Commit Graph

7389 Commits

Author SHA1 Message Date
irbekrm
c7465fd921 Issuing controller ensures that cert.spec.secretName secrets are labelled
Signed-off-by: irbekrm <irbekrm@gmail.com>
2023-01-06 18:29:51 +00:00
irbekrm
767170d65f Adds a new label to cert-manager API
Signed-off-by: irbekrm <irbekrm@gmail.com>
2023-01-06 18:28:50 +00:00
jetstack-bot
a5d67d3a21
Merge pull request #5688 from SgtCoDFish/bumpbase
bump base images to latest
2023-01-04 16:09:01 +00:00
Ashley Davis
6d1a65c771
bump base images to latest
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-01-04 15:34:15 +00:00
jetstack-bot
094b4c763e
Merge pull request #5662 from lucacome/bump-controller-tools
Bump sigs.k8s.io deps
2023-01-04 14:02:00 +00:00
jetstack-bot
b6013599e4
Merge pull request #5681 from SgtCoDFish/noconfuse
Avoid logging confusing error messages for external issuers
2023-01-04 12:48:00 +00:00
Ashley Davis
0225cc9234
avoid logging confusing error messages for external issuers
See https://github.com/cert-manager/cert-manager/issues/5601

When referring to external issuers whose kind is not "Issuer" or
"ClusterIssuer" we log an error message thanks to a new check added in
a previous PR[1] which should only trigger for SelfSigned issuers.

The error previously looked like:

```text
"error"="invalid value \"x\" for issuerRef.kind. Must
be empty, \"Issuer\" or \"ClusterIssuer\""
```

After this PR, any CR with an issuer whose group or kind doesn't
match what's expected for a built-in issuer will be skipped

https://github.com/cert-manager/cert-manager/pull/5336

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>

WIP: test other issuer kinds

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-01-04 12:10:34 +00:00
jetstack-bot
ffcd374e14
Merge pull request #5685 from wallrj/make-ko-deploy-certmanager-with-helm-values
Allow custom helm values files to be supplied to make ko-deploy-certmanager
2023-01-04 10:54:00 +00:00
jetstack-bot
e473c89490
Merge pull request #5684 from wallrj/remove-duplicate-ko-make-targets
Remove duplicate ko-deploy-cert-manager make target
2023-01-04 09:31:11 +00:00
jetstack-bot
d8a6ec0dcb
Merge pull request #5663 from weisdd/fix/azure-workload-identity-early-reconcilation
fix(AzureDNS): prevent early reconciliations for misconfigured Workload Identity
2023-01-03 18:00:10 +00:00
jetstack-bot
a12ff40f12
Merge pull request #5679 from SgtCoDFish/ginkgo-tweaks
Various ginkgo tweaks
2023-01-03 17:24:10 +00:00
Richard Wall
33ba0f3ae7 Allow custom helm values files to be supplied to make ko-deploy-certmanager
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-01-03 17:23:58 +00:00
Richard Wall
67297a1b80 Remove trailing escape slash
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-01-03 16:51:31 +00:00
Ashley Davis
f8bee19c04
various ginkgo tweaks
1. Remove deprecated args (progress, slow spec threshold)
2. Disable colors in CI

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-01-03 16:47:56 +00:00
Richard Wall
5f1a4ac91c Remove duplicate ko-deploy-cert-manager make target
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2023-01-03 16:44:42 +00:00
jetstack-bot
abfc9b7da8
Merge pull request #5680 from SgtCoDFish/tmpdirtweak
Use template when generating tempdir in verify-crds
2023-01-03 16:30:11 +00:00
Ashley Davis
c685efeb03
use template when generating tempdir in verify-crds
Due to a bug in controller-gen[1] certain paths are incorrectly split
and part of these paths can be interpreted as a numeric literal, which
will cause controller-gen to fail. We observe this as occasional test
flakes in the "verify-crds" target, when the tmpdir starts with a zero,
such as in "/tmp/tmp.0PFqFSHBID"

This commit attempts to avoid this bug by specifying a template for the
tmpdir we generate when verifying CRDs which doesn't include any "."
characters, which seem to be being split incorrectly.

[1] https://github.com/kubernetes-sigs/controller-tools/issues/734

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-01-03 15:14:02 +00:00
jetstack-bot
98498ef17e
Merge pull request #5674 from maelvls/upgrade-vcert
vcert: upgrade to v4.23.0 to fix certificate renewal stuck on TPP errors ("Click Retry" and "WebSDK CertRequest")
2023-01-03 12:15:46 +00:00
Maël Valais
6403091073 update LICENSES (make update-licenses)
Signed-off-by: Maël Valais <mael@vls.dev>
2023-01-03 11:46:33 +01:00
Maël Valais
dcab0d2e3f vcert: upgrade to v4.23.0 to fix "Click Retry" and "WebSDK CertRequest"
cert-manager was not able to retry failed TPP certificates due to the
fact that TPP will not reset a given certificate that has a failed
enrollment status from a previous enrollment. More specifically,
cert-manager was getting stuck with either:

    WebSDK CertRequest Module Requested Certificate

or

    This certificate cannot be processed while it is in an error state.
    Fix any errors, and then click Retry.

With vcert v4.23.0, a call to "reset" is made when one of these two
messages are found while polling for the certificate (i.e., while
calling vcert's RetrieveCertificate function).

Signed-off-by: Maël Valais <mael@vls.dev>
2023-01-02 13:21:46 +01:00
Igor Beliakov
1c01973813 fix(AzureDNS): suppress original message in adal.TokenRefreshError to prevent early CR reconciliations due to unique data (timestamp, Trace ID) that lands to CR status
Signed-off-by: Igor Beliakov <demtis.register@gmail.com>
2022-12-22 11:59:37 +01:00
jetstack-bot
2a7fabd5ca
Merge pull request #5554 from camptocamp/helm-add-acme-http01-solver-image-override-option
helm: add option to override ACME HTTP-01 solver image
2022-12-22 10:10:13 +00:00
Yann Soubeyrand
ea0bea9db0 helm: add option to override ACME HTTP-01 solver image
Signed-off-by: Yann Soubeyrand <yann.soubeyrand@camptocamp.com>
2022-12-21 19:48:11 +01:00
jetstack-bot
ca318f1d41
Merge pull request #5661 from SgtCoDFish/helmchartversionfix
Bump supported versions of k8s mentioned in the helm chart
2022-12-21 17:57:13 +00:00
Luca Comellini
dbd6dc9b16
Bump sigs.k8s.io deps
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-21 09:47:41 -08:00
Ashley Davis
1a63cba52a
Bump supported versions of k8s mentioned in the helm chart
This reflects the latest supported releases as of an update on
2022-12-16

See https://github.com/cert-manager/website/pull/1131

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-21 17:17:21 +00:00
jetstack-bot
8deaca755d
Merge pull request #5644 from SgtCoDFish/acmeissuerbundle
Add CABundle for ACME Servers
2022-12-21 15:08:13 +00:00
jetstack-bot
9a68a86ac6
Merge pull request #5655 from wallrj/images-push
Experimental make targets for pushing images to a Docker registry and redeploying cert-manager
2022-12-21 13:12:56 +00:00
Richard Wall
755fec1170 Add some experimental ko based build and deploy tools
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2022-12-21 12:12:09 +00:00
jetstack-bot
a7671cf205
Merge pull request #5659 from SgtCoDFish/bumpbase
Update base images to latest
2022-12-21 10:25:36 +00:00
jetstack-bot
8641c4a697
Merge pull request #5641 from cert-manager/dependabot/go_modules/helm.sh/helm/v3-3.10.3
Bump helm.sh/helm/v3 from 3.10.0 to 3.10.3
2022-12-20 18:31:35 +00:00
jetstack-bot
6e0f99de81
Merge pull request #5658 from SgtCoDFish/harmonizecontour
Bump version of contour helm chart + images
2022-12-20 17:26:52 +00:00
Ashley Davis
a08cf19aa7
update base images to latest
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-20 17:21:01 +00:00
Ashley Davis
31a3edf031
Bump version of contour helm chart + images
Also adds a note about how to update the helm chart version, in the
future

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-20 16:05:40 +00:00
Richard Wall
2eef0dad06 Add ko tool
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2022-12-20 15:38:19 +00:00
jetstack-bot
8a3811314f
Merge pull request #5656 from SgtCoDFish/trivydec
Bump golang.org/x/net version to fix trivy vulns
2022-12-20 12:35:52 +00:00
Ashley Davis
12e0e0a9eb
bump golang.org/x/net version to fix trivy vulns
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-20 11:57:39 +00:00
jetstack-bot
c27b7cea6a
Merge pull request #5654 from SgtCoDFish/updatesec
Update SECURITY policy to exclude vuln reports
2022-12-19 19:24:35 +00:00
Ashley Davis
1542ea0492
update SECURITY policy to exclude vuln reports
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-19 17:21:59 +00:00
jetstack-bot
501f4928ea
Merge pull request #5646 from SgtCoDFish/k8s1.26
Enable + use k8s 1.26 for e2e tests by default
2022-12-16 17:57:00 +00:00
Ashley Davis
1e419a468f
Enable + use k8s 1.26 for e2e tests by default
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-16 17:06:18 +00:00
Tim Ramlot
ff6fec9088
Bumps [helm.sh/helm/v3](https://github.com/helm/helm) from 3.10.0 to 3.10.3.
- [Release notes](https://github.com/helm/helm/releases)
- [Commits](helm/helm@v3.10.0...v3.10.3)

---
updated-dependencies:
- dependency-name: helm.sh/helm/v3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-16 18:05:00 +01:00
Ashley Davis
c5924f54a1
add + use CABundle field for ACME servers in issuers
Previously it wasn't possible to set a custom CA bundle for an ACME
server, leading users to either patch the cert-manager system CA bundle
manually or else use SkipTLSVerify which is a security issue.

This adds CABundle for ACME, similar to what we have for Vault and
Venafi TPP issuers.

Longer term we'd like to have a more fully featured approach. It would
for example make sense to support loading CA bundles from ConfigMaps or
Secrets (similar to what we do for Vault issuers today), but for now this
change is the simplest change.

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-15 16:21:07 +00:00
Ashley Davis
f68693bb6a
change wording on descriptions for Vault and TPP 'CABundle' fields
Clarifies language a little; makes it clearer that the bundle
should be base64 encoded. Previously it was slightly confusing
in that PEM certificates are themselves base64 encoded.

Also makes it clearer what our CABundle validation does and does not do
by adding a standalone validation function and tweaking the error
message for an invalid CA bundle.

Also updates validation to not print CA bundle for Vault issuer when the
bundle is invalid, since it won't help with debugging anything.
Currently the bundle is printed as byte values ("0x32, 0x58, 0x43...")
and in any case printing the whole bundle could be noisy if it's large

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-15 16:21:02 +00:00
jetstack-bot
6806035cb7
Merge pull request #5637 from RomanenkoDenys/fix-kubebuilder-sha
fix kubebuilder tools arm64 sha256sum
2022-12-15 11:46:21 +00:00
jetstack-bot
a5a21693bc
Merge pull request #5629 from lucacome/bump-k8s-deps
Bump k8s.io deps to v0.26.0
2022-12-15 11:01:20 +00:00
Luca Comellini
bb252356a2
Update controller-runtime to v0.14.0
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00
Tim Ramlot
8baaffc02b
kubebuilder did not yet create a 1.26 release
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00
Tim Ramlot
26d04f3d8a
add WithLegacy function to our fake discovery client
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00
Luca Comellini
c99c147059
Bump k8s.io deps to v0.26.0
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00