Skip to content

Commit fa70098

Browse files
Merge pull request #1709 from cert-manager/master
Sync the release-next branch with master
2 parents 1557f70 + 70d6b60 commit fa70098

File tree

17 files changed

+96
-62
lines changed

17 files changed

+96
-62
lines changed

.github/workflows/make-self-upgrade.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ jobs:
4242
run: |
4343
make print-go-version >> "$GITHUB_OUTPUT"
4444
45-
- uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
45+
- uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5.5.0
4646
with:
4747
go-version: ${{ steps.go-version.outputs.result }}
4848

.spelling

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -440,6 +440,7 @@ jsoref
440440
justinkillen
441441
keystore
442442
keystores
443+
keyvault-issuer
443444
kit837
444445
kms-issuer
445446
kube-cert-manager

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ For example, the [manifest for the docs section](https://github.com/cert-manager
9090
contains the expected path for every file.
9191

9292
If you're adding a top-level page which should only appear in the `docs/` section (such as the existing "contributing" section)
93-
then add `"x-only-docs": true` underneath the title in `manifest.json`. This will cause that section to be removed when a new versioned docs section.
93+
then add `"x-only-docs": true` underneath the title in `manifest.json`. This will cause that section to be removed when a new versioned docs section is added.
9494

9595
Likewise, if a folder shouldn't be copied from `docs/` to a versioned section, add a file called `.x-only-docs` to that folder, and it will be removed from any newly created versioned documentation.
9696

content/docs/configuration/acme/README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -60,13 +60,13 @@ spec:
6060
server: https://acme-staging-v02.api.letsencrypt.org/directory
6161
privateKeySecretRef:
6262
# Secret resource that will be used to store the account's private key.
63-
# This is your identity with your ACME provider. Any secret name
64-
# may be chosen. It will be populated with data automatically,
65-
# so generally nothing further needs to be done with
66-
# the secret. If you lose this identity/secret, you will be able to
67-
# generate a new one and generate certificates for any/all domains
68-
# managed using your previous account, but you will be unable to revoke
69-
# any certificates generated using that previous account.
63+
# This is your identity with your ACME provider. Any secret name may be
64+
# chosen. It will be populated with data automatically, so generally
65+
# nothing further needs to be done with the secret. If you lose this
66+
# identity/secret, you will be able to generate a new one and generate
67+
# certificates for any/all domains managed using your previous account,
68+
# but you will be unable to revoke any certificates generated using that
69+
# previous account.
7070
name: example-issuer-account-key
7171
# Add a single challenge solver, HTTP01 using nginx
7272
solvers:

content/docs/configuration/acme/dns01/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,7 @@ Links to these supported providers along with their documentation are below:
187187
- [`cert-manager-webhook-vercel`](https://github.com/rhythmbhiwani/cert-manager-webhook-vercel)
188188
- [`cert-manager-webhook-opentelekomcloud`](https://github.com/akyriako/cert-manager-webhook-opentelekomcloud)
189189
- [`cert-manager-webhook-abion`](https://github.com/abiondevelopment/cert-manager-webhook-abion)
190+
- [`cert-manager-webhook-glesys`](https://github.com/sthlmio/cert-manager-webhook-glesys)
190191

191192
You can find more information on how to configure webhook providers [here](./webhook.md).
192193

content/docs/configuration/ca.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ You should bear the following in mind:
112112
- You'll need to track the expiry of _all_ certificates in the chain
113113
- Updating the secret used for the CA certificate won't trigger re-issuance of leaf certificates
114114
- If your CA was near expiry and your leaf certs weren't, you'll need to manually trigger re-issuance of the leaf certs
115-
- `cmctl renew` may be helpful for this (see the [docs](../reference/cmctl.md#renew) for `cmctl`)
115+
- `cmctl renew` may be helpful for this (see the [`cmctl` docs](../reference/cmctl.md#renew))
116116
- CA issuers don't validate that the CA you configure is a "valid" CA
117117
- At a minimum, CA certs should have the basic constraints extension present with `isCA` set to true
118118
- The basic constraints extension with `isCA` set to true is required, but other requirements are not checked

content/docs/configuration/issuers.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ The following list contains all known cert-manager issuer integrations.
3232
| 🥉 | tcs-issuer | [📄][config:tcs-issuer] | [Intel's SGX technology][ca:tcs-issuer] | - | [][release:tcs-issuer] | ✔️ |
3333
| 🥉 | freeipa-issuer | [📄][config:freeipa-issuer] | [FreeIPA][ca:freeipa-issuer] | - | [][release:freeipa-issuer] | ✔️ |
3434
| 🥉 | kms-issuer | [📄][config:kms-issuer] | [AWS KMS][ca:kms-issuer] | - | [][release:kms-issuer] | ✔️ |
35+
| 🥉 | keyvault-issuer | [📄][config:keyvault-issuer] | [Azure Key Vault][ca:keyvault-issuer] | - | [][release:keyvault-issuer] | ✔️ |
3536

3637
</div>
3738

@@ -65,6 +66,7 @@ The following list contains all known cert-manager issuer integrations.
6566
[config:cfmtls-issuer]: https://github.com/k8stooling/cfmtls-issuer
6667
[config:cview-issuer]: https://secure-ly.github.io/cview-issuer-chart
6768
[config:czertainly-issuer]: https://docs.czertainly.com/docs/certificate-key/integration-guides/cert-manager-issuer/create-czertainly-issuer
69+
[config:keyvault-issuer]: https://github.com/gonicus/azure-keyvault-issuer
6870

6971
[//]: # (CA docs)
7072

@@ -89,6 +91,7 @@ The following list contains all known cert-manager issuer integrations.
8991
[ca:origin-ca-issuer]: https://developers.cloudflare.com/ssl/origin-configuration/origin-ca
9092
[ca:cview-issuer]: https://secure-ly.github.io/cview-issuer-chart
9193
[ca:czertainly-issuer]: https://www.czertainly.com
94+
[ca:keyvault-issuer]: https://learn.microsoft.com/en-us/azure/key-vault/keys/about-keys
9295

9396
[//]: # (Release pages)
9497

@@ -111,6 +114,7 @@ The following list contains all known cert-manager issuer integrations.
111114
[release:cfmtls-issuer]: https://github.com/k8stooling/cfmtls-issuer/releases/
112115
[release:cview-issuer]: https://github.com/secure-ly/cview-issuer-chart/releases
113116
[release:czertainly-issuer]: https://github.com/CZERTAINLY/CZERTAINLY-Cert-Manager-Issuer/releases
117+
[release:keyvault-issuer]: https://github.com/gonicus/azure-keyvault-issuer/releases
114118

115119
- The issuers are sorted by their tier and then alphabetically.
116120
- "in-tree" issuers are issuers that are shipped with cert-manager itself.
@@ -130,7 +134,6 @@ of tiers at any time.
130134

131135
### 🥇 Tier (Production-ready)
132136

133-
- 🥈 Tier criteria.
134137
- The issuer has an end-to-end tutorial on how to set it up with cert-manager for use in production.
135138
At the time of checking[^1], the used cert-manager version has to be still supported (see [Supported Releases](../releases/README.md)).
136139
An end-to-end tutorial must include:

content/docs/installation/helm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ dependencies:
9393
9494
You can then override the namespace in 2 ways:
9595
96-
1. In `Values.yaml` file
96+
1. In `values.yaml` file
9797
```yaml
9898
cert-manager: #defined by either the name or alias of your dependency in Chart.yaml
9999
namespace: security

content/docs/releases/README.md

Lines changed: 47 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ description: Supported releases, Kubernetes versions, OpenShift versions and upc
66
This page lists the status, timeline and policy for currently supported releases of cert-manager.
77

88
All cert-manager releases are supported at least until the release of a second subsequent version.
9-
That means there are always at least two supported versions of cert-manager at any given time,
10-
and possibly more if there's also a current Long Term Support version.
9+
That means there are always at least two supported versions of cert-manager. The open source cert-manager project
10+
doesn't maintain long term support (LTS) releases, but some [vendors](#long-term-support-releases) do provide LTS releases commercially.
1111

1212
We aim to do regular releases roughly every 4 months but release dates can vary when accounting for holidays,
1313
conferences (such as KubeCon), maintainer commitments and other world events.
@@ -23,15 +23,12 @@ should be stable enough to run.
2323
|:------------:|:------------:|:----------------------:|:----------------------------------------------:|:----------------------------------:|
2424
| [1.17][] | Feb 03, 2025 | Release of 1.19 | 1.29 → 1.32 / 4.16 → 4.17 | 1.29 → 1.32 |
2525
| [1.16][] | Oct 03, 2024 | Release of 1.18 | 1.25 → 1.32 / 4.14 → 4.17 | 1.27 → 1.31 |
26-
| [1.12 LTS][] | May 19, 2023 | May 19, 2025 | 1.22 → 1.32 / 4.9 → 4.16 | 1.22 → 1.29 |
27-
28-
cert-manager 1.12 is a Long Term Support (LTS) release sponsored by [Venafi](https://www.venafi.com/). It will be supported for 2 years from release.
2926

3027
## Upcoming releases
3128

3229
| Release | Release Date | End of Life | [Supported Kubernetes / OpenShift Versions][s] | [Tested Kubernetes Versions][test] |
3330
|:--------:|:------------:|:---------------:|:----------------------------------------------:|:----------------------------------:|
34-
| [1.18][] | Jun 04, 2025 | Release of 1.20 | 1.29 → 1.33 / 4.16 → 4.17 | 1.30 → 1.33 |
31+
| [1.18][] | Jun 10, 2025 | Release of 1.20 | 1.29 → 1.33 / 4.16 → 4.17 | 1.30 → 1.33 |
3532

3633
Dates in the future are not firm commitments and are subject to change.
3734

@@ -40,6 +37,23 @@ and release notes on [cert-manager.io](https://cert-manager.io/docs/release-note
4037

4138
We also maintain detailed [upgrade instructions](https://cert-manager.io/docs/releases/upgrading/).
4239

40+
<a id="long-term-support-releases"></a>
41+
## Long Term Support Releases
42+
43+
The cert-manager maintainers do not provide long term support (LTS) releases.
44+
45+
Once a version reaches end of life, there are no updates provided for that version and no further releases made.
46+
47+
Some vendors provide long term support releases commercially; the following LTS releases are available:
48+
49+
| Release | Vendor | End of Life |
50+
|:------------:|:------------:|:--------------:|
51+
| 1.17 LTS | [CyberArk][] | Feb 03 2027 |
52+
53+
[CyberArk]: https://docs.venafi.cloud/vaas/k8s-components/c-cm-releases/#cert-manager-long-term-support-lts-releases
54+
55+
(To add a release to this list, raise a PR and reach out on Slack)
56+
4357
## Support policy
4458

4559
<a id="supported-vs-tested"></a>
@@ -290,29 +304,33 @@ small change relative to the `<minor>` release.
290304
These cert-manager releases have reached their <abbr title="end-of-life">EOL</abbr> date and
291305
are no longer supported.
292306

293-
| Release | Release Date | EOL | Compatible Kubernetes versions | Compatible OpenShift versions |
294-
|----------|:------------:|:------------:|:------------------------------:|:-----------------------------:|
295-
| [1.15][] | Jun 05, 2024 | Feb 03, 2025 | 1.25 → 1.32 | 4.12 → 4.16 |
296-
| [1.14][] | Feb 03, 2024 | Oct 03, 2024 | 1.24 → 1.31 | 4.11 → 4.16 |
297-
| [1.13][] | Sep 12, 2023 | Jun 05, 2024 | 1.21 → 1.27 | 4.8 → 4.14 |
298-
| [1.11][] | Jan 11, 2023 | Sep 12, 2023 | 1.21 → 1.27 | 4.8 → 4.14 |
299-
| [1.10][] | Oct 17, 2022 | May 19, 2023 | 1.20 → 1.26 | 4.7 → 4.13 |
300-
| [1.9][] | Jul 22, 2022 | Jan 11, 2023 | 1.20 → 1.24 | 4.7 → 4.11 |
301-
| [1.8][] | Apr 05, 2022 | Oct 17, 2022 | 1.19 → 1.24 | 4.6 → 4.11 |
302-
| [1.7][] | Jan 26, 2021 | Jul 22, 2022 | 1.18 → 1.23 | 4.5 → 4.9 |
303-
| [1.6][] | Oct 26, 2021 | Apr 05, 2022 | 1.17 → 1.22 | 4.4 → 4.9 |
304-
| [1.5][] | Aug 11, 2021 | Jan 26, 2022 | 1.16 → 1.22 | 4.3 → 4.8 |
305-
| [1.4][] | Jun 15, 2021 | Oct 26, 2021 | 1.16 → 1.21 | 4.3 → 4.7 |
306-
| [1.3][] | Apr 08, 2021 | Aug 11, 2021 | 1.16 → 1.21 | 4.3 → 4.7 |
307-
| [1.2][] | Feb 10, 2021 | Jun 15, 2021 | 1.16 → 1.21 | 4.3 → 4.7 |
308-
| [1.1][] | Nov 24, 2020 | Apr 08, 2021 | 1.11 → 1.21 | 3.11 → 4.7 |
309-
| [1.0][] | Sep 02, 2020 | Feb 10, 2021 | 1.11 → 1.21 | 3.11 → 4.7 |
310-
| [0.16][] | Jul 23, 2020 | Nov 24, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
311-
| [0.15][] | May 06, 2020 | Sep 02, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
312-
| [0.14][] | Mar 11, 2020 | Jul 23, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
313-
| [0.13][] | Jan 21, 2020 | May 06, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
314-
| [0.12][] | Nov 27, 2019 | Mar 11, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
315-
| [0.11][] | Oct 10, 2019 | Jan 21, 2020 | 1.9 → 1.21 | 3.09 → 4.7 |
307+
| Release | Release Date | EOL | Compatible Kubernetes versions | Compatible OpenShift versions |
308+
|--------------|:------------:|:------------:|:------------------------------:|:-----------------------------:|
309+
| [1.15][] | Jun 05, 2024 | Feb 03, 2025 | 1.25 → 1.32 | 4.12 → 4.16 |
310+
| [1.14][] | Feb 03, 2024 | Oct 03, 2024 | 1.24 → 1.31 | 4.11 → 4.16 |
311+
| [1.13][] | Sep 12, 2023 | Jun 05, 2024 | 1.21 → 1.27 | 4.8 → 4.14 |
312+
| [1.12 LTS][] | May 19, 2023 | May 19, 2025 | 1.22 → 1.32 | 4.9 → 4.16 |
313+
| [1.11][] | Jan 11, 2023 | Sep 12, 2023 | 1.21 → 1.27 | 4.8 → 4.14 |
314+
| [1.10][] | Oct 17, 2022 | May 19, 2023 | 1.20 → 1.26 | 4.7 → 4.13 |
315+
| [1.9][] | Jul 22, 2022 | Jan 11, 2023 | 1.20 → 1.24 | 4.7 → 4.11 |
316+
| [1.8][] | Apr 05, 2022 | Oct 17, 2022 | 1.19 → 1.24 | 4.6 → 4.11 |
317+
| [1.7][] | Jan 26, 2021 | Jul 22, 2022 | 1.18 → 1.23 | 4.5 → 4.9 |
318+
| [1.6][] | Oct 26, 2021 | Apr 05, 2022 | 1.17 → 1.22 | 4.4 → 4.9 |
319+
| [1.5][] | Aug 11, 2021 | Jan 26, 2022 | 1.16 → 1.22 | 4.3 → 4.8 |
320+
| [1.4][] | Jun 15, 2021 | Oct 26, 2021 | 1.16 → 1.21 | 4.3 → 4.7 |
321+
| [1.3][] | Apr 08, 2021 | Aug 11, 2021 | 1.16 → 1.21 | 4.3 → 4.7 |
322+
| [1.2][] | Feb 10, 2021 | Jun 15, 2021 | 1.16 → 1.21 | 4.3 → 4.7 |
323+
| [1.1][] | Nov 24, 2020 | Apr 08, 2021 | 1.11 → 1.21 | 3.11 → 4.7 |
324+
| [1.0][] | Sep 02, 2020 | Feb 10, 2021 | 1.11 → 1.21 | 3.11 → 4.7 |
325+
| [0.16][] | Jul 23, 2020 | Nov 24, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
326+
| [0.15][] | May 06, 2020 | Sep 02, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
327+
| [0.14][] | Mar 11, 2020 | Jul 23, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
328+
| [0.13][] | Jan 21, 2020 | May 06, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
329+
| [0.12][] | Nov 27, 2019 | Mar 11, 2020 | 1.11 → 1.21 | 3.11 → 4.7 |
330+
| [0.11][] | Oct 10, 2019 | Jan 21, 2020 | 1.9 → 1.21 | 3.09 → 4.7 |
331+
332+
333+
NB: cert-manager 1.12 was a public Long Term Support (LTS) release sponsored by [Venafi](https://www.venafi.com/). It was supported for 2 years from release.
316334

317335
[s]: #kubernetes-supported-versions
318336
[test]: #supported-vs-tested

content/docs/releases/release-notes/release-notes-1.15.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ In addition, the version of Go used to build cert-manager 1.15 was updated along
112112
- Venafi Issuer now sends a cert-manager HTTP User-Agent header in all Venafi Rest API requests.
113113
For example: `cert-manager-certificaterequests-issuer-venafi/v1.15.0+(linux/amd64)+cert-manager/ef068a59008f6ed919b98a7177921ddc9e297200`. ([#6865](https://github.com/cert-manager/cert-manager/pull/6865), [@wallrj](https://github.com/wallrj))
114114
- Add hint to validation error message to help users of external issuers more easily fix the issue if they specify a Kind but forget the Group ([#6913](https://github.com/cert-manager/cert-manager/pull/6913), [@SgtCoDFish](https://github.com/SgtCoDFish))
115-
- Add support for numeric OID types in LiteralSubject. Eg. "1.2.3.4=String Value" ([#6775](https://github.com/cert-manager/cert-manager/pull/6775), [@inteon](https://github.com/inteon))
115+
- Add support for numeric OID types in LiteralSubject. E.g., "1.2.3.4=String Value" ([#6775](https://github.com/cert-manager/cert-manager/pull/6775), [@inteon](https://github.com/inteon))
116116
- Promote the `LiteralCertificateSubject` feature to Beta. ([#7030](https://github.com/cert-manager/cert-manager/pull/7030), [@inteon](https://github.com/inteon))
117117
- Promoted the `AdditionalCertificateOutputFormats` feature gate to Beta (enabled by default). ([#6970](https://github.com/cert-manager/cert-manager/pull/6970), [@erikgb](https://github.com/erikgb))
118118
- The Helm chart now allows you to supply `extraObjects`; a list of YAML manifests which will helm will install and uninstall with the cert-manager manifests. ([#6424](https://github.com/cert-manager/cert-manager/pull/6424), [@gplessis](https://github.com/gplessis))

0 commit comments

Comments
 (0)