Skip to content

Commit e71aaba

Browse files
authored
upgrade cert-manager to v1.18.0 (#154)
Signed-off-by: roc <[email protected]>
1 parent e491014 commit e71aaba

13 files changed

+256
-115
lines changed

incubator/cert-manager/Chart.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,20 +6,20 @@ annotations:
66
fingerprint: 1020CF3C033D4F35BAE1C19E1226061C665DF13E
77
url: https://cert-manager.io/public-keys/cert-manager-keyring-2021-09-20-1020CF3C033D4F35BAE1C19E1226061C665DF13E.gpg
88
apiVersion: v2
9-
appVersion: v1.17.1
9+
appVersion: v1.18.0
1010
description: A Helm chart for cert-manager
1111
home: https://cert-manager.io
1212
icon: https://cloudcache.tencent-cloud.com/qcloud/ui/static/Industry_tke/44fcdbc2-7461-4025-99c7-54608dfe700d.png
13+
maintainers:
14+
- name: rockerchen
15+
1316
keywords:
1417
- cert-manager
1518
- kube-lego
1619
- letsencrypt
1720
- tls
1821
kubeVersion: '>= 1.22.0-0'
19-
maintainers:
20-
- name: rockerchen
21-
2222
name: cert-manager
2323
sources:
2424
- https://github.com/cert-manager/cert-manager
25-
version: v1.17.1
25+
version: v1.18.0

incubator/cert-manager/README.md

Lines changed: 25 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Before installing the chart, you must first install the cert-manager CustomResou
1919
This is performed in a separate step to allow you to easily uninstall and reinstall cert-manager without deleting your installed custom resources.
2020

2121
```bash
22-
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.17.1/cert-manager.crds.yaml
22+
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.18.0/cert-manager.crds.yaml
2323
```
2424

2525
To install the chart with the release name `cert-manager`:
@@ -29,7 +29,7 @@ To install the chart with the release name `cert-manager`:
2929
$ helm repo add jetstack https://charts.jetstack.io --force-update
3030

3131
## Install the cert-manager helm chart
32-
$ helm install cert-manager --namespace cert-manager --version v1.17.1 jetstack/cert-manager
32+
$ helm install cert-manager --namespace cert-manager --version v1.18.0 jetstack/cert-manager
3333
```
3434

3535
In order to begin issuing certificates, you will need to set up a ClusterIssuer
@@ -65,7 +65,7 @@ If you want to completely uninstall cert-manager from your cluster, you will als
6565
delete the previously installed CustomResourceDefinition resources:
6666

6767
```console
68-
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.17.1/cert-manager.crds.yaml
68+
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.18.0/cert-manager.crds.yaml
6969
```
7070

7171
## Configuration
@@ -122,6 +122,13 @@ Create required ClusterRoles and ClusterRoleBindings for cert-manager.
122122
> ```
123123
124124
Aggregate ClusterRoles to Kubernetes default user-facing roles. For more information, see [User-facing roles](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles)
125+
#### **global.rbac.disableHTTPChallengesRole** ~ `bool`
126+
> Default value:
127+
> ```yaml
128+
> false
129+
> ```
130+
131+
To use HTTP-01 ACME challenges, cert-manager needs extra permissions to create pods. If you want to avoid this added permission and disable HTTP-01 set this value.
125132
#### **global.podSecurityPolicy.enabled** ~ `bool`
126133
> Default value:
127134
> ```yaml
@@ -230,13 +237,13 @@ This prevents downtime during voluntary disruptions such as during a Node upgrad
230237
Pod is currently running.
231238
#### **podDisruptionBudget.minAvailable** ~ `unknown`
232239
233-
This configures the minimum available pods for disruptions. It can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
240+
This configures the minimum available pods for disruptions. It can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%).
234241
It cannot be used if `maxUnavailable` is set.
235242
236243
237244
#### **podDisruptionBudget.maxUnavailable** ~ `unknown`
238245
239-
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%). it cannot be used if `minAvailable` is set.
246+
This configures the maximum unavailable pods for disruptions. It can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%). it cannot be used if `minAvailable` is set.
240247
241248
242249
#### **featureGates** ~ `string`
@@ -300,7 +307,7 @@ Override the "cert-manager.fullname" value. This value is used as part of most o
300307
301308
#### **nameOverride** ~ `string`
302309
303-
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use eg. "cainjector.name" which resolves to the value "cainjector").
310+
Override the "cert-manager.name" value, which is used to annotate some of the resources that are created by this Chart (using "app.kubernetes.io/name"). NOTE: There are some inconsistencies in the Helm chart when it comes to these annotations (some resources use, e.g., "cainjector.name" which resolves to the value "cainjector").
304311
305312
#### **serviceAccount.create** ~ `bool`
306313
> Default value:
@@ -371,10 +378,10 @@ config:
371378
kubernetesAPIBurst: 9000
372379
numberOfConcurrentWorkers: 200
373380
enableGatewayAPI: true
374-
# Feature gates as of v1.17.0. Listed with their default values.
381+
# Feature gates as of v1.18.0. Listed with their default values.
375382
# See https://cert-manager.io/docs/cli/controller/
376383
featureGates:
377-
AdditionalCertificateOutputFormats: true # BETA - default=true
384+
AdditionalCertificateOutputFormats: true # GA - default=true
378385
AllAlpha: false # ALPHA - default=false
379386
AllBeta: false # BETA - default=false
380387
ExperimentalCertificateSigningRequestControllers: false # ALPHA - default=false
@@ -386,7 +393,7 @@ config:
386393
ServerSideApply: false # ALPHA - default=false
387394
StableCertificateRequestName: true # BETA - default=true
388395
UseCertificateRequestBasicConstraints: false # ALPHA - default=false
389-
UseDomainQualifiedFinalizer: true # BETA - default=false
396+
UseDomainQualifiedFinalizer: true # GA - default=true
390397
ValidateCAA: false # ALPHA - default=false
391398
# Configure the metrics server for TLS
392399
# See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
@@ -425,7 +432,7 @@ Option to disable cert-manager's build-in auto-approver. The auto-approver appro
425432
> - clusterissuers.cert-manager.io/*
426433
> ```
427434
428-
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because eg. you are using approver-policy, you can enable 'disableAutoApproval'.
435+
List of signer names that cert-manager will approve by default. CertificateRequests referencing these signer names will be auto-approved by cert-manager. Defaults to just approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval, because, e.g., you are using approver-policy, you can enable 'disableAutoApproval'.
429436
ref: https://cert-manager.io/docs/concepts/certificaterequest/#approval
430437
431438
#### **extraArgs** ~ `array`
@@ -684,7 +691,7 @@ enableServiceLinks indicates whether information about services should be inject
684691
685692
Enable Prometheus monitoring for the cert-manager controller and webhook. If you use the Prometheus Operator, set prometheus.podmonitor.enabled or prometheus.servicemonitor.enabled, to create a PodMonitor or a
686693
ServiceMonitor resource.
687-
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you can not enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
694+
Otherwise, 'prometheus.io' annotations are added to the cert-manager and cert-manager-webhook Deployments. Note that you cannot enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
688695
#### **prometheus.servicemonitor.enabled** ~ `bool`
689696
> Default value:
690697
> ```yaml
@@ -703,13 +710,14 @@ The namespace that the service monitor should live in, defaults to the cert-mana
703710
> ```
704711
705712
Specifies the `prometheus` label on the created ServiceMonitor. This is used when different Prometheus instances have label selectors matching different ServiceMonitors.
706-
#### **prometheus.servicemonitor.targetPort** ~ `number`
713+
#### **prometheus.servicemonitor.targetPort** ~ `string,integer`
707714
> Default value:
708715
> ```yaml
709-
> 9402
716+
> http-metrics
710717
> ```
711718
712719
The target port to set on the ServiceMonitor. This must match the port that the cert-manager controller is listening on for metrics.
720+
713721
#### **prometheus.servicemonitor.path** ~ `string`
714722
> Default value:
715723
> ```yaml
@@ -969,13 +977,13 @@ This prevents downtime during voluntary disruptions such as during a Node upgrad
969977
Pod is currently running.
970978
#### **webhook.podDisruptionBudget.minAvailable** ~ `unknown`
971979
972-
This property configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
980+
This property configures the minimum available pods for disruptions. Can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%).
973981
It cannot be used if `maxUnavailable` is set.
974982
975983
976984
#### **webhook.podDisruptionBudget.maxUnavailable** ~ `unknown`
977985
978-
This property configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
986+
This property configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g., 1) or a percentage value (e.g., 25%).
979987
It cannot be used if `minAvailable` is set.
980988
981989
@@ -1442,14 +1450,14 @@ Pod is currently running.
14421450
#### **cainjector.podDisruptionBudget.minAvailable** ~ `unknown`
14431451
14441452
`minAvailable` configures the minimum available pods for disruptions. It can either be set to
1445-
an integer (e.g. 1) or a percentage value (e.g. 25%).
1453+
an integer (e.g., 1) or a percentage value (e.g., 25%).
14461454
Cannot be used if `maxUnavailable` is set.
14471455
14481456
14491457
#### **cainjector.podDisruptionBudget.maxUnavailable** ~ `unknown`
14501458
14511459
`maxUnavailable` configures the maximum unavailable pods for disruptions. It can either be set to
1452-
an integer (e.g. 1) or a percentage value (e.g. 25%).
1460+
an integer (e.g., 1) or a percentage value (e.g., 25%).
14531461
Cannot be used if `minAvailable` is set.
14541462
14551463

incubator/cert-manager/templates/NOTES.txt

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,12 @@
11
{{- if .Values.installCRDs }}
22
⚠️ WARNING: `installCRDs` is deprecated, use `crds.enabled` instead.
3+
34
{{- end }}
5+
⚠️ WARNING: New default private key rotation policy for Certificate resources.
6+
The default private key rotation policy for Certificate resources was
7+
changed to `Always` in cert-manager >= v1.18.0.
8+
Learn more in the [1.18 release notes](https://cert-manager.io/docs/releases/release-notes/release-notes-1.18).
9+
410
cert-manager {{ .Chart.AppVersion }} has been deployed successfully!
511

612
In order to begin issuing certificates, you will need to set up a ClusterIssuer

incubator/cert-manager/templates/cainjector-deployment.yaml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,9 @@ spec:
138138
{{- end }}
139139
{{- with .Values.cainjector.nodeSelector }}
140140
nodeSelector:
141-
{{- toYaml . | nindent 8 }}
141+
{{- range $key, $value := . }}
142+
{{ $key }}: {{ $value | quote }}
143+
{{- end }}
142144
{{- end }}
143145
{{- with .Values.cainjector.affinity }}
144146
affinity:

0 commit comments

Comments
 (0)