Skip to content

Commit add84f1

Browse files
svcAPLBotmerll
andauthored
chore(chart-deps): update cert-manager to version v1.18.2 (#2305)
Co-authored-by: Matthias Erll <[email protected]>
1 parent 23e988c commit add84f1

14 files changed

+158
-97
lines changed

apps.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ appsInfo:
2222
about: Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes.
2323
integration: Argo CD is configured by APL to use the SSO provided by keycloak, and maps APL groups to Argo CD roles. The otomi-admin role is made super admin within Argo CD. The team-admin role has access to Argo CD and is admin of all team projects. Members of team roles are only allowed to administer their own projects. All Teams will automatically get access to a Git repo, and Argo CD is configured to listen to this repo. All a team has to do is to fill their repo with intended state, commit, and automation takes care of the rest.
2424
cert-manager:
25-
title: Certificate Manager
26-
appVersion: 1.17.1
25+
title: Cert-manager
26+
appVersion: 1.18.2
2727
repo: https://github.com/cert-manager/cert-manager
2828
maintainers: The Linux Foundation
2929
relatedLinks:

chart/chart-index/Chart.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ dependencies:
99
version: 8.0.9
1010
repository: https://argoproj.github.io/argo-helm
1111
- name: cert-manager
12-
version: v1.17.1
12+
version: v1.18.2
1313
repository: https://charts.jetstack.io
1414
- name: cloudnative-pg
1515
version: 0.24.0

charts/cert-manager/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ annotations:
66
fingerprint: 1020CF3C033D4F35BAE1C19E1226061C665DF13E
77
url: https://cert-manager.io/public-keys/cert-manager-keyring-2021-09-20-1020CF3C033D4F35BAE1C19E1226061C665DF13E.gpg
88
apiVersion: v2
9-
appVersion: v1.17.1
9+
appVersion: v1.18.2
1010
description: A Helm chart for cert-manager
1111
home: https://cert-manager.io
1212
icon: https://raw.githubusercontent.com/cert-manager/community/4d35a69437d21b76322157e6284be4cd64e6d2b7/logo/logo-small.png
@@ -23,4 +23,4 @@ maintainers:
2323
name: cert-manager
2424
sources:
2525
- https://github.com/cert-manager/cert-manager
26-
version: v1.17.1
26+
version: v1.18.2

charts/cert-manager/README.md

Lines changed: 20 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Before installing the chart, you must first install the cert-manager CustomResou
1919
This is performed in a separate step to allow you to easily uninstall and reinstall cert-manager without deleting your installed custom resources.
2020

2121
```bash
22-
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.17.1/cert-manager.crds.yaml
22+
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.18.2/cert-manager.crds.yaml
2323
```
2424

2525
To install the chart with the release name `cert-manager`:
@@ -29,7 +29,7 @@ To install the chart with the release name `cert-manager`:
2929
$ helm repo add jetstack https://charts.jetstack.io --force-update
3030

3131
## Install the cert-manager helm chart
32-
$ helm install cert-manager --namespace cert-manager --version v1.17.1 jetstack/cert-manager
32+
$ helm install cert-manager --namespace cert-manager --version v1.18.2 jetstack/cert-manager
3333
```
3434

3535
In order to begin issuing certificates, you will need to set up a ClusterIssuer
@@ -65,7 +65,7 @@ If you want to completely uninstall cert-manager from your cluster, you will als
6565
delete the previously installed CustomResourceDefinition resources:
6666

6767
```console
68-
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.17.1/cert-manager.crds.yaml
68+
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.18.2/cert-manager.crds.yaml
6969
```
7070

7171
## Configuration
@@ -230,13 +230,13 @@ This prevents downtime during voluntary disruptions such as during a Node upgrad
230230
Pod is currently running.
231231
#### **podDisruptionBudget.minAvailable** ~ `unknown`
232232
233-
This configures the minimum available pods for disruptions. It can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
233+
This configures the minimum available pods for disruptions. It can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%).
234234
It cannot be used if `maxUnavailable` is set.
235235
236236
237237
#### **podDisruptionBudget.maxUnavailable** ~ `unknown`
238238
239-
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%). it cannot be used if `minAvailable` is set.
239+
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%). it cannot be used if `minAvailable` is set.
240240
241241
242242
#### **featureGates** ~ `string`
@@ -300,7 +300,7 @@ Override the "cert-manager.fullname" value. This value is used as part of most o
300300
301301
#### **nameOverride** ~ `string`
302302
303-
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use eg. "cainjector.name" which resolves to the value "cainjector").
303+
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use, e.g., "cainjector.name" which resolves to the value "cainjector").
304304
305305
#### **serviceAccount.create** ~ `bool`
306306
> Default value:
@@ -371,10 +371,10 @@ config:
371371
kubernetesAPIBurst: 9000
372372
numberOfConcurrentWorkers: 200
373373
enableGatewayAPI: true
374-
# Feature gates as of v1.17.0. Listed with their default values.
374+
# Feature gates as of v1.18.1. Listed with their default values.
375375
# See https://cert-manager.io/docs/cli/controller/
376376
featureGates:
377-
AdditionalCertificateOutputFormats: true # BETA - default=true
377+
AdditionalCertificateOutputFormats: true # GA - default=true
378378
AllAlpha: false # ALPHA - default=false
379379
AllBeta: false # BETA - default=false
380380
ExperimentalCertificateSigningRequestControllers: false # ALPHA - default=false
@@ -386,8 +386,10 @@ config:
386386
ServerSideApply: false # ALPHA - default=false
387387
StableCertificateRequestName: true # BETA - default=true
388388
UseCertificateRequestBasicConstraints: false # ALPHA - default=false
389-
UseDomainQualifiedFinalizer: true # BETA - default=false
389+
UseDomainQualifiedFinalizer: true # GA - default=true
390390
ValidateCAA: false # ALPHA - default=false
391+
DefaultPrivateKeyRotationPolicyAlways: true # BETA - default=true
392+
ACMEHTTP01IngressPathTypeExact: true # BETA - default=true
391393
# Configure the metrics server for TLS
392394
# See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
393395
metricsTLSConfig:
@@ -425,7 +427,7 @@ Option to disable cert-manager's build-in auto-approver. The auto-approver appro
425427
> - clusterissuers.cert-manager.io/*
426428
> ```
427429
428-
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because eg. you are using approver-policy, you can enable 'disableAutoApproval'.
430+
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because, e.g., you are using approver-policy, you can enable 'disableAutoApproval'.
429431
ref: https://cert-manager.io/docs/concepts/certificaterequest/#approval
430432
431433
#### **extraArgs** ~ `array`
@@ -684,7 +686,7 @@ enableServiceLinks indicates whether information about services should be inject
684686
685687
Enable Prometheus monitoring for the cert-manager controller and webhook. If you use the Prometheus Operator, set prometheus.podmonitor.enabled or prometheus.servicemonitor.enabled, to create a PodMonitor or a
686688
ServiceMonitor resource.
687-
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you can not enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
689+
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you cannot enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
688690
#### **prometheus.servicemonitor.enabled** ~ `bool`
689691
> Default value:
690692
> ```yaml
@@ -703,13 +705,14 @@ The namespace that the service monitor should live in, defaults to the cert-mana
703705
> ```
704706
705707
Specifies the `prometheus` label on the created ServiceMonitor. This is used when different Prometheus instances have label selectors matching different ServiceMonitors.
706-
#### **prometheus.servicemonitor.targetPort** ~ `number`
708+
#### **prometheus.servicemonitor.targetPort** ~ `string,integer`
707709
> Default value:
708710
> ```yaml
709-
> 9402
711+
> http-metrics
710712
> ```
711713
712714
The target port to set on the ServiceMonitor. This must match the port that the cert-manager controller is listening on for metrics.
715+
713716
#### **prometheus.servicemonitor.path** ~ `string`
714717
> Default value:
715718
> ```yaml
@@ -969,13 +972,13 @@ This prevents downtime during voluntary disruptions such as during a Node upgrad
969972
Pod is currently running.
970973
#### **webhook.podDisruptionBudget.minAvailable** ~ `unknown`
971974
972-
This property configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
975+
This property configures the minimum available pods for disruptions. Can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%).
973976
It cannot be used if `maxUnavailable` is set.
974977
975978
976979
#### **webhook.podDisruptionBudget.maxUnavailable** ~ `unknown`
977980
978-
This property configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
981+
This property configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%).
979982
It cannot be used if `minAvailable` is set.
980983
981984
@@ -1442,14 +1445,14 @@ Pod is currently running.
14421445
#### **cainjector.podDisruptionBudget.minAvailable** ~ `unknown`
14431446
14441447
`minAvailable` configures the minimum available pods for disruptions. It can either be set to
1445-
an integer (e.g. 1) or a percentage value (e.g. 25%).
1448+
an integer (e.g., 1) or a percentage value (e.g., 25%).
14461449
Cannot be used if `maxUnavailable` is set.
14471450
14481451
14491452
#### **cainjector.podDisruptionBudget.maxUnavailable** ~ `unknown`
14501453
14511454
`maxUnavailable` configures the maximum unavailable pods for disruptions. It can either be set to
1452-
an integer (e.g. 1) or a percentage value (e.g. 25%).
1455+
an integer (e.g., 1) or a percentage value (e.g., 25%).
14531456
Cannot be used if `minAvailable` is set.
14541457
14551458

charts/cert-manager/templates/NOTES.txt

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,12 @@
11
{{- if .Values.installCRDs }}
22
⚠️ WARNING: `installCRDs` is deprecated, use `crds.enabled` instead.
3+
34
{{- end }}
5+
⚠️ WARNING: New default private key rotation policy for Certificate resources.
6+
The default private key rotation policy for Certificate resources was
7+
changed to `Always` in cert-manager >= v1.18.0.
8+
Learn more in the [1.18 release notes](https://cert-manager.io/docs/releases/release-notes/release-notes-1.18).
9+
410
cert-manager {{ .Chart.AppVersion }} has been deployed successfully!
511

612
In order to begin issuing certificates, you will need to set up a ClusterIssuer

charts/cert-manager/templates/cainjector-deployment.yaml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,9 @@ spec:
138138
{{- end }}
139139
{{- with .Values.cainjector.nodeSelector }}
140140
nodeSelector:
141-
{{- toYaml . | nindent 8 }}
141+
{{- range $key, $value := . }}
142+
{{ $key }}: {{ $value | quote }}
143+
{{- end }}
142144
{{- end }}
143145
{{- with .Values.cainjector.affinity }}
144146
affinity:

0 commit comments

Comments
 (0)