From 48665de00d6b93f6fa9f07123ac4847044cf07ae Mon Sep 17 00:00:00 2001 From: Shubha Narayanan Date: Fri, 1 Dec 2023 14:57:33 +0530 Subject: [PATCH] Removed 1.10 references from 4.15 --- .../cert-manager-operator-release-notes.adoc | 68 +------------------ 1 file changed, 1 insertion(+), 67 deletions(-) diff --git a/security/cert_manager_operator/cert-manager-operator-release-notes.adoc b/security/cert_manager_operator/cert-manager-operator-release-notes.adoc index 6ea29c4307..045ffa6d49 100644 --- a/security/cert_manager_operator/cert-manager-operator-release-notes.adoc +++ b/security/cert_manager_operator/cert-manager-operator-release-notes.adoc @@ -161,70 +161,4 @@ This is the general availability (GA) release of the {cert-manager-operator}. * After installing the {cert-manager-operator}, if you navigate to *Operators → Installed Operators* and select *Operator details* in the {product-title} web console, you cannot see the cert-manager resources that are created across all namespaces. As a workaround, you can navigate to *Home -> API Explorer* to see the cert-manager resources. (link:https://issues.redhat.com/browse/OCPBUGS-11647[*OCPBUGS-11647*]) -* After uninstalling the {cert-manager-operator} by using the web console, the {cert-manager-operator} does not remove the cert-manager controller, CA injector, and Webhook pods automatically from the `cert-manager` namespace. As a workaround, you can manually delete the cert-manager controller, CA injector, and Webhook pod deployments present in the `cert-manager` namespace. (link:https://issues.redhat.com/browse/OCPBUGS-13679[*OCPBUGS-13679*]) - -[id="cert-manager-operator-release-notes-1.10.2"] -== Release notes for {cert-manager-operator} 1.10.2 - -Issued: 2023-03-23 - -The following advisory is available for the {cert-manager-operator} 1.10.2: - -* link:https://access.redhat.com/errata/RHEA-2023:1238[RHEA-2023:1238] - -Version `1.10.2` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.10.2`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.10/#v1102-changes-since-v1101[cert-manager project release notes for v1.10.2]. - -[IMPORTANT] -==== -If you used the Technology Preview version of the {cert-manager-operator}, you must uninstall it and remove all related resources for the Technology Preview version before installing this version of the {cert-manager-operator}. - -For more information, see xref:../../security/cert_manager_operator/cert-manager-operator-uninstall.adoc#cert-manager-operator-uninstall[Uninstalling the {cert-manager-operator}]. -==== - -[id="cert-manager-operator-1.10.2-new-features-and-enhancements"] -=== New features and enhancements - -This is the general availability (GA) release of the {cert-manager-operator}. - -* The following issuer types are supported: -** Automated Certificate Management Environment (ACME) -** Certificate authority (CA) -** Self-signed - -* The following ACME challenge types are supported: -** DNS-01 -** HTTP-01 - -* The following DNS-01 providers for ACME issuers are supported: -** Amazon Route 53 -** Azure DNS -** Google Cloud DNS - -* The {cert-manager-operator} now supports injecting custom CA certificates and propagating cluster-wide egress proxy environment variables. - -* You can customize the {cert-manager-operator} API fields by overriding environment variables and arguments. For more information, see xref:../../security/cert_manager_operator/cert-manager-customizing-api-fields.adoc#cert-manager-customizing-api-fields[Customizing cert-manager Operator API fields] - -* You can enable monitoring and metrics collection for the {cert-manager-operator} by using a service monitor to perform the custom metrics scraping. After you have enabled monitoring for the {cert-manager-operator}, you can query its metrics by using the {product-title} web console. For more information, see xref:../../security/cert_manager_operator/cert-manager-monitoring.adoc#cert-manager-monitoring[Enabling monitoring for the {cert-manager-operator}] - -[id="cert-manager-operator-1.10.2-bug-fixes"] -=== Bug fixes - -* Previously, the `unsupportedConfigOverrides` field replaced user-provided arguments instead of appending them. Now, the `unsupportedConfigOverrides` field properly appends user-provided arguments. (link:https://issues.redhat.com/browse/CM-23[*CM-23*]) -+ -[WARNING] -==== -Using the `unsupportedConfigOverrides` section to modify the configuration of an Operator is unsupported and might block cluster upgrades. -==== - -* Previously, the {cert-manager-operator} was installed as a cluster Operator. With this release, the {cert-manager-operator} is now properly installed as an OLM Operator. (link:https://issues.redhat.com/browse/CM-35[*CM-35*]) - -[id="cert-manager-operator-1.10.2-known-issues"] -=== Known issues - -* Using `Route` objects is not fully supported. Currently, to use {cert-manager-operator} with `Routes`, users must create `Ingress` objects, which are translated to `Route` objects by the Ingress-to-Route Controller. (link:https://issues.redhat.com/browse/CM-16[*CM-16*]) - -* The {cert-manager-operator} does not support using Azure Active Directory (Azure AD) pod identities to assign a managed identity to a pod. As a workaround, you can use a service principal to assign a managed identity. (link:https://issues.redhat.com/browse/OCPBUGS-8665[*OCPBUGS-8665*]) - -* The {cert-manager-operator} does not support using Google workload identity federation. (link:https://issues.redhat.com/browse/OCPBUGS-9998[*OCPBUGS-9998*]) - -* When uninstalling the {cert-manager-operator}, if you select the *Delete all operand instances for this operator* checkbox in the {product-title} web console, the Operator is not uninstalled properly. As a workaround, do not select this checkbox when uninstalling the {cert-manager-operator}. (link:https://issues.redhat.com/browse/OCPBUGS-9960[*OCPBUGS-9960*]) +* After uninstalling the {cert-manager-operator} by using the web console, the {cert-manager-operator} does not remove the cert-manager controller, CA injector, and Webhook pods automatically from the `cert-manager` namespace. As a workaround, you can manually delete the cert-manager controller, CA injector, and Webhook pod deployments present in the `cert-manager` namespace. (link:https://issues.redhat.com/browse/OCPBUGS-13679[*OCPBUGS-13679*]) \ No newline at end of file