Commit Graph

85 Commits

Author SHA1 Message Date
Luca Comellini
02297b4e56
Bump golang.org/x/crypto and golang.org/x/oauth2
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2023-01-05 17:58:22 +01:00
jetstack-bot
094b4c763e
Merge pull request #5662 from lucacome/bump-controller-tools
Bump sigs.k8s.io deps
2023-01-04 14:02:00 +00:00
Maël Valais
6403091073 update LICENSES (make update-licenses)
Signed-off-by: Maël Valais <mael@vls.dev>
2023-01-03 11:46:33 +01:00
Luca Comellini
dbd6dc9b16
Bump sigs.k8s.io deps
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-21 09:47:41 -08:00
jetstack-bot
8641c4a697
Merge pull request #5641 from cert-manager/dependabot/go_modules/helm.sh/helm/v3-3.10.3
Bump helm.sh/helm/v3 from 3.10.0 to 3.10.3
2022-12-20 18:31:35 +00:00
Ashley Davis
12e0e0a9eb
bump golang.org/x/net version to fix trivy vulns
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-20 11:57:39 +00:00
Tim Ramlot
ff6fec9088
Bumps [helm.sh/helm/v3](https://github.com/helm/helm) from 3.10.0 to 3.10.3.
- [Release notes](https://github.com/helm/helm/releases)
- [Commits](helm/helm@v3.10.0...v3.10.3)

---
updated-dependencies:
- dependency-name: helm.sh/helm/v3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-16 18:05:00 +01:00
Luca Comellini
bb252356a2
Update controller-runtime to v0.14.0
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00
Luca Comellini
c99c147059
Bump k8s.io deps to v0.26.0
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00
Ashley Davis
a099eb306a
bump dep versions to fix trivy-reported vulns
```text
{
  "VulnerabilityID": "CVE-2022-41717",
  "PkgName": "golang.org/x/net",
  "InstalledVersion": "v0.0.0-20220921155015-db77216a4ee9",
  "FixedVersion": "0.4.0",
  "Layer": {
    "DiffID": "sha256:629212d4fb1b47585329d1c630cb91f919ddcd6168031a07121953d6c6dbd438"
  },
  "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-41717",
  "DataSource": {
    "ID": "go-vulndb",
    "Name": "The Go Vulnerability Database",
    "URL": "https://github.com/golang/vulndb"
  },
  "Title": "An attacker can cause excessive memory growth in a Go server accepting ...",
  "Description": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
  "Severity": "UNKNOWN",
  "References": [
    "https://go.dev/cl/455635",
    "https://go.dev/cl/455717",
    "https://go.dev/issue/56350",
    "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
    "https://pkg.go.dev/vuln/GO-2022-1144"
  ],
  "PublishedDate": "2022-12-08T20:15:00Z",
  "LastModifiedDate": "2022-12-08T22:30:00Z"
}
```

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-12 11:12:33 +00:00
Ashley Davis
b8e51bc24c
fix x/text vuln and ignore AWS vuln
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-11-07 13:32:31 +00:00
Luca Comellini
4498b7cc47
Bump Go to 1.19
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-09-27 11:38:51 -07:00
Tim Ramlot
39fa9f51b4 upgrade dependencies
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-09-26 11:43:12 +02:00
Luca Comellini
97fbe24a74
Bump k8s.io dependencies
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-09-23 10:52:44 -07:00
Tim Ramlot
836793e7e3 upgrade gateway api to v0.5.0
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-08-08 08:52:59 +00:00
Tim Ramlot
9897f2355c upgrade ginkgo to v2
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-08-04 10:16:29 +00:00
Ashley Davis
2636a638bf
replace go-restful version with patched version
for details, see the comment on the `replace` directive

see also this slack thread:

https://kubernetes.slack.com/archives/CDEQJ0Q8M/p1659536441504649?thread_ts=1659532155.184479&cid=CDEQJ0Q8M

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-08-03 15:33:54 +01:00
Ashley Davis
6985cd5e5a
update containerd dependency to fix CVE
CVE-2022-31030 and GHSA-5ffw-gxpp-mxpf

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-08-03 15:25:05 +01:00
Ashley Davis
01d8994f38
remove replacement for /x/net and update /x/net + /x/sys
the replaced version had several CVEs as reported by Trivy:

CVE-2021-44716 - golang.org/x/net:
golang: net/http: limit growth of header canonicalization cache

CVE-2021-31525 - golang.org/x/net:
golang: net/http: panic in ReadRequest and ReadResponse when reading a
very large header

CVE-2022-29526 - golang.org/x/sys:
golang: syscall: faccessat checks wrong group

this commit fixes those reported CVEs

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-08-03 14:44:06 +01:00
irbekrm
5903c34cda Updates LICENSES
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-07-04 09:10:10 +01:00
Luca Comellini
aaa513de00
Bump k8s.io dependencies
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-06-30 15:16:14 -07:00
Ashley Davis
a6b2955747
update LICENSES file to new format
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-06-28 09:28:00 +01:00
Alessandro Vermeulen
1da01211ee Feature gated support for using literal subjects in Certificates
Signed-off-by: Alessandro Vermeulen <alessandro.vermeulen@ing.com>
2022-06-08 20:50:00 +02:00
Irbe Krumina
1d917ef311 Revert "Use Apply instead of Update to modify resources in tests"
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-05-03 11:31:47 +01:00
irbekrm
46233e5012 ./hack/update-all.sh
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-04-28 14:51:44 +01:00
irbekrm
4c901aefab Code review comments
Adds test conditions to certs via patch API call instead of update to avoid conflicts

Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-21 07:33:51 +00:00
irbekrm
ad746fae10 Bumps a bunch of deps
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-17 20:14:55 +00:00
James Munnelly
81f22fd49c Upgrade k8s.io dependencies to v0.23.1
Signed-off-by: James Munnelly <jmunnelly@apple.com>
2021-12-17 16:27:47 +00:00
Richard Wall
38fbd6cf4f ./hack/update-all.sh
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-01 12:41:15 +01:00
Richard Wall
00e0090ce7 ./hack/update-all.sh
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-01 10:22:35 +01:00
George Moldoveanu
0463681244
updates go deps and bazel files
Signed-off-by: George Moldoveanu <mol.george@gmail.com>
2021-09-02 23:45:11 +01:00
Inteon
b13eb0483b
upgrade deps to latest version (kube v0.22.0)
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-08-13 23:38:59 +02:00
Inteon
1e89e9a55b
upgrade go.mod
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-08-04 00:49:07 +02:00
Maël Valais
30f9c123d3 gateway-shim: add the gateway-shim controller
Note that the gateway-shim is only half the work for supporting the
Gateway API in cert-manager. The other half is the HTTP01 solver
support, which is still worked on.

The Gateway API in cert-manager is releases as an experimental feature
and needs to be enabled manually with the following flag:

  --controllers=*,gateway-shim

All the annotations supported by ingress-shim are also supported by
gateway-shim, with some exceptions:

  "acme.cert-manager.io/http01-ingress-class"

This annotation is not supported on the Gateway resource. Although the
Gateway resource also has a "gatewayClass" field, we will need to add
another field instead of "ingress-class" to avoid confusion with the
ingress-shim.

  "acme.cert-manager.io/http01-edit-in-place"

This annotation is not supported because it is specific to some ingress
controllers like ingress-gce.

  "kubernetes.io/tls-acme"

This annotation is not supported because it is a behavior inherited from
kube-lego and we chose not to keep this behavior with the Gateway API.

Unlike the ingress-shim, you can reuse the same Secret name in multiple
TLS configurations on the same Gateway resource.

The ingress-shim now shows the exact location of the duplicate
secretName when the user gives the same secretName in two separate TLS
blocks.

Signed-off-by: Maël Valais <mael@vls.dev>
Co-authored-by: Jake Sanders <i@am.so-aweso.me>
2021-07-15 20:34:55 +02:00
Inteon
b852735a95
upgrade ginkgo & gomega
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-10 20:52:09 +02:00
Inteon
cd92bf321f
centralise testing api-server & remove custom implementation
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-06 16:13:44 +02:00
Inteon
b4f65b47ed
update docs
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-02 14:56:10 +02:00
Inteon
1c4b511876
basic install and uninstall functionality
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-02 12:58:30 +02:00
Simon Sanladerer
f53109642e Cloudflare: refactor DNS01 challenge to use API for finding the nearest Zone
Signed-off-by: Simon Sanladerer <simon@sanladerer.com>
2021-07-01 02:36:46 +02:00
jetstack-bot
c1d7dcf8b5
Merge pull request #4007 from edglynes/3904_v2_API
Update Aka issuer to use v2 API
2021-05-21 12:34:25 +01:00
Edward Lynes
be0deb02a4 fix dependencies
Signed-off-by: Edward Lynes <elynes@akamai.com>
2021-05-18 13:07:42 -04:00
Tamal Saha
2609aa51e1 Use gomodules.xyz/jsonpatch instead of mattbaird/jsonpatch
Signed-off-by: Tamal Saha <tamal@appscode.com>
2021-05-17 13:05:19 -07:00
Tamal Saha
b1cb6422e4 Use controller-runtime v0.9.0-beta.0
Signed-off-by: Tamal Saha <tamal@appscode.com>
2021-05-17 08:11:19 -07:00
Tamal Saha
da86194a9d Update to k8s 1.21.0 tool chain
Signed-off-by: Tamal Saha <tamal@appscode.com>
2021-05-17 08:11:19 -07:00
Jake Sanders
79d8d9cb7b
Revert "Merge pull request #3724 from inteon/istio-virtualservice-for-http01"
This reverts commit 80f27739b5, reversing
changes made to 96604d02a3.

Signed-off-by: Jake Sanders <i@am.so-aweso.me>
2021-05-11 14:50:25 +01:00
Inteon
624e2b9e69 add ACME HTTP01 Istio support
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-04-28 09:19:53 +02:00
irbekrm
09af959071 Issuer's ACME EAB algorithm can no longer be set
It is hardcoded to HS256 in golang.org/x/crypto

Also, we now use a fork of golang.org/x/crypto
in cert-manager org.

Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-04-09 10:28:19 +01:00
Tharun
b4df9b3567 removed gorilla mux and used profiling util
Signed-off-by: Tharun <rajendrantharun@live.com>
2020-12-11 17:54:55 +05:30
Richard Wall
f3f321bbbc Update to vcert v4.11.0
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2020-10-08 15:02:50 +01:00
Maartje Eyskens
4d8a56466d Bump dependancies
Signed-off-by: Maartje Eyskens <maartje@eyskens.me>
2020-09-25 14:27:26 +02:00