Commit Graph

817 Commits

Author SHA1 Message Date
jetstack-bot
8eb032a95a
Merge pull request #6110 from jkroepke/serviceMonitor
[helm] Add prometheus.servicemonitor.endpointAdditionalProperties
2023-06-26 11:29:55 +02:00
jetstack-bot
f9ffb76c5c
Merge pull request #6129 from cert-manager/remove_name_selector_admission_webhook
Remove unused 'name' namespaceSelector
2023-06-21 14:01:19 +02:00
schrodit
a3c6261c38 disable service links on status api job
Signed-off-by: schrodit <mail@timschrodi.tech>
2023-06-12 14:09:36 +02:00
schrodit
c70be0a28b Disable service links in helm charts
Signed-off-by: schrodit <mail@timschrodi.tech>
2023-06-12 13:33:55 +02:00
Tim Ramlot
a945ab3378
remove unused 'name' namespaceSelector
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2023-06-03 09:54:33 +02:00
Jan-Otto Kröpke
d62eb71460
[helm] Add prometheus.servicemonitor.endpointAdditionalProperties
Signed-off-by: Jan-Otto Kröpke <mail@jkroepke.de>
2023-05-26 16:50:28 +02:00
Tim Ramlot
55ebaa31b5
fix typo
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2023-05-24 12:19:22 +02:00
irbekrm
acf07419f5 Fix a bug in helm chart where webhook had controller feature gates passed
This will break anyone who relied on featureGates field to pass feature gates to webhook- they will need to use the new webhook.featureGates field

Signed-off-by: irbekrm <irbekrm@gmail.com>
2023-05-23 12:44:31 +01:00
jetstack-bot
a64088792d
Merge pull request #5991 from inteon/pr/JoshVanL/4810
Server Side Apply: Adds support for CA Injector controller
2023-05-05 14:21:07 +01:00
jetstack-bot
5035dda25e
Merge pull request #6006 from vidarno/cache-private-key-hash-on-issuer-status
Cache private key hash on issuer status
2023-05-05 08:05:07 +01:00
jetstack-bot
09e71c37d4
Merge pull request #5972 from vinzent/bugfix/issue-5755
Check JKS/PKCS12 truststore in Secrets only if issuer provides the CA
2023-05-04 11:04:37 +01:00
vidarno
a1f156c2b6 Merge branch 'cert-manager:master' into cache-private-key-hash-on-issuer-status
Signed-off-by: vidarno <>
2023-05-02 11:58:18 +02:00
vidarno
4934183927 Extend CRDs and structs to include LastPrivateKeyHash field
Signed-off-by: vidarno <>
2023-04-29 09:12:56 +02:00
Ashley Davis
40d8c0e4ec
fix broken links in values.yaml
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-04-27 16:32:34 +01:00
Thomas Müller
12483d3d54 Check JKS/PKCS12 truststores only if issuer provides the CA
The current policy check for keystores in Secrets creates a loop because
the truststore.jks or truststore.p12 will never exist when the issuer didn't
provide the CA certificate. This behaviour was introduced by #5597

The JKS and PKCS12 truststores are only added to the Secret
if the CA is provided by the issuer. The CertificateRequest API
reference states:

> The PEM encoded x509 certificate of the signer, also known
> as the CA (Certificate Authority). This is set on a best-effort basis by
> different issuers. If not set, the CA is assumed to be unknown/not available.

This change will only check the PKCS12/JKS truststores if the CA cert from the
issuer exists in the secret.

Fixes #5755

Signed-off-by: Thomas Müller <thomas@chaschperli.ch>
2023-04-27 17:09:41 +02:00
jetstack-bot
19104fcb4a
Merge pull request #5962 from wallrj/5670-controller-manager-liveness-probe
Report controller-manager as unhealthy if leader election has failed to renew the lease but process is wedged
2023-04-27 15:09:54 +01:00
Richard Wall
300d89a6cd Disable the controller liveness probe by default
And allow configuration via Helm chart values

Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-04-27 13:34:25 +01:00
Tim Ramlot
927cef3c22
switch to SSA for cainjector
Co-authored-by: joshvanl <vleeuwenjoshua@gmail.com>
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2023-04-26 17:04:11 +02:00
Richard Wall
b92482e041 Use a named port
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-04-26 13:04:52 +01:00
Richard Wall
4288fc02e8 Don't specify the livenessprobe host
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-04-26 12:42:34 +01:00
Richard Wall
4d182e9c7b Add /livez endpoint which reports the leaderElection status
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-04-26 07:53:26 +01:00
irbekrm
c4d6231dfa Bump min kube version requirement
Signed-off-by: irbekrm <irbekrm@gmail.com>
2023-04-24 08:49:49 +01:00
jetstack-bot
e96ad41462
Merge pull request #3931 from e96wic/pdbs
Added PodDisruptionBudgets to helm chart
2023-04-08 11:30:21 +01:00
irbekrm
b2b3eade26 Updates cert.status.lastFailureTime description
To match the current behaviour

Signed-off-by: irbekrm <irbekrm@gmail.com>
2023-04-05 12:54:14 +01:00
Ole Furseth
f5eff1f318 Remove obsolete bazel documentation
Signed-off-by: Ole Furseth <ole.furseth@bekk.no>
2023-03-17 11:44:15 +01:00
Maël Valais
f0449ddb3b ingressClassName: document the "oneOf" contraint for the "name" field
Signed-off-by: Maël Valais <mael@vls.dev>
2023-03-09 15:15:39 +01:00
Maël Valais
ca9aaa0440 ingressClassName: let's remove the link placeholder
The link itself is way too long to fit in the API reference.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-03-09 14:42:21 +01:00
Tim Ramlot
d93f26df28
fix Helm errors and simplify
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Eike Wichern
1c24345092
Adjusted to code-review comments
Signed-off-by: Eike Wichern <13048266+e96wic@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Eike Wichern
f96dba6f2f
Migrated to policy/v1
Signed-off-by: Eike Wichern <13048266+e96wic@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Eike Wichern
629deb14b0
PDBs can be edited per service; extended readme
Signed-off-by: Eike Wichern <13048266+e96wic@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Eike Wichern
9c16cdd711
Added PodDisruptionBudgets to helm chart
Signed-off-by: Eike Wichern <13048266+e96wic@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Maël Valais
6458ed1543 Move from a flag to the Issuer field "ingressClassName"
Signed-off-by: Maël Valais <mael@vls.dev>
2023-03-03 17:50:30 +01:00
jetstack-bot
4a7fa90710
Merge pull request #5801 from malovme/solver-image-pull-secret
Add imagePullSecrets for AMCE http01 solver pod
2023-02-14 08:55:51 +00:00
jetstack-bot
55b8153643
Merge pull request #5788 from ExNG/dev/jbh/add-kubernetes-api-to-egress
Add 6443/TCP to webhook egress NetworkPolicy
2023-02-13 15:20:40 +00:00
Michael Malov
dc621e9306 Add imagePullSecrets for AMCE http01 solver pod
Signed-off-by: Michael Malov <mmeemail@gmail.com>
2023-02-13 14:18:50 +03:00
Johann Behr
ea5c7b3bfd
Update deploy/charts/cert-manager/values.yaml
Co-authored-by: Maël Valais <mael@vls.dev>
Signed-off-by: Johann Behr <24767736+ExNG@users.noreply.github.com>
2023-02-10 14:43:06 +01:00
Johann Behr
d9a68bee40
Add 6443/TCP to webhook egress NetworkPolicy
Signed-off-by: Johann Behr <j.behr@avm.de>
2023-02-09 11:46:15 +01:00
Maël Valais
bfce543640 serviceAccountRef: remove aud and exp, secretRef now a pointer
Changing SecretRef to be a pointer will break people using the package as
a library.

I disabled the ability to set the audience and expiry time for security
reasons:

We decided to generate the audience dynamically instead of letting the
user configure it, and we also decided to encode the namespace and
issuer name into the audience to remediate the risk of hijacking an
existing issuer and service account with a malicious issuer.

Regarding the expiration duration of the JWT, it doesn't make sense to
let the user configure it since cert-manager will authenticate using the
JWT and immediately discard it. We thought that 1 minute would be
acceptable, although the Kubernetes API server may return a totally
different duration.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-02-06 18:28:49 +01:00
Maël Valais
76eef68730 serviceAccountRef: the vault issuer can now use bound SA tokens
Previously, the Vault issuer was only able to use a Secret in order to
use the "Kubernetes authentication" method. The downside to this service
account Secret token is that it has the default JWT iss
"kubernetes/serviceaccount" (along with the fact that the token is not
bound to a particular pod and has no expiry).

With the new serviceAccountRef, cert-manager now requests the token on
behalf of the pod in order to authenticate with Vault.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-02-06 18:28:49 +01:00
Tim Ramlot
3978597320
Cleaning up a checks
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2023-01-24 09:50:56 +01:00
Aaron Aichlmayr
1d7e360ea4
Cleaning up a check
Co-authored-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Signed-off-by: Aaron Aichlmayr <waterfoul@gmail.com>
2023-01-23 16:36:01 -06:00
Aaron Aichlmayr
b967232e7b
Fixed a few indents
Signed-off-by: Aaron Aichlmayr <aaichlmayr@conquestcyber.com>
2023-01-16 10:29:11 -06:00
Aaron Aichlmayr
0ce3553e7f
Adding the ability to set volumes and volumeMounts to all pods
Signed-off-by: Aaron Aichlmayr <aaichlmayr@conquestcyber.com>
2023-01-16 10:29:11 -06:00
Jan-Otto Kröpke
b952058775
[helm] expose enable-certificate-owner-ref and -dns01-recursive-nameservers as helm value
Signed-off-by: Jan-Otto Kröpke <mail@jkroepke.de>
2023-01-14 15:16:16 +01:00
Ashley Davis
264ebe6d29
move custom acmesolver image above extraArgs
since the acmesolver image has defaults (i.e. the repository is set by
default[1]), the helm chart changes introduced in #5554 will always set
the `--acme-http01-solver-image` parameter.

This can break users who previously had this parameter set via the
extraArgs Helm option, which was found and reported on Slack[2].

This commit moves the new Helm value added in #5554 above extraArgs,
so that if extraArgs is set it will take precedence and nothing should
change as users upgrade.

[1] a5d67d3a21/deploy/charts/cert-manager/values.yaml (L504-L516)
[2] https://kubernetes.slack.com/archives/CDEQJ0Q8M/p1672925692339849

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-01-05 16:42:57 +00:00
jetstack-bot
094b4c763e
Merge pull request #5662 from lucacome/bump-controller-tools
Bump sigs.k8s.io deps
2023-01-04 14:02:00 +00:00
jetstack-bot
2a7fabd5ca
Merge pull request #5554 from camptocamp/helm-add-acme-http01-solver-image-override-option
helm: add option to override ACME HTTP-01 solver image
2022-12-22 10:10:13 +00:00
Yann Soubeyrand
ea0bea9db0 helm: add option to override ACME HTTP-01 solver image
Signed-off-by: Yann Soubeyrand <yann.soubeyrand@camptocamp.com>
2022-12-21 19:48:11 +01:00
Luca Comellini
dbd6dc9b16
Bump sigs.k8s.io deps
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-21 09:47:41 -08:00