Bug 2072191

Summary: [4.10] cluster storage operator AWS credentialsrequest lacks KMS privileges
Product: OpenShift Container Platform Reporter: OpenShift BugZilla Robot <openshift-bugzilla-robot>
Component: StorageAssignee: Jonathan Dobson <jdobson>
Storage sub component: Storage QA Contact: Penghao Wang <pewang>
Status: CLOSED ERRATA Docs Contact: Lisa Pettyjohn <lpettyjo>
Severity: high    
Priority: high CC: adeshpan, aos-bugs, awestbro, jdobson, jsafrane, pkhaire
Version: 4.9   
Target Milestone: ---   
Target Release: 4.10.z   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Release Note
Doc Text:
The default credentials request for AWS has been modified to allow mounting of encrypted volumes using customer managed keys from KMS. Administrators who created credentials requests in manual mode with CCO will need to apply those changes manually if they intend to mount encrypted volumes using customer managed keys on AWS. Other administrators should not be impacted by this change.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-04-21 13:16:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2049872    
Bug Blocks: 2072577    

Comment 8 errata-xmlrpc 2022-04-21 13:16:05 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.10.10 bug fix and security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:1356