Skip to content

Commit f2dd27b

Browse files
committed
OSDOCS-14573: Adding ESO operator in release notes
1 parent ed1261b commit f2dd27b

File tree

2 files changed

+9
-1
lines changed

2 files changed

+9
-1
lines changed

_attributes/common-attributes.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,8 @@ endif::[]
6262
:osc: OpenShift sandboxed containers
6363
:osc-operator: OpenShift sandboxed containers Operator
6464
:cert-manager-operator: cert-manager Operator for Red Hat OpenShift
65+
:external-secrets-operator: External Secrets Operator for Red Hat OpenShift
66+
:external-secrets-operator-short: External Secrets Operator
6567
:secondary-scheduler-operator-full: Secondary Scheduler Operator for Red Hat OpenShift
6668
:secondary-scheduler-operator: Secondary Scheduler Operator
6769
:descheduler-operator: Kube Descheduler Operator

release_notes/ocp-4-19-release-notes.adoc

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -956,6 +956,12 @@ With this release, the control plane supports TLS 1.3. You can now use the `Mode
956956

957957
For more information, see xref:../security/tls-security-profiles.adoc#tls-profiles-kubernetes-configuring_tls-security-profiles[Configuring the TLS security profile for the control plane].
958958

959+
[id="ocp-release-notes-eso-operator_{context}"]
960+
==== The {external-secrets-operator} (Technology Preview)
961+
With this release, you can use the {external-secrets-operator} to authenticate with the external secrets store, retrieve secrets, and inject the retrieved secrets into a native Kubernetes secret. The {external-secrets-operator} is available as a Technology Preview.
962+
963+
For more information, see xref:../security/external_secrets_operator/index.adoc#index_external-secrets-operator-about[External Secrets Operator for Red Hat OpenShift overview]
964+
959965
[id="ocp-release-notes-storage_{context}"]
960966
=== Storage
961967

@@ -2837,7 +2843,7 @@ $ oc adm release info 4.19.1 --pullspecs
28372843

28382844
* Previously, the authentication process for the `/metrics` endpoint was missing a token review check and caused unauthorized requests. As a result, the {product-title} console was prone to `TargetDown` alerts. With this release, the token review for unauthorized requests occurs with the user token provided in the request context. As a result, unauthorized requests to the {product-title} console do not cause `TargetDown` alerts. (link:https://issues.redhat.com/browse/OCPBUGS-57180[OCPBUGS-57180])
28392845

2840-
* Previously, the *Started* column was hidden when screen size was reduced. As a consequence, the `VirtualizedTable` component malfunctioned because of a missing sort function, and the table sorting functionality was affected on the `PipelineRun` list pages. With this release, the table component handles missing sort functions correctly for reduced screen sizes. (link:https://issues.redhat.com/browse/OCPBUGS-57110[OCPBUGS-57110])
2846+
* Previously, the *Started* column was hidden when screen size was reduced. As a consequence, the `VirtualizedTable` component malfunctioned because of a missing sort function, and the table sorting functionality was affected on the `PipelineRun` list pages. With this release, the table component handles missing sort functions correctly for reduced screen sizes. (link:https://issues.redhat.com/browse/OCPBUGS-57110[OCPBUGS-57110])
28412847

28422848
* Previously, if you configured a masthead logo for a theme but used the default settings for the rest of the theme, the logo shown on the user interface was inconsistent. With this release, the masthead logo displays a default option for both light and dark themes, improving the interface consistency. (link:https://issues.redhat.com/browse/OCPBUGS-57054[OCPBUGS-57054])
28432849

0 commit comments

Comments
 (0)