Skip to content

Commit 7b2b912

Browse files
committed
OSDOCS-17030 updated RNs
1 parent 4a8255b commit 7b2b912

File tree

1 file changed

+54
-1
lines changed

1 file changed

+54
-1
lines changed

security/external_secrets_operator/external-secrets-operator-release-notes.adoc

Lines changed: 54 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
:_mod-docs-content-type: ASSEMBLY
22
[id="external-secrets-operator-release-notes"]
3-
= {external-secrets-operator} release notes
43
include::_attributes/common-attributes.adoc[]
54
:context: external-secrets-operator-release-notes
5+
= {external-secrets-operator} release notes
66

77
toc::[]
88

@@ -12,6 +12,59 @@ These release notes track the development of {external-secrets-operator-short}.
1212

1313
For more information, see xref:../../security/external_secrets_operator/index.adoc#external-secrets-operator-about[{external-secrets-operator-short} overview].
1414

15+
[id="external-secrets-operator-release-notes-1-0-0_{context}"]
16+
== Release notes for {external-secrets-operator} 1.0.0 (General Availability)
17+
18+
Issued: 2025-11-03
19+
20+
The following advisories are available for the {external-secrets-operator} 1.0.0:
21+
22+
* link:https://access.redhat.com/errata/RHBA-2025:19416[RHBA-2025:19416]
23+
* link:https://access.redhat.com/errata/RHBA-2025:19417[RHBA-2025:19417]
24+
* link:https://access.redhat.com/errata/RHBA-2025:19418[RHBA-2025:19418]
25+
* link:https://access.redhat.com/errata/RHBA-2025:19463[RHBA-2025:19463]
26+
27+
Version 1.0.0 of the {external-secrets-operator} is based on the upstream external-secrets project, version v0.19.0. For more information, see the link:https://github.com/external-secrets/external-secrets/releases/tag/v0.19.0[external-secrets project release notes for v0.19.0].
28+
29+
[id="external-secrets-operator-1-0-0-bug-fixes_{context}"]
30+
=== Bug fixes
31+
32+
* Before this release, many of the APIs listed in the console for the {external-secrets-operator} were missing descriptions. With this release, the API descriptions have been added. (link:https://issues.redhat.com/browse/OCPBUGS-61081[OCPBUGS-61081])
33+
34+
35+
[id="external-secrets-operator-1-0-0-features-enhancements_{context}"]
36+
=== New features and enhancements
37+
38+
*Renaming and improvements on the Operator API*
39+
40+
With this release, the Operator API, `externalsecrets.operator.openshift.io` has been renamed to `externalsecretsconfigs.operator.openshift.io` to avoid confusion with the external-secrets provided API that has the same name, but a different purpose. The external-secrets provided API has also been restructured and new features are added.
41+
42+
For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/security_and_compliance/index#external-secrets-operator-api[External Secrets Operator for Red Hat OpenShift APIs].
43+
44+
*Support to collect metrics of {external-secrets-operator-short}*
45+
46+
With this release, the {external-secrets-operator} supports collecting metrics for both the Operator and operands. This is optional and must be enabled.
47+
48+
For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/security_and_compliance/index#external-secrets-monitoring[Monitoring the External Secrets Operator for Red Hat OpenShift].
49+
50+
51+
*Support to configure proxy for {external-secrets-operator-short}*
52+
53+
With this release, the {external-secrets-operator} supports configuring proxy for both the Operator and operand.
54+
55+
For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/security_and_compliance/index#external-secrets-operator-proxy[About the egress proxy for the External Secrets Operator for Red Hat OpenShift].
56+
57+
*Root filesystem is read-only for {external-secrets-operator} containers*
58+
59+
With this release, to improve security, the {external-secrets-operator} and all its operands have the `readOnlyRootFilesystem` security context set to true by default. This enhancement hardens the containers and prevents a potential attacker from modifying the contents of the container’s root file system.
60+
61+
*Network policy hardening is now available for {external-secrets-operator-short} components*
62+
63+
With this release, {external-secrets-operator} includes pre-defined `NetworkPolicy` resources designed for enhanced security by governing ingress and egress traffic for operand components. These policies cover essential internal traffic, such as ingress to the metrics and webhook servers, and egress to the OpenShift API server and DNS server. Note that deployment of the `NetworkPolicy` is enabled by default and egress allow policies must be explicitly defined in the `ExternalSecretsConfig` custom resource for the `external-secrets` component to fetch secrets from external providers.
64+
65+
For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/security_and_compliance/index#external-secrets-operator-config-net-policy[Configuring network policy for the operand].
66+
67+
1568
[id="external-secrets-operator-release-notes-0-1-0_{context}"]
1669
== Release notes for {external-secrets-operator} 0.1.0 (Technology Preview)
1770

0 commit comments

Comments
 (0)