Commit Graph

809 Commits

Author SHA1 Message Date
jetstack-bot
a64088792d
Merge pull request #5991 from inteon/pr/JoshVanL/4810
Server Side Apply: Adds support for CA Injector controller
2023-05-05 14:21:07 +01:00
jetstack-bot
5035dda25e
Merge pull request #6006 from vidarno/cache-private-key-hash-on-issuer-status
Cache private key hash on issuer status
2023-05-05 08:05:07 +01:00
jetstack-bot
09e71c37d4
Merge pull request #5972 from vinzent/bugfix/issue-5755
Check JKS/PKCS12 truststore in Secrets only if issuer provides the CA
2023-05-04 11:04:37 +01:00
vidarno
a1f156c2b6 Merge branch 'cert-manager:master' into cache-private-key-hash-on-issuer-status
Signed-off-by: vidarno <>
2023-05-02 11:58:18 +02:00
vidarno
4934183927 Extend CRDs and structs to include LastPrivateKeyHash field
Signed-off-by: vidarno <>
2023-04-29 09:12:56 +02:00
Ashley Davis
40d8c0e4ec
fix broken links in values.yaml
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-04-27 16:32:34 +01:00
Thomas Müller
12483d3d54 Check JKS/PKCS12 truststores only if issuer provides the CA
The current policy check for keystores in Secrets creates a loop because
the truststore.jks or truststore.p12 will never exist when the issuer didn't
provide the CA certificate. This behaviour was introduced by #5597

The JKS and PKCS12 truststores are only added to the Secret
if the CA is provided by the issuer. The CertificateRequest API
reference states:

> The PEM encoded x509 certificate of the signer, also known
> as the CA (Certificate Authority). This is set on a best-effort basis by
> different issuers. If not set, the CA is assumed to be unknown/not available.

This change will only check the PKCS12/JKS truststores if the CA cert from the
issuer exists in the secret.

Fixes #5755

Signed-off-by: Thomas Müller <thomas@chaschperli.ch>
2023-04-27 17:09:41 +02:00
jetstack-bot
19104fcb4a
Merge pull request #5962 from wallrj/5670-controller-manager-liveness-probe
Report controller-manager as unhealthy if leader election has failed to renew the lease but process is wedged
2023-04-27 15:09:54 +01:00
Richard Wall
300d89a6cd Disable the controller liveness probe by default
And allow configuration via Helm chart values

Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-04-27 13:34:25 +01:00
Tim Ramlot
927cef3c22
switch to SSA for cainjector
Co-authored-by: joshvanl <vleeuwenjoshua@gmail.com>
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2023-04-26 17:04:11 +02:00
Richard Wall
b92482e041 Use a named port
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-04-26 13:04:52 +01:00
Richard Wall
4288fc02e8 Don't specify the livenessprobe host
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-04-26 12:42:34 +01:00
Richard Wall
4d182e9c7b Add /livez endpoint which reports the leaderElection status
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-04-26 07:53:26 +01:00
irbekrm
c4d6231dfa Bump min kube version requirement
Signed-off-by: irbekrm <irbekrm@gmail.com>
2023-04-24 08:49:49 +01:00
jetstack-bot
e96ad41462
Merge pull request #3931 from e96wic/pdbs
Added PodDisruptionBudgets to helm chart
2023-04-08 11:30:21 +01:00
irbekrm
b2b3eade26 Updates cert.status.lastFailureTime description
To match the current behaviour

Signed-off-by: irbekrm <irbekrm@gmail.com>
2023-04-05 12:54:14 +01:00
Ole Furseth
f5eff1f318 Remove obsolete bazel documentation
Signed-off-by: Ole Furseth <ole.furseth@bekk.no>
2023-03-17 11:44:15 +01:00
Maël Valais
f0449ddb3b ingressClassName: document the "oneOf" contraint for the "name" field
Signed-off-by: Maël Valais <mael@vls.dev>
2023-03-09 15:15:39 +01:00
Maël Valais
ca9aaa0440 ingressClassName: let's remove the link placeholder
The link itself is way too long to fit in the API reference.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-03-09 14:42:21 +01:00
Tim Ramlot
d93f26df28
fix Helm errors and simplify
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Eike Wichern
1c24345092
Adjusted to code-review comments
Signed-off-by: Eike Wichern <13048266+e96wic@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Eike Wichern
f96dba6f2f
Migrated to policy/v1
Signed-off-by: Eike Wichern <13048266+e96wic@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Eike Wichern
629deb14b0
PDBs can be edited per service; extended readme
Signed-off-by: Eike Wichern <13048266+e96wic@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Eike Wichern
9c16cdd711
Added PodDisruptionBudgets to helm chart
Signed-off-by: Eike Wichern <13048266+e96wic@users.noreply.github.com>
2023-03-07 10:04:32 +01:00
Maël Valais
6458ed1543 Move from a flag to the Issuer field "ingressClassName"
Signed-off-by: Maël Valais <mael@vls.dev>
2023-03-03 17:50:30 +01:00
jetstack-bot
4a7fa90710
Merge pull request #5801 from malovme/solver-image-pull-secret
Add imagePullSecrets for AMCE http01 solver pod
2023-02-14 08:55:51 +00:00
jetstack-bot
55b8153643
Merge pull request #5788 from ExNG/dev/jbh/add-kubernetes-api-to-egress
Add 6443/TCP to webhook egress NetworkPolicy
2023-02-13 15:20:40 +00:00
Michael Malov
dc621e9306 Add imagePullSecrets for AMCE http01 solver pod
Signed-off-by: Michael Malov <mmeemail@gmail.com>
2023-02-13 14:18:50 +03:00
Johann Behr
ea5c7b3bfd
Update deploy/charts/cert-manager/values.yaml
Co-authored-by: Maël Valais <mael@vls.dev>
Signed-off-by: Johann Behr <24767736+ExNG@users.noreply.github.com>
2023-02-10 14:43:06 +01:00
Johann Behr
d9a68bee40
Add 6443/TCP to webhook egress NetworkPolicy
Signed-off-by: Johann Behr <j.behr@avm.de>
2023-02-09 11:46:15 +01:00
Maël Valais
bfce543640 serviceAccountRef: remove aud and exp, secretRef now a pointer
Changing SecretRef to be a pointer will break people using the package as
a library.

I disabled the ability to set the audience and expiry time for security
reasons:

We decided to generate the audience dynamically instead of letting the
user configure it, and we also decided to encode the namespace and
issuer name into the audience to remediate the risk of hijacking an
existing issuer and service account with a malicious issuer.

Regarding the expiration duration of the JWT, it doesn't make sense to
let the user configure it since cert-manager will authenticate using the
JWT and immediately discard it. We thought that 1 minute would be
acceptable, although the Kubernetes API server may return a totally
different duration.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-02-06 18:28:49 +01:00
Maël Valais
76eef68730 serviceAccountRef: the vault issuer can now use bound SA tokens
Previously, the Vault issuer was only able to use a Secret in order to
use the "Kubernetes authentication" method. The downside to this service
account Secret token is that it has the default JWT iss
"kubernetes/serviceaccount" (along with the fact that the token is not
bound to a particular pod and has no expiry).

With the new serviceAccountRef, cert-manager now requests the token on
behalf of the pod in order to authenticate with Vault.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-02-06 18:28:49 +01:00
Tim Ramlot
3978597320
Cleaning up a checks
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2023-01-24 09:50:56 +01:00
Aaron Aichlmayr
1d7e360ea4
Cleaning up a check
Co-authored-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Signed-off-by: Aaron Aichlmayr <waterfoul@gmail.com>
2023-01-23 16:36:01 -06:00
Aaron Aichlmayr
b967232e7b
Fixed a few indents
Signed-off-by: Aaron Aichlmayr <aaichlmayr@conquestcyber.com>
2023-01-16 10:29:11 -06:00
Aaron Aichlmayr
0ce3553e7f
Adding the ability to set volumes and volumeMounts to all pods
Signed-off-by: Aaron Aichlmayr <aaichlmayr@conquestcyber.com>
2023-01-16 10:29:11 -06:00
Jan-Otto Kröpke
b952058775
[helm] expose enable-certificate-owner-ref and -dns01-recursive-nameservers as helm value
Signed-off-by: Jan-Otto Kröpke <mail@jkroepke.de>
2023-01-14 15:16:16 +01:00
Ashley Davis
264ebe6d29
move custom acmesolver image above extraArgs
since the acmesolver image has defaults (i.e. the repository is set by
default[1]), the helm chart changes introduced in #5554 will always set
the `--acme-http01-solver-image` parameter.

This can break users who previously had this parameter set via the
extraArgs Helm option, which was found and reported on Slack[2].

This commit moves the new Helm value added in #5554 above extraArgs,
so that if extraArgs is set it will take precedence and nothing should
change as users upgrade.

[1] a5d67d3a21/deploy/charts/cert-manager/values.yaml (L504-L516)
[2] https://kubernetes.slack.com/archives/CDEQJ0Q8M/p1672925692339849

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-01-05 16:42:57 +00:00
jetstack-bot
094b4c763e
Merge pull request #5662 from lucacome/bump-controller-tools
Bump sigs.k8s.io deps
2023-01-04 14:02:00 +00:00
jetstack-bot
2a7fabd5ca
Merge pull request #5554 from camptocamp/helm-add-acme-http01-solver-image-override-option
helm: add option to override ACME HTTP-01 solver image
2022-12-22 10:10:13 +00:00
Yann Soubeyrand
ea0bea9db0 helm: add option to override ACME HTTP-01 solver image
Signed-off-by: Yann Soubeyrand <yann.soubeyrand@camptocamp.com>
2022-12-21 19:48:11 +01:00
Luca Comellini
dbd6dc9b16
Bump sigs.k8s.io deps
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-21 09:47:41 -08:00
Ashley Davis
1a63cba52a
Bump supported versions of k8s mentioned in the helm chart
This reflects the latest supported releases as of an update on
2022-12-16

See https://github.com/cert-manager/website/pull/1131

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-21 17:17:21 +00:00
Ashley Davis
c5924f54a1
add + use CABundle field for ACME servers in issuers
Previously it wasn't possible to set a custom CA bundle for an ACME
server, leading users to either patch the cert-manager system CA bundle
manually or else use SkipTLSVerify which is a security issue.

This adds CABundle for ACME, similar to what we have for Vault and
Venafi TPP issuers.

Longer term we'd like to have a more fully featured approach. It would
for example make sense to support loading CA bundles from ConfigMaps or
Secrets (similar to what we do for Vault issuers today), but for now this
change is the simplest change.

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-15 16:21:07 +00:00
Ashley Davis
f68693bb6a
change wording on descriptions for Vault and TPP 'CABundle' fields
Clarifies language a little; makes it clearer that the bundle
should be base64 encoded. Previously it was slightly confusing
in that PEM certificates are themselves base64 encoded.

Also makes it clearer what our CABundle validation does and does not do
by adding a standalone validation function and tweaking the error
message for an invalid CA bundle.

Also updates validation to not print CA bundle for Vault issuer when the
bundle is invalid, since it won't help with debugging anything.
Currently the bundle is printed as byte values ("0x32, 0x58, 0x43...")
and in any case printing the whole bundle could be noisy if it's large

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-15 16:21:02 +00:00
lv
2f0d492036 feat: Add max-concurrent-challenges parameter to helm
Set the max-concurrent-challenges value with -set maxConcurrentChallenges=value when deploying with helm

Fixes: https://github.com/cert-manager/cert-manager/issues/5627
Signed-off-by: lvyanru <yanru.lv@daocloud.io>
2022-12-13 18:15:16 +08:00
Yannic Kilcher
5ce5129a3c
Fixed a typo in helm chart values
Signed-off-by: Yannic Kilcher <yk@users.noreply.github.com>
2022-12-09 11:55:33 +01:00
Sathyanarayanan Saravanamuthu
5aabf62585 Updating CRDs
Signed-off-by: Sathyanarayanan Saravanamuthu <sathyanarays@vmware.com>
2022-12-06 18:54:46 +05:30
irbekrm
486c72f122 Update reference to HTTPRoute docs
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-12-05 15:04:18 +00:00
lv
bf2db73f71 fix: featureGates add webhook deployment in chart yaml
Signed-off-by: lvyanru <1113706590@qq.com>
2022-11-17 22:11:57 +08:00