Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(helm): update chart cert-manager ( v1.15.3 → v1.16.0 ) #4073

Merged
merged 3 commits into from
Oct 4, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Oct 3, 2024

This PR contains the following updates:

Package Update Change
cert-manager (source) minor v1.15.3 -> v1.16.0

Release Notes

cert-manager/cert-manager (cert-manager)

v1.16.0

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

| datasource | package      | from    | to      |
| ---------- | ------------ | ------- | ------- |
| helm       | cert-manager | v1.15.3 | v1.16.0 |


Signed-off-by: Jeff Billimek <billimek@users.noreply.github.com>
@renovate renovate bot force-pushed the renovate/cert-manager-1.x branch from f1fe165 to c82687c Compare October 4, 2024 17:58
Enable the installation of CRDs by setting the `crds` field to `enabled: true` in the values configuration. This change ensures that CRDs are installed as part of the chart deployment process, allowing for proper functioning of cert-manager.
Removing the webhook section from the cert-manager chart configuration file as it is no longer needed.
Copy link

github-actions bot commented Oct 4, 2024

Helm Release Diff: cert-manager/chart/cert-manager-chart.yaml

--- /tmp/tmp.2HaIXm1qRx	2024-10-04 18:05:51.326112933 +0000
+++ /tmp/tmp.aomxYOkFtk	2024-10-04 18:05:52.792111734 +0000
@@ -310,7 +310,7 @@
 ---
 # Source: cert-manager/templates/rbac.yaml
 # Permission to:
-# - Update and sign CertificatSigningeRequests referencing cert-manager.io Issuers and ClusterIssuers
+# - Update and sign CertificateSigningRequests referencing cert-manager.io Issuers and ClusterIssuers
 # - Perform SubjectAccessReviews to test whether users are able to reference Namespaced Issuers
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
@@ -488,8 +488,7 @@
   kind: ClusterRole
   name: cert-manager-webhook:subjectaccessreviews
 subjects:
-  - apiGroup: ""
-    kind: ServiceAccount
+  - kind: ServiceAccount
     name: cert-manager-webhook
     namespace: default
 
@@ -536,6 +535,19 @@
     verbs: [ "create" ]
 
 ---
+# Source: cert-manager/templates/rbac.yaml
+apiVersion: rbac.authorization.k8s.io/v1
+kind: Role
+metadata:
+  name: cert-manager-tokenrequest
+  namespace: default
+rules:
+  - apiGroups: [ "" ]
+    resources: [ "serviceaccounts/token" ]
+    resourceNames: [ "cert-manager" ]
+    verbs: [ "create" ]
+
+---
 # Source: cert-manager/templates/webhook-rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: Role
@@ -585,8 +597,24 @@
   kind: Role
   name: cert-manager:leaderelection
 subjects:
-  - apiGroup: ""
-    kind: ServiceAccount
+  - kind: ServiceAccount
+    name: cert-manager
+    namespace: default
+
+---
+# Source: cert-manager/templates/rbac.yaml
+# grant cert-manager permission to create tokens for the serviceaccount
+apiVersion: rbac.authorization.k8s.io/v1
+kind: RoleBinding
+metadata:
+  name: cert-manager-cert-manager-tokenrequest
+  namespace: default
+roleRef:
+  apiGroup: rbac.authorization.k8s.io
+  kind: Role
+  name: cert-manager-tokenrequest
+subjects:
+  - kind: ServiceAccount
     name: cert-manager
     namespace: default
 
@@ -602,12 +630,29 @@
   kind: Role
   name: cert-manager-webhook:dynamic-serving
 subjects:
-  - apiGroup: ""
-    kind: ServiceAccount
+  - kind: ServiceAccount
     name: cert-manager-webhook
     namespace: default
 
 ---
+# Source: cert-manager/templates/cainjector-service.yaml
+apiVersion: v1
+kind: Service
+metadata:
+  name: cert-manager-cainjector
+  namespace: default
+spec:
+  type: ClusterIP
+  ports:
+    - protocol: TCP
+      port: 9402
+      name: http-metrics
+  selector:
+    app.kubernetes.io/name: cainjector
+    app.kubernetes.io/instance: cert-manager
+    app.kubernetes.io/component: "cainjector"
+
+---
 # Source: cert-manager/templates/service.yaml
 apiVersion: v1
 kind: Service
@@ -640,6 +685,10 @@
       port: 443
       protocol: TCP
       targetPort: "https"
+    - name: metrics
+      port: 9402
+      protocol: TCP
+      targetPort: "http-metrics"
   selector:
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: cert-manager
@@ -670,11 +719,15 @@
           type: RuntimeDefault
       containers:
         - name: cert-manager-cainjector
-          image: "quay.io/jetstack/cert-manager-cainjector:v1.15.3"
+          image: "quay.io/jetstack/cert-manager-cainjector:v1.16.0"
           imagePullPolicy: IfNotPresent
           args:
             - --v=2
             - --leader-election-namespace=kube-system
+          ports:
+            - containerPort: 9402
+              name: http-metrics
+              protocol: TCP
           env:
             - name: POD_NAMESPACE
               valueFrom:
@@ -714,13 +767,13 @@
           type: RuntimeDefault
       containers:
         - name: cert-manager-controller
-          image: "quay.io/jetstack/cert-manager-controller:v1.15.3"
+          image: "quay.io/jetstack/cert-manager-controller:v1.16.0"
           imagePullPolicy: IfNotPresent
           args:
             - --v=2
             - --cluster-resource-namespace=$(POD_NAMESPACE)
             - --leader-election-namespace=kube-system
-            - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.15.3
+            - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.16.0
             - --dns01-recursive-nameservers=1.1.1.1:53
             - --dns01-recursive-nameservers-only
             - --max-concurrent-challenges=60
@@ -783,7 +836,7 @@
           type: RuntimeDefault
       containers:
         - name: cert-manager-webhook
-          image: "quay.io/jetstack/cert-manager-webhook:v1.15.3"
+          image: "quay.io/jetstack/cert-manager-webhook:v1.16.0"
           imagePullPolicy: IfNotPresent
           args:
             - --v=2
@@ -801,6 +854,9 @@
             - name: healthcheck
               protocol: TCP
               containerPort: 6080
+            - containerPort: 9402
+              name: http-metrics
+              protocol: TCP
           livenessProbe:
             httpGet:
               path: /livez
@@ -879,10 +935,23 @@
 spec:
   jobLabel: cert-manager
   selector:
-    matchLabels:
-      app.kubernetes.io/name: cert-manager
-      app.kubernetes.io/instance: cert-manager
-      app.kubernetes.io/component: "controller"
+    matchExpressions:
+      - key: app.kubernetes.io/name
+        operator: In
+        values:
+          - cainjector
+          - cert-manager
+          - webhook
+      - key: app.kubernetes.io/instance
+        operator: In
+        values:
+          - cert-manager
+      - key: app.kubernetes.io/component
+        operator: In
+        values:
+          - cainjector
+          - controller
+          - webhook
   endpoints:
     - targetPort: 9402
       path: /metrics
@@ -958,7 +1027,7 @@
     helm.sh/hook-weight: "-5"
 rules:
   - apiGroups: [ "cert-manager.io" ]
-    resources: [ "certificates" ]
+    resources: [ "certificaterequests" ]
     verbs: [ "create" ]
 
 ---
@@ -1006,7 +1075,7 @@
           type: RuntimeDefault
       containers:
         - name: cert-manager-startupapicheck
-          image: "quay.io/jetstack/cert-manager-startupapicheck:v1.15.3"
+          image: "quay.io/jetstack/cert-manager-startupapicheck:v1.16.0"
           imagePullPolicy: IfNotPresent
           args:
             - check
@@ -1019,5 +1088,10 @@
               drop:
                 - ALL
             readOnlyRootFilesystem: true
+          env:
+            - name: POD_NAMESPACE
+              valueFrom:
+                fieldRef:
+                  fieldPath: metadata.namespace
       nodeSelector:
         kubernetes.io/os: linux

@billimek billimek merged commit b1e3bd3 into master Oct 4, 2024
2 checks passed
@billimek billimek deleted the renovate/cert-manager-1.x branch October 4, 2024 18:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant