Skip to content

Commit 770fc8f

Browse files
authored
Merge pull request #100751 from wgabor0427/wgabor-os-api-server
OSDOCAS-15028 added Openshift API server RNs
2 parents 8db5c85 + e2f1129 commit 770fc8f

File tree

1 file changed

+15
-8
lines changed

1 file changed

+15
-8
lines changed

release_notes/ocp-4-20-release-notes.adoc

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1022,9 +1022,9 @@ The {secrets-store-operator} version 4.20 is now based on the upstream v1.5.2 re
10221022
[id="ocp-release-notes-storage-vol-populators_{context}"]
10231023
==== Volume populators are generally available
10241024

1025-
The volume populators feature allows you to create pre-populated volumes.
1025+
The volume populators feature allows you to create pre-populated volumes.
10261026

1027-
{product-title} 4.20 introduces a new field `dataSourceRef` for volume populator functionality that expands the objects that can be used as a data source for pre-population of volumes, from only persistent volume claims (PVC) and snapshots, to any appropriate custom resource (CR).
1027+
{product-title} 4.20 introduces a new field `dataSourceRef` for volume populator functionality that expands the objects that can be used as a data source for pre-population of volumes, from only persistent volume claims (PVC) and snapshots, to any appropriate custom resource (CR).
10281028

10291029
{product-title} now ships `volume-data-source-validator`, which reports events on PVCs that use a volume populator without a corresponding `VolumePopulator` instance. Previous {product-title} versions did not require `VolumePopulator` instances, so if you are upgrading from 4.12, or later, you might receive events about unregistered populators. If you installed `volume-data-source-validator` yourself previously, you can remove your version.
10301030

@@ -1074,7 +1074,7 @@ For more information about One Zone, see xref:../storage/container_storage_inter
10741074
Certain operations of a volume can cause pod startup delays, which might cause pod timeouts.
10751075

10761076
*fsGroup:*
1077-
For volumes with many files, pod startup timeouts can occur because, by default, {product-title} recursively changes ownership and permissions for the contents of each volume to match the `fsGroup` specified in a pod’s `securityContext` when that volume is mounted. This can be time consuming, slowing pod startup. You can use the `fsGroupChangePolicy` parameter inside a `securityContext` to control the way that {product-title} checks and manages ownership and permissions for a volume.
1077+
For volumes with many files, pod startup timeouts can occur because, by default, {product-title} recursively changes ownership and permissions for the contents of each volume to match the `fsGroup` specified in a pod’s `securityContext` when that volume is mounted. This can be time consuming, slowing pod startup. You can use the `fsGroupChangePolicy` parameter inside a `securityContext` to control the way that {product-title} checks and manages ownership and permissions for a volume.
10781078

10791079
Changing this parameter at the pod level was introduced in {product-title} 4.10. In 4.20, you can set this parameter at the namespace level, in addition to the pod level, as a generally available feature.
10801080

@@ -1088,7 +1088,7 @@ ReadWriteOncePod (RWOP) persistent volumes use the SELinux mount feature by defa
10881088
ReadWriteOnce (RWO) and ReadWriteMany (RWX) volumes use recursive relabeling by default. Mount option for RWO/RWX was introduced in {product-title} 4.17 as a Developer Preview feature, but is now supported in 4.20 as a Technology Preview feature.
10891089

10901090
[IMPORTANT]
1091-
====
1091+
====
10921092
In a future {product-title} version, RWO and RWX volumes will use mount option by default.
10931093
====
10941094

@@ -1138,11 +1138,11 @@ To view the revised procedure, see xref:../storage/container_storage_interface/p
11381138

11391139
==== Support for custom application icons in the Import flow
11401140

1141-
Before this update, the *Container image* form flow provided only a limited set of predefined icons for applications.
1141+
Before this update, the *Container image* form flow provided only a limited set of predefined icons for applications.
11421142

1143-
With this update, you can add custom icons when you import applications through the *Container image* form. For existing applications, apply the `app.openshift.io/custom-icon` annotation to add a custom icon to the corresponding *Topology* node.
1143+
With this update, you can add custom icons when you import applications through the *Container image* form. For existing applications, apply the `app.openshift.io/custom-icon` annotation to add a custom icon to the corresponding *Topology* node.
11441144

1145-
As a result, you can better identify applications in the *Topology* view and organize your projects more clearly.
1145+
As a result, you can better identify applications in the *Topology* view and organize your projects more clearly.
11461146

11471147
[id="ocp-release-notable-technical-changes_{context}"]
11481148
== Notable technical changes
@@ -1969,6 +1969,13 @@ With this release, the warning message no longer appears in the `metrics-server`
19691969

19701970
* Before this update, `oc-mirror` did not check the availability of the specific {product-title} version, and caused it to continue with non-existent versions. As a consequence, users assumed that the mirroring was successful because no error messages were received. With this release, `oc-mirror` returns an error when a non-existent {product-title} version is specified, in addition to a reason for the issue. As a result, users are aware of unavailable versions and can take appropriate action. (link:https://issues.redhat.com/browse/OCPBUGS-51157[OCPBUGS-51157])
19711971

1972+
[id="ocp-release-note-openshift-api-server-bug-fixes_{context}"]
1973+
=== OpenShift API Server
1974+
1975+
* Before this update, on a cluster upgraded from {product-title} 4.16, or earlier, there might be previously generated image pull secrets that cannot be deleted due to the presence of the `openshift.io/legacy-token` finalizer, if the internal Image Registry was removed. With this release, the issue no longer occurs. (link:https://issues.redhat.com/browse/OCPBUGS-52193[OCPBUGS-52193])
1976+
1977+
* Before this update, deleting an `istag` resource with the `--dry-run=server` option unintentionally caused actual deletion of the image from the server. This unexpected deletion occurred due to the `dry-run` option being implemented incorrectly in the `oc delete istag` command. With this release, the `dry-run` option is wired to the 'oc delete istag' command. As a result, the accidental deletion of image objects is prevented and the `istag` object remains intact when using the `--dry-run=server` option. (link:https://issues.redhat.com/browse/OCPBUGS-35855[OCPBUGS-35855])
1978+
19721979
[id="ocp-release-note-oc-cli-bug-fixes_{context}"]
19731980
=== OpenShift CLI (oc)
19741981

@@ -2798,7 +2805,7 @@ When upgrading to {product-title} 4.20, clusters are unaffected until you opt in
27982805
+
27992806
[NOTE]
28002807
====
2801-
Existing {product-title} 4.19 clusters are unaffected until you explicitly enable user namespaces, which is a Technology Preview feature in {product-title} 4.19.
2808+
Existing {product-title} 4.19 clusters are unaffected until you explicitly enable user namespaces, which is a Technology Preview feature in {product-title} 4.19.
28022809
====
28032810

28042811
* When installing a cluster on {azure-short}, if you set any of the `compute.platform.azure.identity.type`, `controlplane.platform.azure.identity.type`, or `platform.azure.defaultMachinePlatform.identity.type` field values to `None`, your cluster is unable to pull images from the Azure Container Registry.

0 commit comments

Comments
 (0)