Update Helm release cert-manager to v1.18.0 #630
Reference in New Issue
Block a user
No description provided.
Delete Branch "renovate/cert-manager-1.x"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This PR contains the following updates:
v1.17.2
->v1.18.0
Release Notes
cert-manager/cert-manager (cert-manager)
v1.18.0
Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
cert-manager 1.18 introduces several new features and breaking changes. Highlights include support for ACME certificate profiles, a new default for
Certificate.Spec.PrivateKey.RotationPolicy
now set toAlways
(breaking change), and the defaultCertificate.Spec.RevisionHistoryLimit
now set to1
(potentially breaking).Known Issues
Changes since
v1.17.2
:Feature
app.kubernetes.io/managed-by: cert-manager
label to the created Let's Encrypt account keys (#7577, @terinjokes)certmanager_certificate_not_before_timestamp_seconds
,certmanager_certificate_not_after_timestamp_seconds
). (#7612, @solidDoWant)--extra-certificate-annotations
, which sets a list of annotation keys to be copied from Ingress-like to resulting Certificate object (#7083, @k0da)iss
short name for the cert-managerIssuer
resource. (#7373, @SgtCoDFish)ciss
short name for the cert-managerClusterIssuer
resource (#7373, @SgtCoDFish)global.rbac.disableHTTPChallengesRole
helm value to disable HTTP-01 ACME challenges. This allows cert-manager to drop its permission to create pods, improving security when HTTP-01 challenges are not required. (#7666, @ali-hamza-noor)FindZoneByFqdn
(#7596, @ThatsIvan)UseDomainQualifiedFinalizer
feature to GA. (#7735, @jsoref)Certificate.Spec.PrivateKey.RotationPolicy
changed fromNever
toAlways
. (#7723, @wallrj)Documentation
Bug or Regression
go-jose
dependency to addressCVE-2025-27144
. (#7606, @SgtCoDFish)golang.org/x/oauth2
to patchCVE-2025-22868
. (#7638, @NicholasBlaskey)golang.org/x/crypto
to patchGHSA-hcg3-q754-cr77
. (#7638, @NicholasBlaskey)github.com/golang-jwt/jwt
to patchGHSA-mh63-6h87-95cp
. (#7638, @NicholasBlaskey)ImplementationSpecific
toExact
for a reliable handling of ingress controllers and enhanced security. (#7767, @sspreitzer)--namespace=<namespace>
: limit the scope of cert-manager to a single namespace and disable cluster-scoped controllers. (#7678, @tsaarni)commonName
field; IP addresses are no longer added to the DNSsubjectAlternativeName
list and are instead added to theipAddresses
field as expected. (#7081, @johnjcool)certmanager_certificate_renewal_timestamp_seconds
metric help text indicating that the metric is relative to expiration time, rather than Unix epoch time. (#7609, @solidDoWant)Passthrough
mode. (#6986, @vehagn)golang.org/x/net
fixingCVE-2025-22870
. (#7619, @dependabot[bot])Other (Cleanup or Flake)
third_party/forked/acme
package with support for the ACME profiles extension. (#7776, @wallrj)AdditionalCertificateOutputFormats
feature to GA, making additional formats always enabled. (#7744, @erikgb)ValidateCAA
. Setting this feature gate is now a no-op which does nothing but print a warning log line (#7553, @SgtCoDFish)v1.24.4
(#7785, @wallrj)Configuration
📅 Schedule: Branch creation - Every minute ( * */1 * * * ) in timezone US/Central, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.
4e7606b4dc
to07f97f91cb
07f97f91cb
to5da26d2195
5da26d2195
to045151f287
045151f287
to0d0543da7c
0d0543da7c
to29cf414cff
29cf414cff
to8660b35dd0
8660b35dd0
to29c4b2c27f
29c4b2c27f
to75e29c6dfa
75e29c6dfa
to29c789abad
29c789abad
to48f14a4388
48f14a4388
tofbf97d49be
fbf97d49be
toaceaa30863
aceaa30863
toebf274fac2
ebf274fac2
tocc5fe09cd2
cc5fe09cd2
to96fd49f8f3
96fd49f8f3
to66934478c4
66934478c4
to45e158d622
45e158d622
toc0d7060960
c0d7060960
to3f0b7eeda0
3f0b7eeda0
to1c99de867a