feat(charts): update helm release cert-manager to v1.7.0 #806
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.6.2
->v1.7.0
Release Notes
jetstack/cert-manager
v1.7.0
Compare Source
Breaking Changes (You MUST read this before you upgrade!)
Removal of Deprecated APIs
⚠ Following their deprecation in version 1.5, the cert-manager API versions v1alpha2, v1alpha3, and v1beta1 have been removed.
You must ensure that all cert-manager custom resources are stored in etcd at version v1
and that all cert-manager
CustomResourceDefinition
s have only v1 as the stored versionbefore upgrading.
Since release 1.7,
cmctl
can automatically migrate any deprecated API resources.Please [download
cmctl-v1.7.0
][download cmctl-v1.7.0] and read Migrating Deprecated API Resourcesfor full instructions.
Ingress Class Semantics
In 1.7, we have reverted a change that caused a regression in the ACME Issuer.
Before 1.5, the Ingress created by cert-manager while solving an HTTP-01 challenge contained the
kubernetes.io/ingress.class
annotation:After 1.5, the Ingress does not contain the annotation anymore. Instead, cert-manager uses the
ingressClassName
field:This broke many users that either don't use an Ingress controller that supports the field (such as ingress-gce and Azure AGIC), as well as people who did not need to create an IngressClass previously (such as with Istio and Traefik).
The regression is present in cert-manager 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.0, 1.6.1. It is only present on Kubernetes 1.19+ and only appears when using an Issuer or ClusterIssuer with an ACME HTTP-01 solver configured.
In 1.7, we have restored the original behavior which is to use the annotation. We will also backport this fix to 1.5.5 and 1.6.4, allowing people to upgrade safely.
Most people won't have any trouble upgrading from a version that contains the regression to 1.7.0, 1.6.4 or 1.5.5. If you are using Gloo, Contour, Skipper, or kube-ingress-aws-controller, you shouldn't have any issues. If you use the default "class" (e.g.,
istio
for Istio) for Traefik, Istio, Ambassador, or ingress-nginx, then these should also continue to work without issue.If you are using Traefik, Istio, Ambassador, or ingress-nginx and you are using a non-default value for the class (e.g.,
istio-internal
), or if you experience any issues with your HTTP-01 challenges please read the notes on Ingress v1 compatibility.Major Themes
Removal of Deprecated APIs
In 1.7 the cert-manager API versions v1alpha2, v1alpha3, and v1beta1, that were deprecated in 1.5,
have been removed from the custom resource definitions (CRDs).
As a result, you will notice that the YAML manifest files are much smaller.
In this release we have added a new sub-command to the cert-manager CLI (
cmctl upgrade migrate-api-version
),which you SHOULD run BEFORE upgrading cert-manager to 1.7.
Please read [Removing Deprecated API Resources] for full instructions.
Additional Certificate Output Formats
additionalOutputFormats
is a field on the Certificatespec
that allowsspecifying additional supplementary formats of issued certificates and their
private key. There are currently two supported additional output formats:
CombinedPEM
(the PEM-encoded private key followed by the certificate chain)and
DER
(the DER-encoded private key only). Any combination of output formatscan be requested for the same certificate.
Read Additional Certificate Output Formats for more details and
thanks to @seuf for getting this across the line!
Server-Side Apply
This is the first version of cert-manager which relies on Server-Side Apply.
We use it to properly manage the annotations and labels on TLS secrets.
For this reason cert-manager 1.7 requires at least Kubernetes 1.18 (see
Supported Releases for further compatibility details).
Configuration Files
In this release we introduce a new configuration file for the cert-manager-webhook.
Instead of configuring the webhook using command line flags,
you can now modify the webhook Deployment to mount a ConfigMap
containing a configuration file.
Read the WebhookConfiguration Schema for more information.
In future releases we will introduce configuration files for the other cert-manager components:
the controller and the cainjector.
Developing cert-manager Without Bazel
In a future release, we'll remove the use of
bazel
for building and testing cert-manager,with the aim of making it as easy as possible for anyone to contribute and to get involved
with the cert-manager project.
The work is ongoing, but for now we've ensured that cert-manager 1.7 can be built with
go build
,and that all unit tests can be run with
go test ./cmd/... ./internal/... ./pkg/...
.Community
Thanks again to all open-source contributors with commits in this release, including:
And thanks as usual to coderanger for helping people
out on the [
#cert-manager
Slack channel][#cert-manager Slack channel]; it's a huge help and much appreciated.Changelog since v1.6.1
Changes by Kind
Feature
--acme-http01-solver-nameservers
flag to enable custom nameservers usage for ACME HTT01 challenges propagation checks. (#4287, @Adphi)cmctl upgrade migrate-api-version
to ensure all CRD resources are stored at 'v1' prior to upgrading to v1.7 onwards (#4711, @munnerz)additionalOutputFormats
parameter to allowDER
(binary) andCombinedPEM
(key + cert bundle) formats. (#4598, @seuf)prometheus.servicemonitor.honorLabels
, which sets thehonor_labels
field of the Prometheus scrape config. (#4608, @thirdeyenick)Bug or Regression
RunWebhookServer
(#4702, @devholic)cmctl version
to erroneously display the wrong webhook pod versions when older failed pods are present. (#4615, @johnwchadwick)kubernetes.io/ingress.class
annotation instead of thespec.ingressClassName
in created Ingress resources. (#4762, @jakexks)cmctl experimental install
command now uses the cert-manager namespace. This fixes a bug which was introduced in release 1.6 that caused cert-manager to be installed in the default namespace. (#4763, @wallrj)Other (Cleanup or Flake)
clock_time_seconds_gauge
metric which returns the current clock time, based on seconds since 1970/01/01 UTC (#4640, @JoshVanL)v1beta1
form the webhook'sadmissionReviewVersions
as cert-manager no longer supports v1.16 (#4639, @JoshVanL)Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.