15

[enterprise-4.15]OSDOCS#8813: Removed 1.10 references from 4.15
This commit is contained in:
Shubha Narayanan
2023-12-04 12:32:37 +05:30
committed by GitHub

View File

@@ -161,70 +161,4 @@ This is the general availability (GA) release of the {cert-manager-operator}.
* After installing the {cert-manager-operator}, if you navigate to *Operators → Installed Operators* and select *Operator details* in the {product-title} web console, you cannot see the cert-manager resources that are created across all namespaces. As a workaround, you can navigate to *Home -> API Explorer* to see the cert-manager resources. (link:https://issues.redhat.com/browse/OCPBUGS-11647[*OCPBUGS-11647*])
* After uninstalling the {cert-manager-operator} by using the web console, the {cert-manager-operator} does not remove the cert-manager controller, CA injector, and Webhook pods automatically from the `cert-manager` namespace. As a workaround, you can manually delete the cert-manager controller, CA injector, and Webhook pod deployments present in the `cert-manager` namespace. (link:https://issues.redhat.com/browse/OCPBUGS-13679[*OCPBUGS-13679*])
[id="cert-manager-operator-release-notes-1.10.2"]
== Release notes for {cert-manager-operator} 1.10.2
Issued: 2023-03-23
The following advisory is available for the {cert-manager-operator} 1.10.2:
* link:https://access.redhat.com/errata/RHEA-2023:1238[RHEA-2023:1238]
Version `1.10.2` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.10.2`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.10/#v1102-changes-since-v1101[cert-manager project release notes for v1.10.2].
[IMPORTANT]
====
If you used the Technology Preview version of the {cert-manager-operator}, you must uninstall it and remove all related resources for the Technology Preview version before installing this version of the {cert-manager-operator}.
For more information, see xref:../../security/cert_manager_operator/cert-manager-operator-uninstall.adoc#cert-manager-operator-uninstall[Uninstalling the {cert-manager-operator}].
====
[id="cert-manager-operator-1.10.2-new-features-and-enhancements"]
=== New features and enhancements
This is the general availability (GA) release of the {cert-manager-operator}.
* The following issuer types are supported:
** Automated Certificate Management Environment (ACME)
** Certificate authority (CA)
** Self-signed
* The following ACME challenge types are supported:
** DNS-01
** HTTP-01
* The following DNS-01 providers for ACME issuers are supported:
** Amazon Route 53
** Azure DNS
** Google Cloud DNS
* The {cert-manager-operator} now supports injecting custom CA certificates and propagating cluster-wide egress proxy environment variables.
* You can customize the {cert-manager-operator} API fields by overriding environment variables and arguments. For more information, see xref:../../security/cert_manager_operator/cert-manager-customizing-api-fields.adoc#cert-manager-customizing-api-fields[Customizing cert-manager Operator API fields]
* You can enable monitoring and metrics collection for the {cert-manager-operator} by using a service monitor to perform the custom metrics scraping. After you have enabled monitoring for the {cert-manager-operator}, you can query its metrics by using the {product-title} web console. For more information, see xref:../../security/cert_manager_operator/cert-manager-monitoring.adoc#cert-manager-monitoring[Enabling monitoring for the {cert-manager-operator}]
[id="cert-manager-operator-1.10.2-bug-fixes"]
=== Bug fixes
* Previously, the `unsupportedConfigOverrides` field replaced user-provided arguments instead of appending them. Now, the `unsupportedConfigOverrides` field properly appends user-provided arguments. (link:https://issues.redhat.com/browse/CM-23[*CM-23*])
+
[WARNING]
====
Using the `unsupportedConfigOverrides` section to modify the configuration of an Operator is unsupported and might block cluster upgrades.
====
* Previously, the {cert-manager-operator} was installed as a cluster Operator. With this release, the {cert-manager-operator} is now properly installed as an OLM Operator. (link:https://issues.redhat.com/browse/CM-35[*CM-35*])
[id="cert-manager-operator-1.10.2-known-issues"]
=== Known issues
* Using `Route` objects is not fully supported. Currently, to use {cert-manager-operator} with `Routes`, users must create `Ingress` objects, which are translated to `Route` objects by the Ingress-to-Route Controller. (link:https://issues.redhat.com/browse/CM-16[*CM-16*])
* The {cert-manager-operator} does not support using Azure Active Directory (Azure AD) pod identities to assign a managed identity to a pod. As a workaround, you can use a service principal to assign a managed identity. (link:https://issues.redhat.com/browse/OCPBUGS-8665[*OCPBUGS-8665*])
* The {cert-manager-operator} does not support using Google workload identity federation. (link:https://issues.redhat.com/browse/OCPBUGS-9998[*OCPBUGS-9998*])
* When uninstalling the {cert-manager-operator}, if you select the *Delete all operand instances for this operator* checkbox in the {product-title} web console, the Operator is not uninstalled properly. As a workaround, do not select this checkbox when uninstalling the {cert-manager-operator}. (link:https://issues.redhat.com/browse/OCPBUGS-9960[*OCPBUGS-9960*])
* After uninstalling the {cert-manager-operator} by using the web console, the {cert-manager-operator} does not remove the cert-manager controller, CA injector, and Webhook pods automatically from the `cert-manager` namespace. As a workaround, you can manually delete the cert-manager controller, CA injector, and Webhook pod deployments present in the `cert-manager` namespace. (link:https://issues.redhat.com/browse/OCPBUGS-13679[*OCPBUGS-13679*])