Commit Graph

164 Commits

Author SHA1 Message Date
Luca Comellini
85ca8e0444
Bump dependencies
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2023-01-13 09:55:27 -08:00
Ashley Davis
8c4f6cda42
bump containerd to fix reported vuln
note that cert-manager is not actually vulnerable to CVE-2022-23471
since the affected code is not used

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-01-09 18:47:38 +00:00
Luca Comellini
02297b4e56
Bump golang.org/x/crypto and golang.org/x/oauth2
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2023-01-05 17:58:22 +01:00
jetstack-bot
094b4c763e
Merge pull request #5662 from lucacome/bump-controller-tools
Bump sigs.k8s.io deps
2023-01-04 14:02:00 +00:00
Maël Valais
6403091073 update LICENSES (make update-licenses)
Signed-off-by: Maël Valais <mael@vls.dev>
2023-01-03 11:46:33 +01:00
Maël Valais
dcab0d2e3f vcert: upgrade to v4.23.0 to fix "Click Retry" and "WebSDK CertRequest"
cert-manager was not able to retry failed TPP certificates due to the
fact that TPP will not reset a given certificate that has a failed
enrollment status from a previous enrollment. More specifically,
cert-manager was getting stuck with either:

    WebSDK CertRequest Module Requested Certificate

or

    This certificate cannot be processed while it is in an error state.
    Fix any errors, and then click Retry.

With vcert v4.23.0, a call to "reset" is made when one of these two
messages are found while polling for the certificate (i.e., while
calling vcert's RetrieveCertificate function).

Signed-off-by: Maël Valais <mael@vls.dev>
2023-01-02 13:21:46 +01:00
Luca Comellini
dbd6dc9b16
Bump sigs.k8s.io deps
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-21 09:47:41 -08:00
jetstack-bot
8641c4a697
Merge pull request #5641 from cert-manager/dependabot/go_modules/helm.sh/helm/v3-3.10.3
Bump helm.sh/helm/v3 from 3.10.0 to 3.10.3
2022-12-20 18:31:35 +00:00
Ashley Davis
12e0e0a9eb
bump golang.org/x/net version to fix trivy vulns
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-20 11:57:39 +00:00
Tim Ramlot
ff6fec9088
Bumps [helm.sh/helm/v3](https://github.com/helm/helm) from 3.10.0 to 3.10.3.
- [Release notes](https://github.com/helm/helm/releases)
- [Commits](helm/helm@v3.10.0...v3.10.3)

---
updated-dependencies:
- dependency-name: helm.sh/helm/v3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-16 18:05:00 +01:00
Luca Comellini
bb252356a2
Update controller-runtime to v0.14.0
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00
Luca Comellini
c99c147059
Bump k8s.io deps to v0.26.0
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00
Ashley Davis
a099eb306a
bump dep versions to fix trivy-reported vulns
```text
{
  "VulnerabilityID": "CVE-2022-41717",
  "PkgName": "golang.org/x/net",
  "InstalledVersion": "v0.0.0-20220921155015-db77216a4ee9",
  "FixedVersion": "0.4.0",
  "Layer": {
    "DiffID": "sha256:629212d4fb1b47585329d1c630cb91f919ddcd6168031a07121953d6c6dbd438"
  },
  "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-41717",
  "DataSource": {
    "ID": "go-vulndb",
    "Name": "The Go Vulnerability Database",
    "URL": "https://github.com/golang/vulndb"
  },
  "Title": "An attacker can cause excessive memory growth in a Go server accepting ...",
  "Description": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
  "Severity": "UNKNOWN",
  "References": [
    "https://go.dev/cl/455635",
    "https://go.dev/cl/455717",
    "https://go.dev/issue/56350",
    "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
    "https://pkg.go.dev/vuln/GO-2022-1144"
  ],
  "PublishedDate": "2022-12-08T20:15:00Z",
  "LastModifiedDate": "2022-12-08T22:30:00Z"
}
```

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-12 11:12:33 +00:00
Ashley Davis
b8e51bc24c
fix x/text vuln and ignore AWS vuln
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-11-07 13:32:31 +00:00
Luca Comellini
4498b7cc47
Bump Go to 1.19
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-09-27 11:38:51 -07:00
Tim Ramlot
39fa9f51b4 upgrade dependencies
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-09-26 11:43:12 +02:00
Luca Comellini
97fbe24a74
Bump k8s.io dependencies
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-09-23 10:52:44 -07:00
Tim Ramlot
836793e7e3 upgrade gateway api to v0.5.0
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-08-08 08:52:59 +00:00
Tim Ramlot
9897f2355c upgrade ginkgo to v2
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-08-04 10:16:29 +00:00
Ashley Davis
2636a638bf
replace go-restful version with patched version
for details, see the comment on the `replace` directive

see also this slack thread:

https://kubernetes.slack.com/archives/CDEQJ0Q8M/p1659536441504649?thread_ts=1659532155.184479&cid=CDEQJ0Q8M

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-08-03 15:33:54 +01:00
Ashley Davis
6985cd5e5a
update containerd dependency to fix CVE
CVE-2022-31030 and GHSA-5ffw-gxpp-mxpf

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-08-03 15:25:05 +01:00
Ashley Davis
01d8994f38
remove replacement for /x/net and update /x/net + /x/sys
the replaced version had several CVEs as reported by Trivy:

CVE-2021-44716 - golang.org/x/net:
golang: net/http: limit growth of header canonicalization cache

CVE-2021-31525 - golang.org/x/net:
golang: net/http: panic in ReadRequest and ReadResponse when reading a
very large header

CVE-2022-29526 - golang.org/x/sys:
golang: syscall: faccessat checks wrong group

this commit fixes those reported CVEs

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-08-03 14:44:06 +01:00
irbekrm
a93e028a75 Downgrade kube-openapi
As the later version has a breaking change (bumps github.com/emicklei/go-restful -> github.com/emicklei/go-restful/v3)

Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-07-01 19:16:43 +01:00
irbekrm
cb86bdfce7 Bump Helm dependency
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-07-01 19:16:16 +01:00
Luca Comellini
aaa513de00
Bump k8s.io dependencies
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-06-30 15:16:14 -07:00
Alessandro Vermeulen
1da01211ee Feature gated support for using literal subjects in Certificates
Signed-off-by: Alessandro Vermeulen <alessandro.vermeulen@ing.com>
2022-06-08 20:50:00 +02:00
Luca Comellini
091549620b
Bump Go to 1.18
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-06-02 15:50:13 -07:00
Irbe Krumina
1d917ef311 Revert "Use Apply instead of Update to modify resources in tests"
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-05-03 11:31:47 +01:00
irbekrm
46233e5012 ./hack/update-all.sh
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-04-28 14:51:44 +01:00
Luca Comellini
931adfb493
Bump golang.org/x/crypto to v0.0.0-20220411220226-7b82a4e95df4
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-04-26 16:47:10 +02:00
jetstack-bot
dc24503939
Merge pull request #4958 from irbekrm/tsig_provider
Use our own implementation of miekg/dns.TsigProvider interface
2022-03-22 12:18:51 +00:00
irbekrm
4c901aefab Code review comments
Adds test conditions to certs via patch API call instead of update to avoid conflicts

Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-21 07:33:51 +00:00
irbekrm
3a21f961ca Use our own implementation of github.com/miekg/dns.TsigProvider interface
To allow us to both upgrade the upstream library and keep supporting HMACMD5 as RFC2136 TSIG algorithm although it was deprecated in the upstream library

Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-21 07:09:29 +00:00
irbekrm
587e02cee9 Replaces dns v0.41 -> v0.34
This is so as to avoid dropping support for HMacMD5 value for issuer.spec.acme.solvers.dns01.rfc2136.tsigAlgorithm

Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-17 20:14:55 +00:00
irbekrm
ad746fae10 Bumps a bunch of deps
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-17 20:14:55 +00:00
Jake Sanders
c96d91d586
Update the sig-network Gateway API support to v1alpha2
Co-authored-by: Joakim Ahrlin <joakim.ahrlin@gmail.com>
Signed-off-by: Jake Sanders <i@am.so-aweso.me>
2022-03-01 15:05:17 +00:00
Ashley Davis
3a055cc2f5
rename all uses of github.com/jetstack/cert-manager
This was done by running the following command twice:

 ```bash
 grep -Ri "github.com/jetstack/cert-manager" . | \
 cut -d":" -f1 | \
 sort | \
 uniq | \
 xargs sed -i
 "s/github.com\/jetstack\/cert-manager/github.com\/cert-manager\/cert-manager/"
 ```

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-02-02 09:08:31 +00:00
Richard Wall
4de29a9eb8 Upgrade containerd
To address https://github.com/advisories/GHSA-mvff-h3cj-wj9c

Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2022-01-20 15:09:09 +00:00
joshvanl
b25f9e8c54 Updates go modules with require sigs.k8s.io/structured-merge-diff/v4 v4.1.2
Signed-off-by: joshvanl <vleeuwenjoshua@gmail.com>
2022-01-17 11:24:45 +00:00
James Munnelly
8f1fb874ed Run update-codegen in module mode
Signed-off-by: James Munnelly <jmunnelly@apple.com>
2021-12-17 18:13:44 +00:00
James Munnelly
81f22fd49c Upgrade k8s.io dependencies to v0.23.1
Signed-off-by: James Munnelly <jmunnelly@apple.com>
2021-12-17 16:27:47 +00:00
James Munnelly
2041994b12 Update runc dependency to 1.0.3
Signed-off-by: James Munnelly <jmunnelly@apple.com>
2021-12-16 15:45:25 +00:00
Jake Sanders
53b4a0e491
Update helm, opencontainers, containerd.
This includes a minor update to the OCI spec to address
https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m
and https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh

Signed-off-by: Jake Sanders <i@am.so-aweso.me>
2021-11-23 16:49:56 +00:00
Ashley Davis
bfecde8116
update keystore-go library version
Following the release of cert-manager v1.6.0, it was observed that an
update to the keystore-go library was backwards-incompatible; it
introduced a 6-character minimum length on passwords which wasn't
previously in force.

This led to https://github.com/pavel-v-chernykh/keystore-go/issues/30
which in turn led to https://github.com/pavel-v-chernykh/keystore-go/pull/31

This commit bumps to use the new version, which by default doesn't have
a min password length

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2021-10-28 10:10:45 +01:00
irbekrm
598ed35e4a Uses go/crypto ListCertAlternates function to fetch alternative certificate chains
This allows us to use upstream go/crypto again instead of our own fork

Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-10-07 15:21:26 +01:00
Richard Wall
6cadf757eb go mod tidy
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-07 09:16:02 +01:00
Richard Wall
1a93079a69 go get -u github.com/containerd/containerd
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-07 09:12:44 +01:00
Richard Wall
6a32ccd5dd go get -u helm.sh/helm/v3
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-01 12:41:10 +01:00
Richard Wall
10090b4853 go mod tidy
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-01 10:15:58 +01:00
Richard Wall
d47c46953f go get -u github.com/containerd/containerd
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-01 10:15:31 +01:00