Skip to content

Commit 96699a4

Browse files
author
robot
committed
robot: project cert-manager chart upgrades from v1.16.4 to v1.19.1
Signed-off-by: robot <[email protected]>
1 parent ff527eb commit 96699a4

24 files changed

+12667
-12152
lines changed

charts/cert-manager/cert-manager/Chart.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ annotations:
66
fingerprint: 1020CF3C033D4F35BAE1C19E1226061C665DF13E
77
url: https://cert-manager.io/public-keys/cert-manager-keyring-2021-09-20-1020CF3C033D4F35BAE1C19E1226061C665DF13E.gpg
88
apiVersion: v2
9-
appVersion: v1.16.4
9+
appVersion: v1.19.1
1010
description: A Helm chart for cert-manager
1111
home: https://cert-manager.io
1212
icon: https://raw.githubusercontent.com/cert-manager/community/4d35a69437d21b76322157e6284be4cd64e6d2b7/logo/logo-small.png
@@ -23,8 +23,8 @@ maintainers:
2323
name: cert-manager
2424
sources:
2525
- https://github.com/cert-manager/cert-manager
26-
version: 1.16.4
26+
version: 1.19.1
2727
dependencies:
2828
- name: cert-manager
29-
version: "v1.16.4"
29+
version: "v1.19.1"
3030
repository: "https://charts.jetstack.io"

charts/cert-manager/cert-manager/charts/cert-manager/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ annotations:
66
fingerprint: 1020CF3C033D4F35BAE1C19E1226061C665DF13E
77
url: https://cert-manager.io/public-keys/cert-manager-keyring-2021-09-20-1020CF3C033D4F35BAE1C19E1226061C665DF13E.gpg
88
apiVersion: v2
9-
appVersion: v1.16.4
9+
appVersion: v1.19.1
1010
description: A Helm chart for cert-manager
1111
home: https://cert-manager.io
1212
icon: https://raw.githubusercontent.com/cert-manager/community/4d35a69437d21b76322157e6284be4cd64e6d2b7/logo/logo-small.png
@@ -23,4 +23,4 @@ maintainers:
2323
name: cert-manager
2424
sources:
2525
- https://github.com/cert-manager/cert-manager
26-
version: v1.16.4
26+
version: v1.19.1

charts/cert-manager/cert-manager/charts/cert-manager/README.md

Lines changed: 94 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
# cert-manager
22

3-
cert-manager is a Kubernetes addon to automate the management and issuance of
4-
TLS certificates from various issuing sources.
3+
cert-manager creates TLS certificates for workloads in your Kubernetes or OpenShift cluster and renews the certificates before they expire.
54

6-
It will ensure certificates are valid and up to date periodically, and attempt
7-
to renew certificates at an appropriate time before expiry.
5+
cert-manager can obtain certificates from a [variety of certificate authorities](https://cert-manager.io/docs/configuration/issuers/), including:
6+
[Let's Encrypt](https://cert-manager.io/docs/configuration/acme/), [HashiCorp Vault](https://cert-manager.io/docs/configuration/vault/),
7+
[Venafi](https://cert-manager.io/docs/configuration/venafi/) and [private PKI](https://cert-manager.io/docs/configuration/ca/).
88

99
## Prerequisites
1010

@@ -13,23 +13,21 @@ to renew certificates at an appropriate time before expiry.
1313
## Installing the Chart
1414

1515
Full installation instructions, including details on how to configure extra
16-
functionality in cert-manager can be found in the [installation docs](https://cert-manager.io/docs/installation/kubernetes/).
17-
18-
Before installing the chart, you must first install the cert-manager CustomResourceDefinition resources.
19-
This is performed in a separate step to allow you to easily uninstall and reinstall cert-manager without deleting your installed custom resources.
20-
21-
```bash
22-
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.16.4/cert-manager.crds.yaml
23-
```
16+
functionality in cert-manager can be found in the [installation docs](https://cert-manager.io/docs/installation/helm/).
2417

2518
To install the chart with the release name `cert-manager`:
2619

2720
```console
28-
## Add the Jetstack Helm repository
29-
$ helm repo add jetstack https://charts.jetstack.io --force-update
30-
31-
## Install the cert-manager helm chart
32-
$ helm install cert-manager --namespace cert-manager --version v1.16.4 jetstack/cert-manager
21+
# Add the Jetstack Helm repository
22+
helm repo add jetstack https://charts.jetstack.io --force-update
23+
24+
# Install the cert-manager helm chart
25+
helm install \
26+
cert-manager jetstack/cert-manager \
27+
--namespace cert-manager \
28+
--create-namespace \
29+
--version v1.19.1 \
30+
--set crds.enabled=true
3331
```
3432

3533
In order to begin issuing certificates, you will need to set up a ClusterIssuer
@@ -56,17 +54,25 @@ are documented in our full [upgrading guide](https://cert-manager.io/docs/instal
5654
To uninstall/delete the `cert-manager` deployment:
5755

5856
```console
59-
$ helm delete cert-manager --namespace cert-manager
57+
helm delete cert-manager --namespace cert-manager
6058
```
6159

6260
The command removes all the Kubernetes components associated with the chart and deletes the release.
6361

6462
If you want to completely uninstall cert-manager from your cluster, you will also need to
65-
delete the previously installed CustomResourceDefinition resources:
63+
delete the previously installed CustomResourceDefinition resources.
6664

67-
```console
68-
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.16.4/cert-manager.crds.yaml
69-
```
65+
> ☢️ This will remove all `Issuer`,`ClusterIssuer`,`Certificate`,`CertificateRequest`,`Order` and `Challenge` resources from the cluster:
66+
>
67+
> ```console
68+
> kubectl delete crd \
69+
> issuers.cert-manager.io \
70+
> clusterissuers.cert-manager.io \
71+
> certificates.cert-manager.io \
72+
> certificaterequests.cert-manager.io \
73+
> orders.acme.cert-manager.io \
74+
> challenges.acme.cert-manager.io
75+
> ```
7076
7177
## Configuration
7278
<!-- AUTO-GENERATED -->
@@ -87,6 +93,18 @@ For example:
8793
imagePullSecrets:
8894
- name: "image-pull-secret"
8995
```
96+
#### **global.nodeSelector** ~ `object`
97+
> Default value:
98+
> ```yaml
99+
> {}
100+
> ```
101+
102+
Global node selector
103+
104+
The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. For more information, see [Assigning Pods to Nodes](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/).
105+
106+
If a component-specific nodeSelector is also set, it will take precedence.
107+
90108
#### **global.commonLabels** ~ `object`
91109
> Default value:
92110
> ```yaml
@@ -108,6 +126,18 @@ The number of old ReplicaSets to retain to allow rollback (if not set, the defau
108126
> ```
109127
110128
The optional priority class to be used for the cert-manager pods.
129+
#### **global.hostUsers** ~ `bool`
130+
131+
Set all pods to run in a user namespace without host access. Experimental: may be removed once the Kubernetes User Namespaces feature is GA.
132+
133+
Requirements:
134+
- Kubernetes ≥ 1.33, or
135+
- Kubernetes 1.27–1.32 with UserNamespacesSupport feature gate enabled.
136+
137+
Set to false to run pods in a user namespace without host access.
138+
139+
See [limitations](https://kubernetes.io/docs/concepts/workloads/pods/user-namespaces/#limitations) for details.
140+
111141
#### **global.rbac.create** ~ `bool`
112142
> Default value:
113143
> ```yaml
@@ -230,13 +260,13 @@ This prevents downtime during voluntary disruptions such as during a Node upgrad
230260
Pod is currently running.
231261
#### **podDisruptionBudget.minAvailable** ~ `unknown`
232262
233-
This configures the minimum available pods for disruptions. It can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
263+
This configures the minimum available pods for disruptions. It can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%).
234264
It cannot be used if `maxUnavailable` is set.
235265
236266
237267
#### **podDisruptionBudget.maxUnavailable** ~ `unknown`
238268
239-
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%). it cannot be used if `minAvailable` is set.
269+
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%). it cannot be used if `minAvailable` is set.
240270
241271
242272
#### **featureGates** ~ `string`
@@ -300,7 +330,7 @@ Override the "cert-manager.fullname" value. This value is used as part of most o
300330
301331
#### **nameOverride** ~ `string`
302332
303-
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use eg. "cainjector.name" which resolves to the value "cainjector").
333+
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use, e.g., "cainjector.name" which resolves to the value "cainjector").
304334
305335
#### **serviceAccount.create** ~ `bool`
306336
> Default value:
@@ -316,7 +346,13 @@ If not set and create is true, a name is generated using the fullname template.
316346
317347
#### **serviceAccount.annotations** ~ `object`
318348
319-
Optional additional annotations to add to the controller's Service Account.
349+
Optional additional annotations to add to the controller's Service Account. Templates are allowed for both keys and values.
350+
Example using templating:
351+
352+
```yaml
353+
annotations:
354+
"{{ .Chart.Name }}-helm-chart/version": "{{ .Chart.Version }}"
355+
```
320356
321357
#### **serviceAccount.labels** ~ `object`
322358
@@ -364,17 +400,26 @@ config:
364400
kubernetesAPIQPS: 9000
365401
kubernetesAPIBurst: 9000
366402
numberOfConcurrentWorkers: 200
403+
enableGatewayAPI: true
404+
# Feature gates as of v1.18.1. Listed with their default values.
405+
# See https://cert-manager.io/docs/cli/controller/
367406
featureGates:
368-
AdditionalCertificateOutputFormats: true
369-
DisallowInsecureCSRUsageDefinition: true
370-
ExperimentalCertificateSigningRequestControllers: true
371-
ExperimentalGatewayAPISupport: true
372-
LiteralCertificateSubject: true
373-
SecretsFilteredCaching: true
374-
ServerSideApply: true
375-
StableCertificateRequestName: true
376-
UseCertificateRequestBasicConstraints: true
377-
ValidateCAA: true
407+
AdditionalCertificateOutputFormats: true # GA - default=true
408+
AllAlpha: false # ALPHA - default=false
409+
AllBeta: false # BETA - default=false
410+
ExperimentalCertificateSigningRequestControllers: false # ALPHA - default=false
411+
ExperimentalGatewayAPISupport: true # BETA - default=true
412+
LiteralCertificateSubject: true # BETA - default=true
413+
NameConstraints: true # BETA - default=true
414+
OtherNames: false # ALPHA - default=false
415+
SecretsFilteredCaching: true # BETA - default=true
416+
ServerSideApply: false # ALPHA - default=false
417+
StableCertificateRequestName: true # BETA - default=true
418+
UseCertificateRequestBasicConstraints: false # ALPHA - default=false
419+
UseDomainQualifiedFinalizer: true # GA - default=true
420+
ValidateCAA: false # ALPHA - default=false
421+
DefaultPrivateKeyRotationPolicyAlways: true # BETA - default=true
422+
ACMEHTTP01IngressPathTypeExact: true # BETA - default=true
378423
# Configure the metrics server for TLS
379424
# See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
380425
metricsTLSConfig:
@@ -412,7 +457,7 @@ Option to disable cert-manager's build-in auto-approver. The auto-approver appro
412457
> - clusterissuers.cert-manager.io/*
413458
> ```
414459
415-
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because eg. you are using approver-policy, you can enable 'disableAutoApproval'.
460+
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because, e.g., you are using approver-policy, you can enable 'disableAutoApproval'.
416461
ref: https://cert-manager.io/docs/concepts/certificaterequest/#approval
417462
418463
#### **extraArgs** ~ `array`
@@ -671,7 +716,7 @@ enableServiceLinks indicates whether information about services should be inject
671716
672717
Enable Prometheus monitoring for the cert-manager controller and webhook. If you use the Prometheus Operator, set prometheus.podmonitor.enabled or prometheus.servicemonitor.enabled, to create a PodMonitor or a
673718
ServiceMonitor resource.
674-
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you can not enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
719+
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you cannot enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
675720
#### **prometheus.servicemonitor.enabled** ~ `bool`
676721
> Default value:
677722
> ```yaml
@@ -690,13 +735,14 @@ The namespace that the service monitor should live in, defaults to the cert-mana
690735
> ```
691736
692737
Specifies the `prometheus` label on the created ServiceMonitor. This is used when different Prometheus instances have label selectors matching different ServiceMonitors.
693-
#### **prometheus.servicemonitor.targetPort** ~ `number`
738+
#### **prometheus.servicemonitor.targetPort** ~ `string,integer`
694739
> Default value:
695740
> ```yaml
696-
> 9402
741+
> http-metrics
697742
> ```
698743
699744
The target port to set on the ServiceMonitor. This must match the port that the cert-manager controller is listening on for metrics.
745+
700746
#### **prometheus.servicemonitor.path** ~ `string`
701747
> Default value:
702748
> ```yaml
@@ -956,13 +1002,13 @@ This prevents downtime during voluntary disruptions such as during a Node upgrad
9561002
Pod is currently running.
9571003
#### **webhook.podDisruptionBudget.minAvailable** ~ `unknown`
9581004
959-
This property configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
1005+
This property configures the minimum available pods for disruptions. Can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%).
9601006
It cannot be used if `maxUnavailable` is set.
9611007
9621008
9631009
#### **webhook.podDisruptionBudget.maxUnavailable** ~ `unknown`
9641010
965-
This property configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
1011+
This property configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%).
9661012
It cannot be used if `minAvailable` is set.
9671013
9681014
@@ -1280,6 +1326,8 @@ Create network policies for the webhooks.
12801326
> - from:
12811327
> - ipBlock:
12821328
> cidr: 0.0.0.0/0
1329+
> - ipBlock:
1330+
> cidr: ::/0
12831331
> ```
12841332
12851333
Ingress rule for the webhook network policy. By default, it allows all inbound traffic.
@@ -1301,6 +1349,8 @@ Ingress rule for the webhook network policy. By default, it allows all inbound t
13011349
> to:
13021350
> - ipBlock:
13031351
> cidr: 0.0.0.0/0
1352+
> - ipBlock:
1353+
> cidr: ::/0
13041354
> ```
13051355
13061356
Egress rule for the webhook network policy. By default, it allows all outbound traffic to ports 80 and 443, as well as DNS ports.
@@ -1429,14 +1479,14 @@ Pod is currently running.
14291479
#### **cainjector.podDisruptionBudget.minAvailable** ~ `unknown`
14301480
14311481
`minAvailable` configures the minimum available pods for disruptions. It can either be set to
1432-
an integer (e.g. 1) or a percentage value (e.g. 25%).
1482+
an integer (e.g., 1) or a percentage value (e.g., 25%).
14331483
Cannot be used if `maxUnavailable` is set.
14341484
14351485
14361486
#### **cainjector.podDisruptionBudget.maxUnavailable** ~ `unknown`
14371487
14381488
`maxUnavailable` configures the maximum unavailable pods for disruptions. It can either be set to
1439-
an integer (e.g. 1) or a percentage value (e.g. 25%).
1489+
an integer (e.g., 1) or a percentage value (e.g., 25%).
14401490
Cannot be used if `minAvailable` is set.
14411491
14421492

charts/cert-manager/cert-manager/charts/cert-manager/templates/NOTES.txt

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,12 @@
11
{{- if .Values.installCRDs }}
22
⚠️ WARNING: `installCRDs` is deprecated, use `crds.enabled` instead.
3+
34
{{- end }}
5+
⚠️ WARNING: New default private key rotation policy for Certificate resources.
6+
The default private key rotation policy for Certificate resources was
7+
changed to `Always` in cert-manager >= v1.18.0.
8+
Learn more in the [1.18 release notes](https://cert-manager.io/docs/releases/release-notes/release-notes-1.18).
9+
410
cert-manager {{ .Chart.AppVersion }} has been deployed successfully!
511

612
In order to begin issuing certificates, you will need to set up a ClusterIssuer

charts/cert-manager/cert-manager/charts/cert-manager/templates/_helpers.tpl

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,17 @@ See https://github.com/cert-manager/cert-manager/issues/6329 for a list of linke
187187
{{- end }}
188188
{{- end }}
189189

190+
{{/*
191+
Labels for the CRD resources.
192+
*/}}
193+
{{- define "cert-manager.crd-labels" -}}
194+
app: "{{ template "cert-manager.name" . }}"
195+
app.kubernetes.io/name: "{{ template "cert-manager.name" . }}"
196+
app.kubernetes.io/instance: "{{ .Release.Name }}"
197+
app.kubernetes.io/component: "crds"
198+
{{ include "labels" . }}
199+
{{- end -}}
200+
190201
{{/*
191202
Check that the user has not set both .installCRDs and .crds.enabled or
192203
set .installCRDs and disabled .crds.keep.

charts/cert-manager/cert-manager/charts/cert-manager/templates/cainjector-deployment.yaml

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,12 @@ spec:
5353
prometheus.io/port: '9402'
5454
{{- end }}
5555
spec:
56+
{{- if not .Values.cainjector.serviceAccount.create }}
57+
{{- with .Values.global.imagePullSecrets }}
58+
imagePullSecrets:
59+
{{- toYaml . | nindent 8 }}
60+
{{- end }}
61+
{{- end }}
5662
serviceAccountName: {{ template "cainjector.serviceAccountName" . }}
5763
{{- if hasKey .Values.cainjector "automountServiceAccountToken" }}
5864
automountServiceAccountToken: {{ .Values.cainjector.automountServiceAccountToken }}
@@ -61,6 +67,9 @@ spec:
6167
{{- with .Values.global.priorityClassName }}
6268
priorityClassName: {{ . | quote }}
6369
{{- end }}
70+
{{- if (hasKey .Values.global "hostUsers") }}
71+
hostUsers: {{ .Values.global.hostUsers }}
72+
{{- end }}
6473
{{- with .Values.cainjector.securityContext }}
6574
securityContext:
6675
{{- toYaml . | nindent 8 }}
@@ -130,9 +139,11 @@ spec:
130139
{{- toYaml . | nindent 12 }}
131140
{{- end }}
132141
{{- end }}
133-
{{- with .Values.cainjector.nodeSelector }}
142+
{{- with (coalesce .Values.cainjector.nodeSelector .Values.global.nodeSelector) }}
134143
nodeSelector:
135-
{{- toYaml . | nindent 8 }}
144+
{{- range $key, $value := . }}
145+
{{ $key }}: {{ $value | quote }}
146+
{{- end }}
136147
{{- end }}
137148
{{- with .Values.cainjector.affinity }}
138149
affinity:

charts/cert-manager/cert-manager/charts/cert-manager/templates/cainjector-service.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
{{- if .Values.cainjector.enabled }}
12
{{- if and .Values.prometheus.enabled (not .Values.prometheus.podmonitor.enabled) }}
23
apiVersion: v1
34
kind: Service
@@ -28,3 +29,4 @@ spec:
2829
app.kubernetes.io/instance: {{ .Release.Name }}
2930
app.kubernetes.io/component: "cainjector"
3031
{{- end }}
32+
{{- end }}

0 commit comments

Comments
 (0)