Back to bug 1895053
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Adam Kaplan | 2020-11-05 16:26:01 UTC | Status | NEW | ASSIGNED |
| Target Release | --- | 4.7.0 | ||
| Assignee | adam.kaplan | cdaley | ||
| wewang | 2020-11-06 02:27:11 UTC | CC | wewang | |
| QA Contact | xiuwang | wewang | ||
| Seth Jennings | 2020-11-07 03:56:48 UTC | CC | sjenning | |
| Adam Kaplan | 2020-11-14 23:58:15 UTC | Keywords | UpcomingSprint | |
| Eric Paris | 2020-11-17 00:36:58 UTC | Keywords | UpcomingSprint | |
| Adam Kaplan | 2020-12-22 16:13:39 UTC | Assignee | cdaley | adam.kaplan |
| Adam Kaplan | 2020-12-23 15:34:53 UTC | Keywords | UpcomingSprint | |
| OpenShift BugZilla Robot | 2021-01-04 22:14:21 UTC | Status | ASSIGNED | POST |
| OpenShift BugZilla Robot | 2021-01-04 22:14:23 UTC | Link ID | Github openshift/openshift-controller-manager/pull/154 | |
| OpenShift BugZilla Robot | 2021-01-04 22:15:31 UTC | Link ID | Github openshift/api/pull/831 | |
| OpenShift BugZilla Robot | 2021-01-04 22:20:04 UTC | Link ID | Github openshift/origin/pull/25778 | |
| Adam Kaplan | 2021-01-06 14:16:55 UTC | Depends On | 1913325 | |
| Gabe Montero | 2021-01-11 16:16:34 UTC | CC | gmontero | |
| Gabe Montero | 2021-01-12 18:03:55 UTC | Target Release | 4.7.0 | --- |
| Adam Kaplan | 2021-02-04 20:48:27 UTC | Target Release | --- | 4.8.0 |
| OpenShift BugZilla Robot | 2021-02-10 16:03:29 UTC | Link ID | Github openshift/openshift-apiserver/pull/185 | |
| OpenShift BugZilla Robot | 2021-02-10 20:44:21 UTC | Link ID | Github openshift/builder/pull/218 | |
| Oleg Bulatov | 2021-02-11 10:33:57 UTC | Keywords | UpcomingSprint | |
| Rolfe Dlugy-Hegwer | 2021-02-22 15:37:53 UTC | CC | rdlugyhe | |
| OpenShift BugZilla Robot | 2021-02-23 16:37:25 UTC | Link ID | Github openshift/oc/pull/748 | |
| OpenShift BugZilla Robot | 2021-03-01 20:48:16 UTC | Link ID | Github openshift/oc/pull/748 | |
| Rolfe Dlugy-Hegwer | 2021-03-25 22:32:32 UTC | CC | rdlugyhe | |
| OpenShift BugZilla Robot | 2021-04-18 18:11:52 UTC | CC | aygarg | |
| Flags | needinfo?(adam.kaplan) | |||
| Status | POST | MODIFIED | ||
| OpenShift Automated Release Tooling | 2021-04-18 18:55:39 UTC | Status | MODIFIED | ON_QA |
| wewang | 2021-04-19 06:13:24 UTC | Status | ON_QA | VERIFIED |
| Adam Kaplan | 2021-04-19 12:34:31 UTC | Doc Text | Feature: Builds can mount cluster custom PKI certificate authorities Reason: Builds have not had the ability to use the cluster PKI certificate authorities, which may be needed to access corporate artifact repositories. Result: Builds can opt into mounting the cluster custom PKI certificate authority by setting `mountTrustedCA` to `true` in the BuildConfig spec. | |
| Doc Type | If docs needed, set a value | Enhancement | ||
| Adam Kaplan | 2021-05-10 21:10:36 UTC | CC | jtejal | |
| Flags | needinfo?(adam.kaplan) | |||
| Flags | needinfo?(adam.kaplan) needinfo?(adam.kaplan) | |||
| Petr Kovar | 2021-05-31 14:25:48 UTC | Docs Contact | srr | |
| Rolfe Dlugy-Hegwer | 2021-06-07 18:54:22 UTC | CC | rdlugyhe | |
| Doc Text | Feature: Builds can mount cluster custom PKI certificate authorities Reason: Builds have not had the ability to use the cluster PKI certificate authorities, which may be needed to access corporate artifact repositories. Result: Builds can opt into mounting the cluster custom PKI certificate authority by setting `mountTrustedCA` to `true` in the BuildConfig spec. | Previously, builds could not use the cluster PKI certificate authorities, even if they needed them to access corporate artifact repositories. Now, you can enable builds to mount cluster custom PKI certificates so that they can access corporate artifact repositories: In the `BuildConfig` object, set `mountTrustedCA` to `true`. | ||
| Flags | needinfo?(adam.kaplan) | |||
| Srivaralakshmi Ramani | 2021-06-08 14:47:06 UTC | Flags | needinfo?(rdlugyhe) | |
| Rolfe Dlugy-Hegwer | 2021-06-08 15:50:16 UTC | CC | srr | |
| Doc Text | Previously, builds could not use the cluster PKI certificate authorities, even if they needed them to access corporate artifact repositories. Now, you can enable builds to mount cluster custom PKI certificates so that they can access corporate artifact repositories: In the `BuildConfig` object, set `mountTrustedCA` to `true`. | Previously, builds could not use the cluster PKI certificate authorities to access corporate artifact repositories. Now, you can enable builds to mount cluster custom PKI certificates so that they can access corporate artifact repositories: In the `BuildConfig` object, set `mountTrustedCA` to `true`. | ||
| Flags | needinfo?(rdlugyhe) | needinfo?(srr) | ||
| XiuJuan Wang | 2021-06-09 03:22:04 UTC | Keywords | NeedsTestCase | |
| CC | xiuwang | |||
| wewang | 2021-06-09 03:37:31 UTC | Keywords | NeedsTestCase | |
| Srivaralakshmi Ramani | 2021-06-09 10:14:01 UTC | Doc Text | Previously, builds could not use the cluster PKI certificate authorities to access corporate artifact repositories. Now, you can enable builds to mount cluster custom PKI certificates so that they can access corporate artifact repositories: In the `BuildConfig` object, set `mountTrustedCA` to `true`. | Previously, builds could not use the cluster PKI certificate authorities that were sometimes required to access corporate artifact repositories. Now, you can configure the `BuildConfig` object to mount cluster custom PKI certificate authorities by setting `mountTrustedCA` to `true`. |
| Flags | needinfo?(srr) | |||
| Srivaralakshmi Ramani | 2021-06-09 10:15:28 UTC | Flags | needinfo?(wewang) | |
| wewang | 2021-06-09 11:06:20 UTC | Flags | needinfo?(wewang) | |
| Adam Kaplan | 2021-06-09 14:30:07 UTC | Flags | needinfo?(adam.kaplan) | |
| Rolfe Dlugy-Hegwer | 2021-06-24 17:56:32 UTC | Doc Text | Previously, builds could not use the cluster PKI certificate authorities that were sometimes required to access corporate artifact repositories. Now, you can configure the `BuildConfig` object to mount cluster custom PKI certificate authorities by setting `mountTrustedCA` to `true`. | [discrete] [id="ocp-4-8-builds-mount-custom-pki-ca"] ==== Mount custom PKI certificate authorities Previously, builds could not use the cluster PKI certificate authorities that were sometimes required to access corporate artifact repositories. Now, you can configure the `BuildConfig` object to mount cluster custom PKI certificate authorities by setting `mountTrustedCA` to `true`. |
| errata-xmlrpc | 2021-07-27 00:06:06 UTC | Status | VERIFIED | RELEASE_PENDING |
| Rolfe Dlugy-Hegwer | 2021-07-27 10:25:28 UTC | CC | rdlugyhe | |
| errata-xmlrpc | 2021-07-27 22:34:10 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2021-07-27 22:34:10 UTC | |||
| errata-xmlrpc | 2021-07-27 22:34:30 UTC | Link ID | Red Hat Product Errata RHSA-2021:2438 |
Back to bug 1895053