You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
==== Creating a route with externally managed certificate (General Availability)
459
+
==== Creating a route with externally managed certificate (General Availability)
460
460
461
461
With this release, {product-title} routes can be configured with third-party certificate management solutions, utilising the `.spec.tls.externalCertificate` field in the route API. This allows you to reference externally managed TLS certificates through secrets, streamlining the process by eliminating manual certificate management. By using externally managed certificates, you reduce errors, ensure a smoother certificate update process, and enable the OpenShift router to promptly serve renewed certificates. For more information, see xref:../networking/routes/secured-routes.adoc#nw-ingress-route-secret-load-external-cert_secured-routes[Creating a route with externally managed certificate].
462
462
@@ -499,6 +499,18 @@ With this release, {product-title} introduces the Data Processing Unit (DPU) Ope
The following base images for Operator projects are updated for compatability with {product-title} {product-version}. The runtime functionality and configuration APIs for these base images are supported for bug fixes and for addressing CVEs.
506
+
507
+
* The base image for Ansible-based Operator projects
508
+
* The base image for Helm-based Operator projects
509
+
510
+
For more information, see link:https://docs.google.com/document/d/1OpdV5QFP_e9Mv3gSj5SrolBXMBqadhJvf2p7zIHUGuY/edit?tab=t.0[Updating the base image for existing Ansible- or Helm-based Operator projects for {product-title} 4.19 and later] (Red{nbsp}Hat Knowledgebase).
511
+
512
+
// NOTE: This will be a KCS article. Using a google doc as a placeholder to get reviews.
=== Pods deploy with readOnlyRootFilesystem set to true
560
572
561
-
With this release, Cloud Credential Operator pods now deploy with the `readOnlyRootFilesystem` security context setting set to `true`. This enhances security by ensuring that the container root file system is mounted as read-only.
573
+
With this release, Cloud Credential Operator pods now deploy with the `readOnlyRootFilesystem` security context setting set to `true`. This enhances security by ensuring that the container root file system is mounted as read-only.
==== Operator SDK CLI and related scaffolding and testing tools
920
+
921
+
With this release, the Red{nbsp}Hat-supported version of the Operator SDK CLI tool, including the related scaffolding and testing tools for Operator projects, is no longer released with {product-title}.
922
+
923
+
Red{nbsp}Hat will provide bug fixes and support for versions of the Operator SDK that were released with earlier versions of {product-title} according to the link:https://access.redhat.com/product-life-cycles?product=OpenShift%20Container%20Platform%204[Product Life Cycles for {product-title} 4] (Red{nbsp} Customer Portal).
924
+
925
+
Operator authors with existing Operator projects can use the version of the Operator SDK CLI tool released with {product-title} 4.18 to maintain their projects and create Operator releases targeting newer versions of {product-title}. For more information, see link:https://docs.google.com/document/d/1OpdV5QFP_e9Mv3gSj5SrolBXMBqadhJvf2p7zIHUGuY/edit?tab=t.0[Updating the base image for existing Ansible- or Helm-based Operator projects for {product-title} 4.19 and later] (Red{nbsp}Hat Knowledgebase).
926
+
927
+
For more information about the unsupported, community-maintained, version of the Operator SDK, see link:https://sdk.operatorframework.io[Operator SDK (Operator Framework)].
0 commit comments