Commit Graph

789 Commits

Author SHA1 Message Date
irbekrm
b2b3eade26 Updates cert.status.lastFailureTime description
To match the current behaviour

Signed-off-by: irbekrm <irbekrm@gmail.com>
2023-04-05 12:54:14 +01:00
Ole Furseth
f5eff1f318 Remove obsolete bazel documentation
Signed-off-by: Ole Furseth <ole.furseth@bekk.no>
2023-03-17 11:44:15 +01:00
Maël Valais
f0449ddb3b ingressClassName: document the "oneOf" contraint for the "name" field
Signed-off-by: Maël Valais <mael@vls.dev>
2023-03-09 15:15:39 +01:00
Maël Valais
ca9aaa0440 ingressClassName: let's remove the link placeholder
The link itself is way too long to fit in the API reference.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-03-09 14:42:21 +01:00
Maël Valais
6458ed1543 Move from a flag to the Issuer field "ingressClassName"
Signed-off-by: Maël Valais <mael@vls.dev>
2023-03-03 17:50:30 +01:00
jetstack-bot
4a7fa90710
Merge pull request #5801 from malovme/solver-image-pull-secret
Add imagePullSecrets for AMCE http01 solver pod
2023-02-14 08:55:51 +00:00
jetstack-bot
55b8153643
Merge pull request #5788 from ExNG/dev/jbh/add-kubernetes-api-to-egress
Add 6443/TCP to webhook egress NetworkPolicy
2023-02-13 15:20:40 +00:00
Michael Malov
dc621e9306 Add imagePullSecrets for AMCE http01 solver pod
Signed-off-by: Michael Malov <mmeemail@gmail.com>
2023-02-13 14:18:50 +03:00
Johann Behr
ea5c7b3bfd
Update deploy/charts/cert-manager/values.yaml
Co-authored-by: Maël Valais <mael@vls.dev>
Signed-off-by: Johann Behr <24767736+ExNG@users.noreply.github.com>
2023-02-10 14:43:06 +01:00
Johann Behr
d9a68bee40
Add 6443/TCP to webhook egress NetworkPolicy
Signed-off-by: Johann Behr <j.behr@avm.de>
2023-02-09 11:46:15 +01:00
Maël Valais
bfce543640 serviceAccountRef: remove aud and exp, secretRef now a pointer
Changing SecretRef to be a pointer will break people using the package as
a library.

I disabled the ability to set the audience and expiry time for security
reasons:

We decided to generate the audience dynamically instead of letting the
user configure it, and we also decided to encode the namespace and
issuer name into the audience to remediate the risk of hijacking an
existing issuer and service account with a malicious issuer.

Regarding the expiration duration of the JWT, it doesn't make sense to
let the user configure it since cert-manager will authenticate using the
JWT and immediately discard it. We thought that 1 minute would be
acceptable, although the Kubernetes API server may return a totally
different duration.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-02-06 18:28:49 +01:00
Maël Valais
76eef68730 serviceAccountRef: the vault issuer can now use bound SA tokens
Previously, the Vault issuer was only able to use a Secret in order to
use the "Kubernetes authentication" method. The downside to this service
account Secret token is that it has the default JWT iss
"kubernetes/serviceaccount" (along with the fact that the token is not
bound to a particular pod and has no expiry).

With the new serviceAccountRef, cert-manager now requests the token on
behalf of the pod in order to authenticate with Vault.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-02-06 18:28:49 +01:00
Tim Ramlot
3978597320
Cleaning up a checks
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2023-01-24 09:50:56 +01:00
Aaron Aichlmayr
1d7e360ea4
Cleaning up a check
Co-authored-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Signed-off-by: Aaron Aichlmayr <waterfoul@gmail.com>
2023-01-23 16:36:01 -06:00
Aaron Aichlmayr
b967232e7b
Fixed a few indents
Signed-off-by: Aaron Aichlmayr <aaichlmayr@conquestcyber.com>
2023-01-16 10:29:11 -06:00
Aaron Aichlmayr
0ce3553e7f
Adding the ability to set volumes and volumeMounts to all pods
Signed-off-by: Aaron Aichlmayr <aaichlmayr@conquestcyber.com>
2023-01-16 10:29:11 -06:00
Jan-Otto Kröpke
b952058775
[helm] expose enable-certificate-owner-ref and -dns01-recursive-nameservers as helm value
Signed-off-by: Jan-Otto Kröpke <mail@jkroepke.de>
2023-01-14 15:16:16 +01:00
Ashley Davis
264ebe6d29
move custom acmesolver image above extraArgs
since the acmesolver image has defaults (i.e. the repository is set by
default[1]), the helm chart changes introduced in #5554 will always set
the `--acme-http01-solver-image` parameter.

This can break users who previously had this parameter set via the
extraArgs Helm option, which was found and reported on Slack[2].

This commit moves the new Helm value added in #5554 above extraArgs,
so that if extraArgs is set it will take precedence and nothing should
change as users upgrade.

[1] a5d67d3a21/deploy/charts/cert-manager/values.yaml (L504-L516)
[2] https://kubernetes.slack.com/archives/CDEQJ0Q8M/p1672925692339849

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2023-01-05 16:42:57 +00:00
jetstack-bot
094b4c763e
Merge pull request #5662 from lucacome/bump-controller-tools
Bump sigs.k8s.io deps
2023-01-04 14:02:00 +00:00
jetstack-bot
2a7fabd5ca
Merge pull request #5554 from camptocamp/helm-add-acme-http01-solver-image-override-option
helm: add option to override ACME HTTP-01 solver image
2022-12-22 10:10:13 +00:00
Yann Soubeyrand
ea0bea9db0 helm: add option to override ACME HTTP-01 solver image
Signed-off-by: Yann Soubeyrand <yann.soubeyrand@camptocamp.com>
2022-12-21 19:48:11 +01:00
Luca Comellini
dbd6dc9b16
Bump sigs.k8s.io deps
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-21 09:47:41 -08:00
Ashley Davis
1a63cba52a
Bump supported versions of k8s mentioned in the helm chart
This reflects the latest supported releases as of an update on
2022-12-16

See https://github.com/cert-manager/website/pull/1131

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-21 17:17:21 +00:00
Ashley Davis
c5924f54a1
add + use CABundle field for ACME servers in issuers
Previously it wasn't possible to set a custom CA bundle for an ACME
server, leading users to either patch the cert-manager system CA bundle
manually or else use SkipTLSVerify which is a security issue.

This adds CABundle for ACME, similar to what we have for Vault and
Venafi TPP issuers.

Longer term we'd like to have a more fully featured approach. It would
for example make sense to support loading CA bundles from ConfigMaps or
Secrets (similar to what we do for Vault issuers today), but for now this
change is the simplest change.

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-15 16:21:07 +00:00
Ashley Davis
f68693bb6a
change wording on descriptions for Vault and TPP 'CABundle' fields
Clarifies language a little; makes it clearer that the bundle
should be base64 encoded. Previously it was slightly confusing
in that PEM certificates are themselves base64 encoded.

Also makes it clearer what our CABundle validation does and does not do
by adding a standalone validation function and tweaking the error
message for an invalid CA bundle.

Also updates validation to not print CA bundle for Vault issuer when the
bundle is invalid, since it won't help with debugging anything.
Currently the bundle is printed as byte values ("0x32, 0x58, 0x43...")
and in any case printing the whole bundle could be noisy if it's large

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-15 16:21:02 +00:00
lv
2f0d492036 feat: Add max-concurrent-challenges parameter to helm
Set the max-concurrent-challenges value with -set maxConcurrentChallenges=value when deploying with helm

Fixes: https://github.com/cert-manager/cert-manager/issues/5627
Signed-off-by: lvyanru <yanru.lv@daocloud.io>
2022-12-13 18:15:16 +08:00
Yannic Kilcher
5ce5129a3c
Fixed a typo in helm chart values
Signed-off-by: Yannic Kilcher <yk@users.noreply.github.com>
2022-12-09 11:55:33 +01:00
Sathyanarayanan Saravanamuthu
5aabf62585 Updating CRDs
Signed-off-by: Sathyanarayanan Saravanamuthu <sathyanarays@vmware.com>
2022-12-06 18:54:46 +05:30
irbekrm
486c72f122 Update reference to HTTPRoute docs
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-12-05 15:04:18 +00:00
lv
bf2db73f71 fix: featureGates add webhook deployment in chart yaml
Signed-off-by: lvyanru <1113706590@qq.com>
2022-11-17 22:11:57 +08:00
Mary Thibault
7bb666742c
feat: add commonLabels to webhook configmap
Signed-off-by: Mary Thibault <mary.thibault2@gmail.com>
2022-11-04 09:24:04 +01:00
jetstack-bot
da3265115b
Merge pull request #5387 from Tolsto/vault-ca-bundle-secret-ref
Add option to load Vault CA bundle from Kubernetes Secret
2022-10-13 09:55:09 +01:00
Martin Schimandl
a080ac8970 Update Chart kubeVersion to >=1.20.0-0
Signed-off-by: Martin Schimandl <martin.schimandl@gmail.com>
2022-10-01 13:56:29 +01:00
Tim Ramlot
39fa9f51b4 upgrade dependencies
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-09-26 11:43:12 +02:00
jetstack-bot
0f627cdfb7
Merge pull request #5417 from mjudeikis/master
helm: Add NetworkPolicy support
2022-09-23 12:57:57 +01:00
Mangirdas Judeikis
1efea1787a helm: Add NetworkPolicy support
Signed-off-by: Mangirdas Judeikis <mangirdas@judeikis.lt>
2022-09-20 11:50:20 +03:00
Tim Ramlot
23b8bf5118 improve Helm values.yaml comment
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-09-16 18:15:30 +02:00
Thibault
1d21f3f30c
feat: merge master branch
Signed-off-by: Thibault <mary.thibault2@gmail.com>
2022-09-15 13:40:05 +02:00
Rui Lopes
d66755acd1 to help troubleshooting make the helm chart container names unique
closes #5355

Signed-off-by: Rui Lopes <rgl@ruilopes.com>
2022-08-28 12:07:57 +01:00
jetstack-bot
2821157f69
Merge pull request #5401 from sathieu/servicemonitor_annotations
Add annotations for ServiceMonitor in helm chart
2022-08-26 17:50:19 +01:00
jetstack-bot
b1d96755f2
Merge pull request #5395 from stek29/fix-5149
Add topologySpreadConstraints to helm chart
2022-08-26 16:13:20 +01:00
Mathieu Parent
ffd802d750 Add annotations for ServiceMonitor in helm chart
Signed-off-by: Mathieu Parent <mathieu.parent@insee.fr>
2022-08-26 16:46:31 +02:00
jetstack-bot
12f98dbc7e
Merge pull request #5376 from inteon/upgrade_gateway_api
Upgrade gateway api to v0.5.0
2022-08-25 16:08:10 +01:00
Flaagada
5ac8387d50
Add: support common labels for all resources
Usefull when we have a policies manager as Kyverno.

Signed-off-by: Flaagada <mary.thibault2@gmail.com>
2022-08-22 11:10:02 +02:00
Viktor Oreshkin
de24b860ae Add topologySpreadConstraints to helm chart (fix #5149)
Signed-off-by: Viktor Oreshkin <imselfish@stek29.rocks>
2022-08-22 06:24:16 +03:00
jetstack-bot
96dd8849ca
Merge pull request #5311 from EugenFo/add-port-to-container-spec
added healthcheck to containers port spec
2022-08-19 10:58:11 +01:00
Nils Mueller
2f6fa9dddf fixup! Add option to load Vault CA bundle from Kubernetes Secret
Signed-off-by: Nils Mueller <nm@impactful.it>
2022-08-16 02:57:43 +03:00
Nils Mueller
00a20097b6 Add option to load Vault CA bundle from Kubernetes Secret
Vault distributions like "Bank Vaults" automatically configure
and provision Vault and provide the CA bundle via a Kubernetes
Secret. Having to hard-code the bundle in the Issuer instead
of dynamically referencing it through the Secret requires
a manual second step when using a GitOps workflow.

Signed-off-by: Nils Mueller <nm@impactful.it>
2022-08-15 03:10:51 +03:00
jetstack-bot
34ea128fd3
Merge pull request #5368 from hawksight/pf/lease
docs: Correct reference to lease not config map
2022-08-09 17:04:05 +01:00
jetstack-bot
58b226e06c
Merge pull request #5163 from james-callahan/webhook-dynamic-serving-dns-names
Webhook dynamic serving dns names
2022-08-08 13:57:50 +01:00