Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the all group with 3 updates #22

Merged
merged 1 commit into from
Feb 14, 2024

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 12, 2024

Bumps the all group with 3 updates: github.com/cert-manager/cert-manager, golang.org/x/crypto and sigs.k8s.io/controller-runtime.

Updates github.com/cert-manager/cert-manager from 1.13.3 to 1.14.2

Release notes

Sourced from github.com/cert-manager/cert-manager's releases.

v1.14.2

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

cert-manager 1.14 brings a variety of features, security improvements and bug fixes, including: support for creating X.509 certificates with "Other Name" fields, and support for creating CA certificates with "Name Constraints" and "Authority Information Accessors" extensions.

ℹ️ Documentation

Release notes Upgrade notes Installation instructions

🔧 Breaking changes

See Breaking changes in v1.14.0 release notes

📜 Changes since v1.14.1

Bug or Regression

  • BUGFIX: cert-manager CA and SelfSigned issuers incorrectly copied the critical flag from the CSR instead of re-calculating that field themselves. (#6727, @​jetstack-bot)
  • Helm: Fix a bug in the logic that differentiates between 0 and an empty value. (#6729, @​jetstack-bot)

Other (Cleanup or Flake)

v1.14.1

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

cert-manager 1.14 brings a variety of features, security improvements and bug fixes, including: support for creating X.509 certificates with "Other Name" fields, and support for creating CA certificates with "Name Constraints" and "Authority Information Accessors" extensions.

⚠️ This version has known issues. Please install v1.14.2 instead.

⚠️ Known Issues (fixed in v1.14.2)

  • In cert-manager v1.14.0 and v1.14.1, the CA and SelfSigned issuers issue certificates with SANs set to non-critical even when the subject is empty. It incorrectly copies the critical field from the CSR.

🔧 Breaking changes

See Breaking changes in v1.14.0 release notes

ℹ️ Documentation

📜 Changes since v1.14.0

Bug or Regression

  • Fix broken cainjector image value in Helm chart (#6693, @​SgtCoDFish)
  • Fix bug in cmctl namespace detection which prevented it being used as a startupapicheck image in namespaces other than cert-manager. (#6706, @​inteon)
  • Fix bug in cmctl which caused cmctl experimental install to panic. (#6706, @​inteon)

... (truncated)

Commits
  • 306e329 Merge pull request #6737 from jetstack-bot/cherry-pick-6734-to-release-1.14
  • 180c58e bump base images
  • 9bf4908 Merge pull request #6735 from jetstack-bot/cherry-pick-6732-to-release-1.14
  • 77c4bc3 bump golang
  • 0caa338 Merge pull request #6729 from jetstack-bot/cherry-pick-6713-to-release-1.14
  • 9f00466 add comments that explain the empty value trick
  • 201223a fix the Helm trick that we use to differentiate between 0 and an empty value
  • 2499e95 Merge pull request #6727 from jetstack-bot/cherry-pick-6724-to-release-1.14
  • 9ea674e fix changed behavior: set critical flag of SANs extension based on subject
  • 543d31c Merge pull request #6726 from jetstack-bot/cherry-pick-6725-to-release-1.14
  • Additional commits viewable in compare view

Updates golang.org/x/crypto from 0.18.0 to 0.19.0

Commits

Updates sigs.k8s.io/controller-runtime from 0.17.0 to 0.17.1

Release notes

Sourced from sigs.k8s.io/controller-runtime's releases.

v0.17.1

What's Changed

Full Changelog: kubernetes-sigs/controller-runtime@v0.17.0...v0.17.1

Commits
  • 5923139 Merge pull request #2676 from k8s-infra-cherrypick-robot/cherry-pick-2663-to-...
  • 0811bad Address review comments
  • 40b41df Clean restmapper cache if a version is notFound
  • See full diff in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the all group with 3 updates: [github.com/cert-manager/cert-manager](https://github.com/cert-manager/cert-manager), [golang.org/x/crypto](https://github.com/golang/crypto) and [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime).


Updates `github.com/cert-manager/cert-manager` from 1.13.3 to 1.14.2
- [Release notes](https://github.com/cert-manager/cert-manager/releases)
- [Commits](cert-manager/cert-manager@v1.13.3...v1.14.2)

Updates `golang.org/x/crypto` from 0.18.0 to 0.19.0
- [Commits](golang/crypto@v0.18.0...v0.19.0)

Updates `sigs.k8s.io/controller-runtime` from 0.17.0 to 0.17.1
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](kubernetes-sigs/controller-runtime@v0.17.0...v0.17.1)

---
updated-dependencies:
- dependency-name: github.com/cert-manager/cert-manager
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: golang.org/x/crypto
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: sigs.k8s.io/controller-runtime
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Feb 12, 2024
@jetstack-bot
Copy link
Contributor

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@inteon
Copy link
Member

inteon commented Feb 14, 2024

/approve
/lgtm

@jetstack-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: inteon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@jetstack-bot jetstack-bot merged commit c19a9d1 into main Feb 14, 2024
5 checks passed
@dependabot dependabot bot deleted the dependabot/go_modules/all-d6ab0c116c branch February 14, 2024 20:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved dco-signoff: yes dependencies Pull requests that update a dependency file go Pull requests that update Go code lgtm needs-ok-to-test size/L
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants