Skip to content

Commit 8d15c67

Browse files
Merge pull request #1679 from cert-manager/master
Merge the release-branch forward to match master
2 parents 23b1b84 + bee940a commit 8d15c67

File tree

391 files changed

+70337
-1045
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

391 files changed

+70337
-1045
lines changed

.github/dependabot.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# THIS FILE IS AUTOMATICALLY GENERATED. DO NOT EDIT.
2-
# Edit https://github.com/cert-manager/makefile-modules/blob/main/modules/repository-base/base/.github/dependabot.yaml instead.
2+
# Edit https://github.com/cert-manager/makefile-modules/blob/main/modules/repository-base/base-dependabot/.github/dependabot.yaml instead.
33

44
# Update Go dependencies and GitHub Actions dependencies daily.
55
version: 2

.github/workflows/make-self-upgrade.yaml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,13 +32,17 @@ jobs:
3232
echo "This workflow should not be run on a non-branch-head."
3333
exit 1
3434
35-
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
35+
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
36+
# Adding `fetch-depth: 0` makes sure tags are also fetched. We need
37+
# the tags so `git describe` returns a valid version.
38+
# see https://github.com/actions/checkout/issues/701 for extra info about this option
39+
with: { fetch-depth: 0 }
3640

3741
- id: go-version
3842
run: |
3943
make print-go-version >> "$GITHUB_OUTPUT"
4044
41-
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32 # v5.0.2
45+
- uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
4246
with:
4347
go-version: ${{ steps.go-version.outputs.result }}
4448

.spelling

Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,15 @@
1+
fuzzer
2+
fuzzers
3+
Fuzzer
4+
Fuzzers
15
phillebaba
6+
aidy
7+
bashlion
8+
7ing
9+
fadecore
10+
schedin
11+
ssyno
12+
ianarsenault
213
tberreis
314
allenmunC1
415
jeremycampbell
@@ -7,13 +18,29 @@ JoeNorth
718
tanujd11
819
asapekia
920
pevidex
21+
TheHenrick
22+
ilyesAj
23+
Peac36
24+
jochenrichter
25+
adam-sroka
26+
rquinio1A
27+
puerco
28+
fcrespofastly
1029
vinny
1130
lauraseidler
1231
ABWassim
1332
ThatsMrTalbot
1433
Pionerd
34+
tareksha
35+
LukeCarrier
36+
SHA-256
37+
SHA-384
38+
SHA-512
39+
3072-bit
40+
4096-bit
1541
andrey-dubnik
1642
bwaldrep
43+
sdarwin
1744
eplightning
1845
findnature
1946
gplessis
@@ -73,6 +100,9 @@ jwenz723
73100
seuf
74101
thirdeyenick
75102
MattiasGees
103+
Gamanji
104+
impactful
105+
Linkerd
76106
(sub)domains
77107
7opf
78108
ACLs
@@ -86,7 +116,10 @@ APIService
86116
APIServices
87117
APIs
88118
AWS
119+
SDK
120+
SDKs
89121
Akamai
122+
ANDed
90123
Anthos
91124
AppRole
92125
approvers
@@ -96,16 +129,22 @@ ArtifactHUB
96129
ArtifactHub
97130
AzureDNS
98131
BasicConstraints
132+
Bullseye
133+
Bookworm
99134
BKPR
100135
Bazel
101136
Bitnami
137+
BlueSky
102138
BobyMCbobs
103139
Bugfixes
104140
bugfix
105141
BundleSource
106142
BundleTarget
107143
BundleCondition
108144
NamespaceSelector
145+
CamelCase
146+
Cyberark
147+
CyberArk
109148
CAs
110149
CNAME
111150
CNAMEs
@@ -160,6 +199,7 @@ Dean-Coakley
160199
DigitalOcean
161200
OVHCloud
162201
Distroless
202+
DoesNotExist
163203
DuckDuckGo
164204
etcd
165205
EC2
@@ -234,6 +274,7 @@ NameCheap
234274
NGINX
235275
NLB
236276
NLBs
277+
NotIn
237278
Ocado
238279
OmairK
239280
OpenAPI
@@ -343,6 +384,7 @@ coderanger
343384
config
344385
containerd
345386
customizable
387+
defaultCAPackageVersion
346388
distroless
347389
e.g.
348390
e2e
@@ -426,8 +468,10 @@ multivalue
426468
macOS
427469
makefile
428470
manual-rotation-private-key
471+
matchExpressions
429472
mechanism
430473
metadata
474+
metadata.generation
431475
middleware
432476
migrate-api-version
433477
misconfiguration
@@ -444,6 +488,7 @@ namespaces
444488
ndegory
445489
oauth2
446490
OAuth
491+
observedGeneration
447492
onwards
448493
openshift-supported-versions
449494
plaintext
@@ -472,6 +517,7 @@ runtime
472517
runtimes
473518
signoff
474519
sigstore
520+
status.condition
475521
stdout
476522
subchart
477523
subcommand
@@ -501,6 +547,7 @@ unredacted
501547
unschedule
502548
untrusted
503549
upstream
550+
useDefaultCAs
504551
userinfo
505552
util
506553
vhosakot
@@ -515,8 +562,22 @@ v1.12.1
515562
v1.12.2
516563
v1.12.3
517564
v1.12.4
565+
v1.12.
518566
v1.13
567+
v1.14
568+
v1.15
569+
v1.15.
519570
v1.16
571+
v1.16.
572+
v1.16.0
573+
v1.16.1
574+
v1.17
575+
v1.17.
576+
v1.17.0
577+
v1.18.
578+
v1.18
579+
v1.18.0
580+
v1.18.0.
520581
v1.19
521582
v1.5
522583
v1.5.0
@@ -580,6 +641,7 @@ yann-soubeyrand
580641
yk
581642
mfmbarros
582643
maelvls
644+
Maël
583645
bitscuit
584646
zsh
585647
PodDisruptionBudget
@@ -732,7 +794,9 @@ venafi-issuer
732794
adcs-issuer
733795
cview-issuer
734796
cfssl-issuer
797+
cfmtls-issuer
735798
GlobalSign
799+
czertainly-issuer
736800

737801
# TEMPORARY
738802
# these are temporarily ignored because the spellchecker
@@ -758,3 +822,14 @@ Logics
758822
OpenSSF
759823
OSS-Fuzz
760824
Korczynski
825+
826+
CyberArk
827+
ContribFest
828+
Contribfest
829+
Zenior's
830+
Godding
831+
Boye
832+
READMEs
833+
K3d
834+
CyberArk
835+
90-minute

OWNERS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
approvers:
22
- cm-maintainers
3+
- hawksight
34
reviewers:
45
- cm-maintainers
56
- hawksight

OWNERS_ALIASES

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ aliases:
88
- wallrj
99
- jakexks
1010
- maelvls
11-
- irbekrm
1211
- sgtcodfish
1312
- inteon
1413
- thatsmrtalbot
14+
- erikgb

README.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,11 @@ site you're working on.
8989
For example, the [manifest for the docs section](https://github.com/cert-manager/website/blob/master/content/docs/manifest.json)
9090
contains the expected path for every file.
9191

92+
If you're adding a top-level page which should only appear in the `docs/` section (such as the existing "contributing" section)
93+
then add `"x-only-docs": true` underneath the title in `manifest.json`. This will cause that section to be removed when a new versioned docs section.
94+
95+
Likewise, if a folder shouldn't be copied from `docs/` to a versioned section, add a file called `.x-only-docs` to that folder, and it will be removed from any newly created versioned documentation.
96+
9297
### Task: Changing OpenGraph / social sharing tags
9398

9499
These tags are defined in Next.js code and config.

components/Footer.jsx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ export default function Footer() {
99
</div>
1010
<div className="bg-dark-2 pb-10 pt-5">
1111
<div className="container text-sm text-white">
12-
<p>&copy; 2024 The cert-manager Authors.</p>
12+
<p>&copy; 2025 The cert-manager Authors.</p>
1313
<p className="mb-6">
14-
&copy; 2024 The Linux Foundation. All rights reserved.
14+
&copy; 2025 The Linux Foundation. All rights reserved.
1515
</p>
1616
<p>
1717
The Linux Foundation has registered trademarks and uses trademarks.
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
slug: cert-manager-graduation
3+
title: cert-manager is now a CNCF Graduated Project!
4+
description: cert-manager joins Kubernetes itself at the Graduated level of the CNCF
5+
date: "2024-11-12T09:00:00Z"
6+
---
7+
8+
The 28th of November 2023 was an important day for the cert-manager project. We [raised](https://github.com/cncf/toc/pull/1212) our first issue on the road to becoming a CNCF Graduated project,
9+
which then grew into [another issue](https://github.com/cncf/toc/issues/1306), a [security audit](./2024-03-18-cert-manager-security-audit.md) and lots of [due diligence](https://github.com/cncf/toc/pull/1416)
10+
over the following months.
11+
12+
We took that step towards graduation chiefly because being Graduated is the highest rung of the ladder that a CNCF project can climb.
13+
14+
There's no higher level - Kubernetes itself is a CNCF Graduated project, along with other incredibly impactful and [noteworthy projects](https://www.cncf.io/projects/) such as Istio, Cilium, Linkerd and SPIFFE.
15+
16+
We're now incredibly proud to announce that the 12th of November 2024 is also an important day for cert-manager; we're now officially a CNCF Graduated Project!
17+
18+
The CNCF describes graduated projects as:
19+
20+
> Projects considered stable, widely adopted, and production ready, attracting thousands of contributors
21+
22+
We believe this description reflects cert-manager's place in the Cloud Native landscape. We've met hundreds of people at different KubeCon events who've told us that they rely on cert-manager
23+
in production across thousands of Kubernetes clusters. We treasure the trust that people place in us, and we remain dedicated to keeping cert-manager rock solid.
24+
25+
Graduation isn't just the end of a long process though - it's a chance to reaffirm our commitment to solving X.509 in Kubernetes.
26+
27+
There are interesting challenges ahead for cert-manager, and we're excited to be part of the solution.
28+
29+
First, consider quantum computers promising to break existing encryption. The process of migrating to post-quantum cryptography has already begun,
30+
and cert-manager stands ready to adopt standards when they're ready.
31+
32+
Second, think about the threat-strewn landscape of trust in Kubernetes containers today. trust-manager is growing rapidly, and we think it can
33+
help not only to manage everyday trust bundles, but also to increase response times for fixing trust issues in Kubernetes.
34+
35+
And of course, machine identities - including X.509 certs - are only proliferating faster as time goes on. cert-manager is ready to scale with that growth!
36+
37+
We'd like to finish by saying some thank yous:
38+
39+
First, we'd like to thank [Katie Gamanji](https://x.com/k_gamanji) who helped to shepherd our project through the graduation process; we quite literally couldn't have
40+
completed the process without her.
41+
42+
Second, we'd like to thank all those who were involved in helping during the process, including those who were interviewed,
43+
TAG Security and TAG Contributor Strategy, and many others for their feedback and advice.
44+
45+
Third, we'd like to thank [Venafi](https://venafi.com/) for sponsoring the bulk of the maintainer time required to see this process through.
46+
47+
Finally, thank you all for using cert-manager and being such a great community!
48+
49+
We're actively looking for more contributors, maintainers, and feedback from users; please reach out on [Slack](https://cert-manager.io/docs/contributing/#slack) or join one of our [regular meetings](https://cert-manager.io/docs/contributing/#meetings) if you're interested in getting involved!
50+
51+
Happy graduation to cert-manager!
52+
53+
- The cert-manager Maintainers
54+
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
slug: cert-manager-fuzzing-audit
3+
title: cert-manager Completes CNCF-Sponsored Fuzzing Audit
4+
description: As part of our graduation, cert-manager has completed a fuzzing audit.
5+
date: "2025-02-14T09:00:00Z"
6+
---
7+
8+
In November 2024, cert-manager began a fuzzing audit to ensure our fuzzing efforts meet the highest standards. The goal was to thoroughly test cert-manager through fuzzing, an important technique for identifying reliability issues and security vulnerabilities in software systems. A well-designed and implemented fuzzing suite enables us to effectively discover edge cases that we might not have otherwise known existed.
9+
10+
[Ada Logics](https://adalogics.com) carried out the fuzzing audit. They first assessed cert-manager's existing fuzzing setup [from its initial Graduation security audit](https://cert-manager.io/announcements/2024/03/18/cert-manager-security-audit). This setup was built around cert-manager's integration into [OSS-Fuzz](https://github.com/google/oss-fuzz), a free service by Google offering compute resources and state-of-the-art automation for critical open source tools.
11+
12+
Ada Logics built upon the initial fuzzing setup by creating fuzz tests for several of cert-manager's controllers. These new fuzzers work by setting up the controller they test and then invoking the controller to reconcile randomized Kubernetes resources derived from the fuzzer's test case. This approach specifically tests parts of cert-manager's threat model that lower-privileged users with cluster access might exploit. The goal is to ensure that users cannot pass malicious resources to cert-manager's controllers in a way that could negatively impact the controllers or other users. The new fuzzers from cert-manager's audit test this in an end-to-end manner, using a near-production setup.
13+
14+
During the fuzzing audit, no issues were found. OSS-Fuzz continues to run cert-manager’s fuzzers as long as it can build them, allowing the fuzzers to test future changes to the cert-manager source code. This continuous fuzzing process has previously played a key role in discovering security vulnerabilities: months after the initial Ada Logics security audit, one of the first fuzzers running on OSS-Fuzz identified a security issue in a parsing routine for PEM-encoded data; exploitation could have caused denial-of-service of cert-manager controllers.
15+
16+
With the completion of cert-manager's fuzzing audit, we have a state-of-the-art fuzzing suite that covers even more of our threat model. All of our security contacts are notified when OSS-Fuzz finds crashes from running the fuzzers continuously, and OSS-Fuzz sends an email to our security mailing list, too.
17+
18+
You can read the report from the audit [here](/docs/announcements/AdaLogics-2025-cert-manager-fuzzing-audit-report.pdf).
19+
20+
A huge thanks to Ada Logics for their superb work and of course to the CNCF for sponsoring!
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
---
2+
slug: contribfest-kubecon-eu-2025
3+
title: Join Us for ContribFest at KubeCon EU 2025 in London!
4+
description: The cert-manager maintainers are hosting a ContribFest event on 2nd April, 2025, and you are invited!
5+
date: "2025-03-11T12:00:00Z"
6+
---
7+
8+
9+
10+
Are you heading to KubeCon EU 2025 in London this April? If so, we have some exciting news: the cert-manager maintainers are hosting a [ContribFest event on Wednesday April 2, 2025 14:30 - 15:45 BST](https://kccnceu2025.sched.com/event/1tcxb/contribfest-dive-into-cert-manager-and-start-contributing) taking place on Level 3 in the ICC Capital Suite 1, and you are invited!
11+
12+
As a newly graduated CNCF project, there's never been a better time to get involved with cert-manager and make an impact in the Kubernetes ecosystem.
13+
14+
In this blog post, we will explain what ContribFest is and list first good issues to help you get started, whether you are joining us in London at KubeCon EU 2025 or participating from anywhere in the world.
15+
16+
## What is ContribFest?
17+
18+
ContribFest is an opportunity to join project maintainers and community contributors to explore good first issues, hunt bugs, discuss improvements, and pair program with maintainers to contribute directly to CNCF projects during a 90-minute session.
19+
20+
At this year's cert-manager ContribFest, maintainers including CyberArk's Maël Valais and Richard Wall, and Zenior's Erik Godding Boye will be on hand to show users of all experience levels how to get involved with the cert-manager project.
21+
22+
## Good First Issues
23+
24+
An updated list of open good first issues will be available in [this google sheet](https://docs.google.com/spreadsheets/d/1zThfUB22HHdHAiRvS3ctbj4Da7j30imnUleURjxTYE0/edit?usp=sharing).
25+
26+
## How to Prepare
27+
28+
To make the most of the event, here are a few tips:
29+
30+
- Familiarize yourself with the cert-manager project by exploring our [GitHub repository](https://github.com/cert-manager/cert-manager).
31+
- Read our [Contributor Guide](https://cert-manager.io/docs/contributing/) to understand the basics of contributing to cert-manager.
32+
- Join our community on the [Kubernetes Slack](https://slack.k8s.io/) in the `#cert-manager-dev` channel to ask questions and connect with the team.
33+
- Don't forget your laptop!
34+
35+
## Join Us!
36+
37+
If you're in London, you can join us for ContribFest on Wednesday April 2, 2025 14:30. It will take place at Level 3, ICC Capital Suite 1.
38+
39+
We’re looking forward to seeing you at KubeCon EU 2025 in London! Together, we’ll make cert-manager even better while fostering a stronger open-source community.
40+
41+
**See you at ContribFest!**
42+
43+
Stay connected by following us on [BlueSky](https://bsky.app/profile/cert-manager.bsky.social), [Mastodon](https://infosec.exchange/@CertManager), [Twitter](https://twitter.com/certmanager), joining us [on Slack](https://cert-manager.io/docs/contributing/#slack), and exploring our [Contributor Guide](https://cert-manager.io/docs/contributing/).

0 commit comments

Comments
 (0)