Skip to content

Commit e3228eb

Browse files
Merge pull request #68376 from snarayan-redhat/OSDOCS-8813_remove110
OSDOCS#8813: Removed 1.10 references for 4.14 and above
2 parents dd1bd25 + 81ee7dc commit e3228eb

File tree

1 file changed

+1
-92
lines changed

1 file changed

+1
-92
lines changed

security/cert_manager_operator/cert-manager-operator-release-notes.adoc

Lines changed: 1 addition & 92 deletions
Original file line numberDiff line numberDiff line change
@@ -161,95 +161,4 @@ This is the general availability (GA) release of the {cert-manager-operator}.
161161

162162
* After installing the {cert-manager-operator}, if you navigate to *Operators → Installed Operators* and select *Operator details* in the {product-title} web console, you cannot see the cert-manager resources that are created across all namespaces. As a workaround, you can navigate to *Home -> API Explorer* to see the cert-manager resources. (link:https://issues.redhat.com/browse/OCPBUGS-11647[*OCPBUGS-11647*])
163163

164-
* After uninstalling the {cert-manager-operator} by using the web console, the {cert-manager-operator} does not remove the cert-manager controller, CA injector, and Webhook pods automatically from the `cert-manager` namespace. As a workaround, you can manually delete the cert-manager controller, CA injector, and Webhook pod deployments present in the `cert-manager` namespace. (link:https://issues.redhat.com/browse/OCPBUGS-13679[*OCPBUGS-13679*])
165-
166-
[id="cert-manager-operator-release-notes-1.10.3"]
167-
== Release notes for {cert-manager-operator} 1.10.3
168-
169-
Issued: 2023-08-08
170-
171-
The following advisory is available for the {cert-manager-operator} 1.10.3:
172-
173-
* link:https://access.redhat.com/errata/RHSA-2023:4335[RHSA-2023:4335]
174-
175-
The version `1.10.3` of the {cert-manager-operator} is based on the `cert-manager` upstream version `v1.10.2`. With this release, the version of the {cert-manager-operator} is `1.10.3` but the `cert-manager` operand version is `1.10.2`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.10/#v1102-changes-since-v1101[cert-manager project release notes for v1.10.2].
176-
177-
[id="cert-manager-operator-1.10.3-CVEs"]
178-
=== CVEs
179-
180-
* link:https://access.redhat.com/security/cve/CVE-2022-41725[CVE-2022-41725]
181-
* link:https://access.redhat.com/security/cve/CVE-2022-41724[CVE-2022-41724]
182-
* link:https://access.redhat.com/security/cve/CVE-2023-24536[CVE-2023-24536]
183-
* link:https://access.redhat.com/security/cve/CVE-2023-24538[CVE-2023-24538]
184-
* link:https://access.redhat.com/security/cve/CVE-2023-24537[CVE-2023-24537]
185-
* link:https://access.redhat.com/security/cve/CVE-2023-24534[CVE-2023-24534]
186-
* link:https://access.redhat.com/security/cve/CVE-2022-41723[CVE-2022-41723]
187-
* link:https://access.redhat.com/security/cve/CVE-2023-29400[CVE-2023-29400]
188-
* link:https://access.redhat.com/security/cve/CVE-2023-24540[CVE-2023-24540]
189-
* link:https://access.redhat.com/security/cve/CVE-2023-24539[CVE-2023-24539]
190-
191-
[id="cert-manager-operator-release-notes-1.10.2"]
192-
== Release notes for {cert-manager-operator} 1.10.2
193-
194-
Issued: 2023-03-23
195-
196-
The following advisory is available for the {cert-manager-operator} 1.10.2:
197-
198-
* link:https://access.redhat.com/errata/RHEA-2023:1238[RHEA-2023:1238]
199-
200-
Version `1.10.2` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.10.2`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.10/#v1102-changes-since-v1101[cert-manager project release notes for v1.10.2].
201-
202-
[IMPORTANT]
203-
====
204-
If you used the Technology Preview version of the {cert-manager-operator}, you must uninstall it and remove all related resources for the Technology Preview version before installing this version of the {cert-manager-operator}.
205-
206-
For more information, see xref:../../security/cert_manager_operator/cert-manager-operator-uninstall.adoc#cert-manager-operator-uninstall[Uninstalling the {cert-manager-operator}].
207-
====
208-
209-
[id="cert-manager-operator-1.10.2-new-features-and-enhancements"]
210-
=== New features and enhancements
211-
212-
This is the general availability (GA) release of the {cert-manager-operator}.
213-
214-
* The following issuer types are supported:
215-
** Automated Certificate Management Environment (ACME)
216-
** Certificate authority (CA)
217-
** Self-signed
218-
219-
* The following ACME challenge types are supported:
220-
** DNS-01
221-
** HTTP-01
222-
223-
* The following DNS-01 providers for ACME issuers are supported:
224-
** Amazon Route 53
225-
** Azure DNS
226-
** Google Cloud DNS
227-
228-
* The {cert-manager-operator} now supports injecting custom CA certificates and propagating cluster-wide egress proxy environment variables.
229-
230-
* You can customize the {cert-manager-operator} API fields by overriding environment variables and arguments. For more information, see xref:../../security/cert_manager_operator/cert-manager-customizing-api-fields.adoc#cert-manager-customizing-api-fields[Customizing cert-manager Operator API fields]
231-
232-
* You can enable monitoring and metrics collection for the {cert-manager-operator} by using a service monitor to perform the custom metrics scraping. After you have enabled monitoring for the {cert-manager-operator}, you can query its metrics by using the {product-title} web console. For more information, see xref:../../security/cert_manager_operator/cert-manager-monitoring.adoc#cert-manager-monitoring[Enabling monitoring for the {cert-manager-operator}]
233-
234-
[id="cert-manager-operator-1.10.2-bug-fixes"]
235-
=== Bug fixes
236-
237-
* Previously, the `unsupportedConfigOverrides` field replaced user-provided arguments instead of appending them. Now, the `unsupportedConfigOverrides` field properly appends user-provided arguments. (link:https://issues.redhat.com/browse/CM-23[*CM-23*])
238-
+
239-
[WARNING]
240-
====
241-
Using the `unsupportedConfigOverrides` section to modify the configuration of an Operator is unsupported and might block cluster upgrades.
242-
====
243-
244-
* Previously, the {cert-manager-operator} was installed as a cluster Operator. With this release, the {cert-manager-operator} is now properly installed as an OLM Operator. (link:https://issues.redhat.com/browse/CM-35[*CM-35*])
245-
246-
[id="cert-manager-operator-1.10.2-known-issues"]
247-
=== Known issues
248-
249-
* Using `Route` objects is not fully supported. Currently, to use {cert-manager-operator} with `Routes`, users must create `Ingress` objects, which are translated to `Route` objects by the Ingress-to-Route Controller. (link:https://issues.redhat.com/browse/CM-16[*CM-16*])
250-
251-
* The {cert-manager-operator} does not support using Azure Active Directory (Azure AD) pod identities to assign a managed identity to a pod. As a workaround, you can use a service principal to assign a managed identity. (link:https://issues.redhat.com/browse/OCPBUGS-8665[*OCPBUGS-8665*])
252-
253-
* The {cert-manager-operator} does not support using Google workload identity federation. (link:https://issues.redhat.com/browse/OCPBUGS-9998[*OCPBUGS-9998*])
254-
255-
* When uninstalling the {cert-manager-operator}, if you select the *Delete all operand instances for this operator* checkbox in the {product-title} web console, the Operator is not uninstalled properly. As a workaround, do not select this checkbox when uninstalling the {cert-manager-operator}. (link:https://issues.redhat.com/browse/OCPBUGS-9960[*OCPBUGS-9960*])
164+
* After uninstalling the {cert-manager-operator} by using the web console, the {cert-manager-operator} does not remove the cert-manager controller, CA injector, and Webhook pods automatically from the `cert-manager` namespace. As a workaround, you can manually delete the cert-manager controller, CA injector, and Webhook pod deployments present in the `cert-manager` namespace. (link:https://issues.redhat.com/browse/OCPBUGS-13679[*OCPBUGS-13679*])

0 commit comments

Comments
 (0)