Jake Sanders
0d93b93fc5
Feature: Support both v1 and v1beta1 ingresses.
...
Kubernetes is removing support for the v1beta1 Ingress type in 1.22: https://kubernetes.io/blog/2021/07/14/upcoming-changes-in-kubernetes-1-22/#api-changes
However, we still wish to support k8s v1.16 until mid 2022 when Openshift 3 becomes out of support.
cert-manager will now use v1 Ingress if available by using the discovery API.
Signed-off-by: Jake Sanders <i@am.so-aweso.me>
2021-07-26 18:29:42 +01:00
jetstack-bot
da702acb58
Merge pull request #3646 from JoshVanL/design-certificates.k8s.io-adoption
...
DESIGN: certificates.k8s.io Adoption
2021-07-26 17:14:13 +01:00
jetstack-bot
f278903c4e
Merge pull request #4239 from inteon/fix_flakes
...
Resolve test flakes "the object has been modified"
2021-07-26 14:47:12 +01:00
joshvanl
696356b702
Update certificates.k8s.io-adoption design to include changes which have
...
been implemented
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-26 14:20:18 +01:00
jetstack-bot
ceb9fdf6ac
Merge pull request #4231 from maelvls/fix-concurrent-read-write
...
Data race: fix concurrent read and write of secret annotations and certificaterequests
2021-07-26 13:34:12 +01:00
joshvanl
68a065e34f
Updates from meeting
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-26 13:29:50 +01:00
joshvanl
eeef422165
Adds some minor spelling and grammar
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-26 13:29:50 +01:00
joshvanl
52a2ae599d
Updates the design proposal from team discussions
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-26 13:29:50 +01:00
joshvanl
686a33ca74
Add a section as to _why_ I am proposing this approach
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-26 13:29:49 +01:00
joshvanl
5f98ba69f4
Adds certificates.k8s.io Adoptions Design Document
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-26 13:29:49 +01:00
jetstack-bot
218408a741
Merge pull request #4112 from JoshVanL/certificate-signing-request=acme
...
CertificateSigningRequest ACME Controller
2021-07-26 11:51:12 +01:00
jetstack-bot
1021b58286
Merge pull request #4233 from maelvls/goroutine-leak
...
Memory leak: fix the scheduler's goroutine leakage
2021-07-23 20:34:19 +01:00
joshvanl
247807162f
Expect event fired when ACME CSR request is not yet approved
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:34:21 +01:00
jetstack-bot
77c5c2fb16
Merge pull request #4184 from inteon/kubectl_certmanager_install_tests
...
Add basic tests to kubectl cert-manager x install
2021-07-23 16:16:19 +01:00
joshvanl
a81ba4fcb3
Change test name to make it clear it is not a duplicate
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:10:35 +01:00
joshvanl
e18e29ea45
Adds unit tests for CertificateSigningRequest ACME handle owner
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:00:09 +01:00
joshvanl
9e322a4033
Removes old comment which is no longer relevant
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:00:09 +01:00
joshvanl
b84e3edcc9
Review comments
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:00:09 +01:00
joshvanl
bec5d5be32
Remove CA annotation from ACME CertificateSigningRequest controller
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:00:09 +01:00
joshvanl
2a1952c918
Adds ACME CSR to E2E conformance test suite
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:00:09 +01:00
joshvanl
1284f358d0
Adds missing required feature to CommonName CSR E2E test
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:00:09 +01:00
joshvanl
c9f5cbd0bc
Adds more modifier funcs to Order in unit gen
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:00:09 +01:00
joshvanl
b041a8fb3d
Wires up ACME CSR controller
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:00:09 +01:00
joshvanl
43f002b0f0
Adds CertificateSigningRequest ACME controller
...
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2021-07-23 16:00:09 +01:00
Maël Valais
641960b666
memory leak: clean up scheduler goroutine on certificate deletion
...
Signed-off-by: Maël Valais <mael@vls.dev>
2021-07-23 16:57:10 +02:00
Inteon
0ed0135930
Improvements based on reviewer's feedback
...
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-23 15:29:43 +02:00
jetstack-bot
9ad9e220f3
Merge pull request #4230 from inteon/fix_exit_codes
...
set correct exit codes
2021-07-23 13:06:09 +01:00
jetstack-bot
3ee37e893d
Merge pull request #4229 from JoshVanL/certificate-signing-request=event-not-approved
...
Fire event when CertificateSigningRequest hasn't been Approved yet
2021-07-23 12:23:08 +01:00
jetstack-bot
5ebcbced5c
Merge pull request #4240 from irbekrm/k8s_1_22
...
Adds an option to build k8s 1.22 kind cluster
2021-07-23 09:26:09 +01:00
irbekrm
5edad74e8a
Ensure jq is available
...
Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-07-22 20:53:39 +01:00
Inteon
50daf04118
rename cmdutil to k8scmdutil
...
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-22 21:43:53 +02:00
Maël Valais
62bc854467
e2e: sample-external-issuer v0.1.0 -> v0.1.1 (1.22 compatibility)
...
Signed-off-by: Maël Valais <mael@vls.dev>
2021-07-22 21:13:39 +02:00
irbekrm
63873ab8a9
Bump e2e test NGINX ingress Helm chart version
...
Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-07-22 20:08:05 +01:00
irbekrm
5e83e35b7c
Allow for ./setup-e2e-deps.sh script to be run locally against k8s v1.22
...
Without specifying Kubernetes version
Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-07-22 20:07:37 +01:00
irbekrm
84f653f01f
e2e test setup installs a different version of Ingress depending on k8s version
...
This is needed because there are no NGINX ingress release that would support work both on k8s v1.16-v1.18 as well as v1.22
Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-07-22 19:35:57 +01:00
irbekrm
00542dd7f6
Bump apiregistration API version to v1
...
Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-07-22 17:19:27 +01:00
irbekrm
69afd75e9a
Adds an option to build k8s 1.22 kind cluster
...
Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-07-22 16:08:22 +01:00
Inteon
c377e0e0cd
add comments
...
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-22 13:08:11 +02:00
Inteon
d6cd6f457d
set correct exit codes when exiting
...
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-22 12:57:08 +02:00
Inteon
ac677964c1
resolve test flakes 'the object has been modified'
...
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-22 10:10:39 +02:00
jetstack-bot
05cfd7bb72
Merge pull request #4218 from inteon/verify_upgrade_use_check_api
...
Use 'kubectl cert-manager check api' in verify-upgrade.sh
2021-07-21 20:37:20 +01:00
jetstack-bot
8ea29ba49a
Merge pull request #4237 from SgtCoDFish/parsechaintest
...
Fix check for self-signed certs in EncodeX509Chain
2021-07-21 17:49:20 +01:00
Ashley Davis
17ec9ea8e7
fix check for self-signed certs in EncodeX509Chain
...
see also https://github.com/jetstack/cert-manager/issues/4142
EncodeX509Chain checked for self-signed certs by comparing the subject
and issuer of the cert in question, which is invalid since it's
perfectly fine for those to match.
the correct behavior is to use cert.CheckSignatureFrom(cert). this bug
was exposed in 1.4 when ParseSingleCertificateChain started using
EncodeX509Chain in the critical path of several issuers; when end-users
had leaf certificates with subjects matching their issuer's subject, the
bug was triggered.
includes newly written tests for EncodeX509Chain and a test for
ParseSingleCertificateChain
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2021-07-21 16:45:48 +01:00
jetstack-bot
f489c7df02
Merge pull request #4236 from irbekrm/fix_version_finding
...
Fix how last published release version is calculated for upgrade tests
2021-07-21 15:15:20 +01:00
Ashley Davis
31360580f0
Merge pull request #4232 from SgtCoDFish/cabasicconstraint_e2e
...
CA Basic Constraint checks in e2e tests
2021-07-21 14:10:03 +01:00
irbekrm
48d4f955ea
Fix how last published release is calculated
...
It should always be the last published non-alpha/beta release
Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-07-21 13:58:44 +01:00
Maël Valais
8e872632f4
memory leak: the afterFunc goroutine now stops properly
...
Signed-off-by: Maël Valais <mael@vls.dev>
2021-07-21 10:25:56 +02:00
Maël Valais
eb947f98ea
memory leak: add unit test to show scheduler leaking goroutines
...
Signed-off-by: Maël Valais <mael@vls.dev>
2021-07-21 10:25:49 +02:00
Maël Valais
af9a1e434f
data race: fix certificate requests in cache being mutated
...
Signed-off-by: Maël Valais <mael@vls.dev>
2021-07-20 19:50:26 +02:00
Maël Valais
a96dc55e1e
data race: fix concurrent read and write of secret annotations
...
This bug can be reproduced using "go run -race" and by creating many
Certificates and renewing them continuously. With 5000 Certificate
objects, a data race is found in less than a minute.
Signed-off-by: Maël Valais <mael@vls.dev>
2021-07-20 19:50:26 +02:00