Back to bug 1895053

Who When What Removed Added
Adam Kaplan 2020-11-05 16:26:01 UTC Status NEW ASSIGNED
Target Release --- 4.7.0
Assignee adam.kaplan cdaley
wewang 2020-11-06 02:27:11 UTC CC wewang
QA Contact xiuwang wewang
Seth Jennings 2020-11-07 03:56:48 UTC CC sjenning
Adam Kaplan 2020-11-14 23:58:15 UTC Keywords UpcomingSprint
Eric Paris 2020-11-17 00:36:58 UTC Keywords UpcomingSprint
Adam Kaplan 2020-12-22 16:13:39 UTC Assignee cdaley adam.kaplan
Adam Kaplan 2020-12-23 15:34:53 UTC Keywords UpcomingSprint
OpenShift BugZilla Robot 2021-01-04 22:14:21 UTC Status ASSIGNED POST
OpenShift BugZilla Robot 2021-01-04 22:14:23 UTC Link ID Github openshift/openshift-controller-manager/pull/154
OpenShift BugZilla Robot 2021-01-04 22:15:31 UTC Link ID Github openshift/api/pull/831
OpenShift BugZilla Robot 2021-01-04 22:20:04 UTC Link ID Github openshift/origin/pull/25778
Adam Kaplan 2021-01-06 14:16:55 UTC Depends On 1913325
Gabe Montero 2021-01-11 16:16:34 UTC CC gmontero
Gabe Montero 2021-01-12 18:03:55 UTC Target Release 4.7.0 ---
Adam Kaplan 2021-02-04 20:48:27 UTC Target Release --- 4.8.0
OpenShift BugZilla Robot 2021-02-10 16:03:29 UTC Link ID Github openshift/openshift-apiserver/pull/185
OpenShift BugZilla Robot 2021-02-10 20:44:21 UTC Link ID Github openshift/builder/pull/218
Oleg Bulatov 2021-02-11 10:33:57 UTC Keywords UpcomingSprint
Rolfe Dlugy-Hegwer 2021-02-22 15:37:53 UTC CC rdlugyhe
OpenShift BugZilla Robot 2021-02-23 16:37:25 UTC Link ID Github openshift/oc/pull/748
OpenShift BugZilla Robot 2021-03-01 20:48:16 UTC Link ID Github openshift/oc/pull/748
Rolfe Dlugy-Hegwer 2021-03-25 22:32:32 UTC CC rdlugyhe
OpenShift BugZilla Robot 2021-04-18 18:11:52 UTC CC aygarg
Flags needinfo?(adam.kaplan)
Status POST MODIFIED
OpenShift Automated Release Tooling 2021-04-18 18:55:39 UTC Status MODIFIED ON_QA
wewang 2021-04-19 06:13:24 UTC Status ON_QA VERIFIED
Adam Kaplan 2021-04-19 12:34:31 UTC Doc Text Feature: Builds can mount cluster custom PKI certificate authorities

Reason: Builds have not had the ability to use the cluster PKI certificate authorities, which may be needed to access corporate artifact repositories.

Result: Builds can opt into mounting the cluster custom PKI certificate authority by setting `mountTrustedCA` to `true` in the BuildConfig spec.
Doc Type If docs needed, set a value Enhancement
Adam Kaplan 2021-05-10 21:10:36 UTC CC jtejal
Flags needinfo?(adam.kaplan)
Flags needinfo?(adam.kaplan) needinfo?(adam.kaplan)
Petr Kovar 2021-05-31 14:25:48 UTC Docs Contact srr
Rolfe Dlugy-Hegwer 2021-06-07 18:54:22 UTC CC rdlugyhe
Doc Text Feature: Builds can mount cluster custom PKI certificate authorities

Reason: Builds have not had the ability to use the cluster PKI certificate authorities, which may be needed to access corporate artifact repositories.

Result: Builds can opt into mounting the cluster custom PKI certificate authority by setting `mountTrustedCA` to `true` in the BuildConfig spec.
Previously, builds could not use the cluster PKI certificate authorities, even if they needed them to access corporate artifact repositories.
Now, you can enable builds to mount cluster custom PKI certificates so that they can access corporate artifact repositories: In the `BuildConfig` object, set `mountTrustedCA` to `true`.
Flags needinfo?(adam.kaplan)
Srivaralakshmi Ramani 2021-06-08 14:47:06 UTC Flags needinfo?(rdlugyhe)
Rolfe Dlugy-Hegwer 2021-06-08 15:50:16 UTC CC srr
Doc Text Previously, builds could not use the cluster PKI certificate authorities, even if they needed them to access corporate artifact repositories.
Now, you can enable builds to mount cluster custom PKI certificates so that they can access corporate artifact repositories: In the `BuildConfig` object, set `mountTrustedCA` to `true`.
Previously, builds could not use the cluster PKI certificate authorities to access corporate artifact repositories.
Now, you can enable builds to mount cluster custom PKI certificates so that they can access corporate artifact repositories: In the `BuildConfig` object, set `mountTrustedCA` to `true`.
Flags needinfo?(rdlugyhe) needinfo?(srr)
XiuJuan Wang 2021-06-09 03:22:04 UTC Keywords NeedsTestCase
CC xiuwang
wewang 2021-06-09 03:37:31 UTC Keywords NeedsTestCase
Srivaralakshmi Ramani 2021-06-09 10:14:01 UTC Doc Text Previously, builds could not use the cluster PKI certificate authorities to access corporate artifact repositories.
Now, you can enable builds to mount cluster custom PKI certificates so that they can access corporate artifact repositories: In the `BuildConfig` object, set `mountTrustedCA` to `true`.
Previously, builds could not use the cluster PKI certificate authorities that were sometimes required to access corporate artifact repositories. Now, you can configure the `BuildConfig` object to mount cluster custom PKI certificate authorities by setting `mountTrustedCA` to `true`.
Flags needinfo?(srr)
Srivaralakshmi Ramani 2021-06-09 10:15:28 UTC Flags needinfo?(wewang)
wewang 2021-06-09 11:06:20 UTC Flags needinfo?(wewang)
Adam Kaplan 2021-06-09 14:30:07 UTC Flags needinfo?(adam.kaplan)
Rolfe Dlugy-Hegwer 2021-06-24 17:56:32 UTC Doc Text Previously, builds could not use the cluster PKI certificate authorities that were sometimes required to access corporate artifact repositories. Now, you can configure the `BuildConfig` object to mount cluster custom PKI certificate authorities by setting `mountTrustedCA` to `true`. [discrete]
[id="ocp-4-8-builds-mount-custom-pki-ca"]
==== Mount custom PKI certificate authorities
Previously, builds could not use the cluster PKI certificate authorities that were sometimes required to access corporate artifact repositories. Now, you can configure the `BuildConfig` object to mount cluster custom PKI certificate authorities by setting `mountTrustedCA` to `true`.
errata-xmlrpc 2021-07-27 00:06:06 UTC Status VERIFIED RELEASE_PENDING
Rolfe Dlugy-Hegwer 2021-07-27 10:25:28 UTC CC rdlugyhe
errata-xmlrpc 2021-07-27 22:34:10 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2021-07-27 22:34:10 UTC
errata-xmlrpc 2021-07-27 22:34:30 UTC Link ID Red Hat Product Errata RHSA-2021:2438

Back to bug 1895053