Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Helm release cert-manager to v1 #37

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jan 7, 2021

WhiteSource Renovate

This PR contains the following updates:

Package Update Change
cert-manager major v0.15.1 -> v1.2.0

Release Notes

jetstack/cert-manager

v1.2.0

Compare Source

Urgent Upgrade Notes
(No, really, you MUST read this before you upgrade)
  • ⚠️ BREAKING CHANGE ⚠️ The minimum supported Kubernetes version is now v1.16.0 as of cert-manager v1.2.0. Users still running Kubernetes v1.15 or below should upgrade to a supported version before installing cert-manager or use cert-manager v1.1.
  • The User-Agent request header sent by cert-manager has changed to reflect the ownership transfer to the CNCF — see (#​3515, @​meyskens)
  • The --renew-before-expiration-duration flag of the cert-manager controller-manager has been deprecated. Please set the Certificate.Spec.RenewBefore field instead. This flag will be removed in the next release.
  • Certificates issued by the Vault issuer have changed — the root CA instead of the issuing CA is now stored in ca.crt — see (#​3433, @​sorah)
Changes by Kind
Feature
  • Add cert-manager.io/usages to ingress-shim to specify key usages. Server Auth is now also added as default key usage of ingress-shim (#​3545, @​meyskens)
  • Add kubectl cert-manager inspect secret to print certificate info from a secret resource (#​3457, @​meyskens)
  • Add category names to our CRDs so they appear in kubectl get cert-manager and kubectl get cert-manager-acme (#​3583, @​meyskens)
  • Add creation of PKCS12 truststore.p12 using Certificate Authority (#​3489, @​exceptionfactory)
  • Add option to pass the Certificate duration to ACME (not supported by Let's Encrypt yet) (#​3347, @​meyskens)
  • Added the ability to enable pprof profiling of the controller using the command line flag --enable-profiling. (#​3477, @​tharun208)
  • Added the option to specify the OCSP server for certificates issued by the CA issuer (#​3505, @​hugoboos)
  • Allows customization of cainjector leader-election leases with new flags --leader-election-lease-duration, --leader-election-renew-deadline and --leader-election-retry-period (#​3527, @​ndrpnt)
  • The ingress-shim now checks for cert-manager.io/duration and cert-manager.io/renew-before annotations and uses those values to set the Certificate.Spec.Duration and Certificate.Spec.RenewBefore fields. (#​3465, @​wallrj)
  • Venafi Issuer now sets the CA.crt field of the Secret. (#​3533, @​wallrj)
Bug or Regression
  • Deprecated the --renew-before-expiration-duration flag of the cert-manager controller (#​3464, @​wallrj)
  • Fix a bug in the AWS Route53 DNS01 challenge that to retrying over and over instead of observing an exponential back off (#​3485, @​maelvls)
  • Relaxes Ingress validation rules to allow for Certificates to be created/updated for valid Ingress TLS entries even if the same Ingress contains some invalid TLS entries (#​3623, @​irbekrm)
  • Fix Vault issuer not to store a root CA into a certificate bundle (tls.crt). Also, Vault issuer now stores a root CA instead of an issuing CA into a CA bundle (ca.crt), from a CA chain returned from Vault. (#​3433, @​sorah)
  • Fix Helm chart type conversion bug (#​3647, @​irbekrm)
Other (Cleanup or Flake)

v1.1.0

Compare Source

Changes by Kind

Feature
Other (Bug, Cleanup or Flake)

v1.0.4

Compare Source

Changes by Kind

Other (Bug, Cleanup or Flake)
  • Fix a bug where the Venafi Issuer and ClusterIssuer did not set the Ready condition and message if there was an API connection or API authentication failure. The Ready condition will now always be set, including details of any errors during setup. (#​3389, @​wallrj)
  • Fix a panic when changing the max concurrent challenges to a lower value (#​3418, @​meyskens)
  • Fix bug in AWS route53 zone lookup that caused too many IAM requests (#​3375, @​supriya-premkumar)
  • Fix logic in patchDuplicateKeyUsage when signing and digital signature were set (#​3352, @​meyskens)
  • Fix nil pointer error in Cloud DNS when specific config was used. (#​3420, @​meyskens)

v1.0.3

Compare Source

Changes by Kind

Other (Bug, Cleanup or Flake)
  • Fix logic in patchDuplicateKeyUsage when signing and digital signature were set (#​3352, @​meyskens)
  • Fixes incorrect CSR validation when both "signing" and "digital signature" are set (#​3306, @​meyskens)
  • Improve ACME backoff logic + prevent infinity retry without surfacing errors (#​3322, @​meyskens)

v1.0.2

Compare Source

Changes by Kind

Bug or Regression

v1.0.1

Compare Source

Changes by Kind

Other (Bug, Cleanup or Flake)

v1.0.0

Compare Source

With cert-manager v1.0 we're putting a seal of trust on 3 years of development on the cert-manager project.
In these 3 years cert-manager has grown in functionality and stability, but mostly in the community.
Today we see many people using cert-manager to secure their Kubernetes clusters, as well as cert-manager
being integrated into many other parts in the ecosystem.
In the past 16 releases many bugs got fixed, and things that needed to be broken were broken.
Several iterations on the API improved the user experience.
We solved 1500 GitHub Issues with even more PRs by 253 contributors.

With releasing v1.0 we're officially making a statement that cert-manager is a mature project now.
We will also be making a compatibility promise with our v1 API.

A big thank you to everyone who helped to build cert-manager in the past 3 years!
Let v1.0 be the first of many big achievements!

The v1.0 release is a stability release with a few focus areas:

  • v1 API
  • kubectl cert-manager status command to help with investigating issues
  • Using new and stable Kubernetes APIs
  • Improved logging
  • AMCE improvements

We invite you to read more about these changes on our website

Urgent Upgrade Notes

(No, really, you MUST read this before you upgrade)

Changes by Kind

Feature
Other (Bug, Cleanup or Flake)

v0.16.1

Compare Source

Changes by Kind
Other (Bug, Cleanup or Flake)
  • Ensures Secrets created from the Certificates controller contains the annotation containing the Issuer Group Name. (#​3153, @​JoshVanL)

v0.16.0

Compare Source

Urgent Upgrade Notes
(No, really, you MUST read this before you upgrade)
Changes by Kind
Feature
  • Acme: surface the 'reason' for Order's failing on Certificate & CertificateRequest resources for easier debugging of failures (#​3075, @​munnerz)
  • Add Events of the Certificate and of the CertificateRequest to the output of the ctl command status certificate (#​3102, @​hzhou97)
  • Add v1beta1 API version (#​3038, @​munnerz)
  • Add a hostedZoneName field to Cloud DNS (#​2975, @​meyskens)
  • Add cert-manager specific User-Agent to HTTP01 self-checks (#​3046, @​meyskens)
  • Add information about the CertificateRequest resource related to the Certificate to the output of the status certificate command. (#​3090, @​hzhou97)
  • Add new ctl command that outputs the details of the current status of a Certificate resource (#​3026, @​hzhou97)
  • Add new ctl command to manually create a CertificateRequest from yaml description of a Certificate resource. (#​2957, @​hzhou97)
  • Added the ability to set the container securityContext for each deployment in the helm chart (#​2858, @​sudermanjr)
  • Enable the new certificate controller implementations for all users (#​3049, @​munnerz)
  • Kubectl cert-manager: Added flags to wait for the CertificateRequest to be ready and store the certificate in a file. (#​3044, @​hzhou97)
  • Venafi: make issuance of certificates asynchronous (#​2979, @​meyskens)
Other (Bug, Cleanup or Flake)

v0.15.2

Compare Source

Changes by Kind
Other (Bug, Cleanup or Flake)

Renovate configuration

📅 Schedule: At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

♻️ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by WhiteSource Renovate. View repository job log here.

@renovate renovate bot force-pushed the renovate/helm-cert-manager-1.x branch from 432eb6f to 4a0ec5b Compare February 11, 2021 11:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant