Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Mar 7, 2025

Bumps the all group with 10 updates in the / directory:

Package From To
github.com/cert-manager/cert-manager 1.16.3 1.17.1
github.com/spf13/cobra 1.8.1 1.9.1
golang.org/x/crypto 0.32.0 0.36.0
helm.sh/helm/v3 3.17.0 3.17.1
k8s.io/api 0.32.1 0.32.2
k8s.io/apiextensions-apiserver 0.32.1 0.32.2
k8s.io/cli-runtime 0.32.1 0.32.2
k8s.io/kube-aggregator 0.32.1 0.32.2
k8s.io/kubectl 0.32.1 0.32.2
sigs.k8s.io/controller-runtime 0.20.1 0.20.2

Updates github.com/cert-manager/cert-manager from 1.16.3 to 1.17.1

Release notes

Sourced from github.com/cert-manager/cert-manager's releases.

v1.17.1

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

This release is primarily intended to address a breaking change in Cloudflare's API which impacted ACME DNS-01 challenges using Cloudflare.

Many thanks to the community members who reported this issue!

Changes by Kind

Bug or Regression

v1.17.0

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

v1.17.0 is a feature release with several improvements, including:

  • A helpful compliance change to RSA signatures on certificates
  • An easier way to specify passwords for PKCS#12 and JKS keystores
  • A few feature flag promotions (and a deprecation)
  • Dependency bumps and other smaller improvements

Major Themes

RSA Certificate Compliance

The United States Department of Defense published a memo in 2022 which introduced some requirements on the kinds of cryptography they require to be supported in software they use.

In effect, the memo requires that software be able to support larger RSA keys (3072-bit and 4096-bit) and hashing algorithms (SHA-384 at a minimum).

cert-manager supported large RSA keys long before the memo was published, but a quirk in implementation meant that cert-manager always used SHA-256 when signing with RSA.

In v1.17.0, cert-manager will choose a hash algorithm based on the RSA key length: 3072-bit keys will use SHA-384, and 4096-bit keys will use SHA-512. This matches similar behavior already present for ECDSA signatures.

Our expectation is that this change will have minimal impact beyond a slight increase to security and better compliance; we're not aware of Kubernetes based environments which support RSA 2048 with SHA-256 but fail with RSA 4096 and SHA-512. However, if you're using larger RSA keys, you should be aware of the change.

Easier Keystore Passwords for PKCS#12 and JKS

Specifying passwords on PKCS#12 and JKS keystores is supported in cert-manager for compatibility reasons with software which expects or requires passwords to be set; however, these passwords are not relevant to security and never have been in cert-manager.

The initial implementation of the keystores feature required these "passwords" to be stored in a Kubernetes secret, which would then be read by cert-manager when creating the keystore after a certificate was issued. This is cumbersome, especially when many passwords are set to default values such as changeit or password.

In cert-manager v1.17, it's now possible to set a keystore password using a literal string value inside the Certificate resource itself, making this process much easier with no change to security.

For example:

</tr></table> 

... (truncated)

Commits
  • c658224 Merge pull request #7565 from cert-manager-bot/cherry-pick-7549-to-release-1.17
  • 47828f2 Add comment explaining change
  • 2121860 chore(issuer/cloudflare): ensure we set ZoneID
  • bec3f95 Merge pull request #7563 from SgtCoDFish/release-1.17-bumpgo
  • a79a663 [release-1.17] disable klone generation step (see #7431)
  • 69a514e [release-1.17] bump go to v1.23.6
  • 4562b9a Merge pull request #6657 from rquinio1A/feature/keystore-password-litteral
  • c6f3f0c Merge pull request #7527 from SgtCoDFish/upgrade-test-tweaks
  • 40cd2a0 Add support for setting literal keystore passwords in Certificates
  • 1747743 Merge pull request #7530 from SgtCoDFish/dns-test-integration
  • Additional commits viewable in compare view

Updates github.com/spf13/cobra from 1.8.1 to 1.9.1

Release notes

Sourced from github.com/spf13/cobra's releases.

v1.9.1

🐛 Fixes

Full Changelog: spf13/cobra@v1.9.0...v1.9.1

v1.9.0

✨ Features

🐛 Fixes

🤖 Completions

🧪 Testing

✍🏼 Documentation

🔧 Dependency upgrades

... (truncated)

Commits

Updates golang.org/x/crypto from 0.32.0 to 0.36.0

Commits
  • 49bf5b8 go.mod: update golang.org/x dependencies
  • 24852b6 ssh: add decode support for banners
  • bbc689c ssh: use a more straightforward return value
  • 7292932 ssh: limit the size of the internal packet queue while waiting for KEX
  • f66f74b acme/autocert: check host policy before probing the cache
  • b0784b7 x509roots/fallback: drop obsolete build constraint
  • 911360c all: bump golang.org/x/crypto dependencies of asm generators
  • 89ff08d all: upgrade go directive to at least 1.23.0 [generated]
  • e47973b all: update certs for go1.24
  • 9290511 go.mod: update golang.org/x dependencies
  • Additional commits viewable in compare view

Updates golang.org/x/exp from 0.0.0-20240719175910-8a7402abbf56 to 0.0.0-20241217172543-b2144cdd0a67

Commits

Updates golang.org/x/sync from 0.10.0 to 0.12.0

Commits
  • b637f27 errgroup: drop support for Go versions before 1.20
  • 960bf1f all: upgrade go directive to at least 1.23.0 [generated]
  • fe3591b sync/errgroup: improve documentation for semaphore limit behavior
  • See full diff in compare view

Updates helm.sh/helm/v3 from 3.17.0 to 3.17.1

Release notes

Sourced from helm.sh/helm/v3's releases.

Helm v3.17.1 is a patch release. Users are encouraged to upgrade for the best experience. Users are encouraged to upgrade for the best experience.

The community keeps growing, and we'd love to see you there!

  • Join the discussion in Kubernetes Slack:
    • for questions and just to hang out
    • for discussing PRs, code, and bugs
  • Hang out at the Public Developer Call: Thursday, 9:30 Pacific via Zoom
  • Test, debug, and contribute charts: ArtifactHub/packages

Installation and Upgrading

Download Helm v3.17.1. The common platform binaries are here:

The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with bash.

What's Next

  • 3.17.2 is the next patch release and will be on March 12, 2025
  • 3.18.0 is the next minor release and will be on May 14, 2025

Changelog

  • add test for nullifying nested global value 980d8ac1939e39138101364400756af2bdee1da5 (Ryan Hockstad)
  • Add test case for removing an entire object c23e3b6c495658bb1eec04b32c8e4bfc5ef4dd60 (Ryan Hockstad)
  • Tests for bugfix: Override subcharts with null values #12879 3110d5ff63a0edcf6decac8288106b55a6f41760 (Scott Rigby)
  • merge null child chart objects 9520c71fb04783cdab111759f0f3c5d1cdc83f1c (Ryan Hockstad)
  • build(deps): bump the k8s-io group with 7 updates ab7dedd4cf47cb7455a283d93a1627a35933d634 (dependabot[bot])
  • fix: check group for resource info match a2d36029d5dba292073d23acea2ef59cfb429ee9 (Jiasheng Zhu)
Commits
  • 980d8ac add test for nullifying nested global value
  • c23e3b6 Add test case for removing an entire object
  • 3110d5f Tests for bugfix: Override subcharts with null values #12879
  • 9520c71 merge null child chart objects
  • ab7dedd build(deps): bump the k8s-io group with 7 updates
  • a2d3602 fix: check group for resource info match
  • See full diff in compare view

Updates k8s.io/api from 0.32.1 to 0.32.2

Commits

Updates k8s.io/apiextensions-apiserver from 0.32.1 to 0.32.2

Commits

Updates k8s.io/apimachinery from 0.32.1 to 0.32.2

Commits

Updates k8s.io/cli-runtime from 0.32.1 to 0.32.2

Commits

Updates k8s.io/client-go from 0.32.1 to 0.32.2

Commits

Updates k8s.io/component-base from 0.32.1 to 0.32.2

Commits

Updates k8s.io/kube-aggregator from 0.32.1 to 0.32.2

Commits

Updates k8s.io/kubectl from 0.32.1 to 0.32.2

Commits

Updates k8s.io/utils from 0.0.0-20241104100929-3ea5e8cea738 to 0.0.0-20241210054802-24370beab758

Commits

Updates sigs.k8s.io/controller-runtime from 0.20.1 to 0.20.2

Release notes

Sourced from sigs.k8s.io/controller-runtime's releases.

v0.20.2

What's Changed

Full Changelog: kubernetes-sigs/controller-runtime@v0.20.1...v0.20.2

Commits
  • 52b1791 [release-0.20] 🌱 Update dependencies, k8s 1.32.1 (#3108)
  • ed7d2a4 Merge pull request #3106 from k8s-infra-cherrypick-robot/cherry-pick-3103-to-...
  • cad72fa Fix behavior of rate limit option in priorityqueue.AddWithOpts
  • fc48583 [release-0.20] ✨ Expose all Go runtime metrics (#3100)
  • See full diff in compare view

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Mar 7, 2025
@cert-manager-prow cert-manager-prow bot added dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Mar 7, 2025
@cert-manager-prow
Copy link
Contributor

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@cert-manager-prow cert-manager-prow bot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Mar 7, 2025
@dependabot dependabot bot force-pushed the dependabot/go_modules/all-d873af957e branch from 91671f7 to b438855 Compare March 10, 2025 23:31
@inteon
Copy link
Member

inteon commented Mar 12, 2025

/approve
/lgtm

@cert-manager-prow cert-manager-prow bot added the lgtm Indicates that a PR is ready to be merged. label Mar 12, 2025
@cert-manager-prow
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: inteon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@cert-manager-prow cert-manager-prow bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 12, 2025
@SgtCoDFish
Copy link
Member

/ok-to-test
/retest

@cert-manager-prow cert-manager-prow bot added ok-to-test and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Mar 13, 2025
@dependabot dependabot bot force-pushed the dependabot/go_modules/all-d873af957e branch from b438855 to d87a69a Compare March 18, 2025 22:18
@cert-manager-prow
Copy link
Contributor

New changes are detected. LGTM label has been removed.

@cert-manager-prow cert-manager-prow bot removed the lgtm Indicates that a PR is ready to be merged. label Mar 18, 2025
@hawksight
Copy link
Member

/ok-to-test
/retest

@dependabot dependabot bot force-pushed the dependabot/go_modules/all-d873af957e branch 2 times, most recently from 5f4b7e0 to 323248e Compare April 2, 2025 22:40
Bumps the all group with 10 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/cert-manager/cert-manager](https://github.com/cert-manager/cert-manager) | `1.16.3` | `1.17.1` |
| [github.com/spf13/cobra](https://github.com/spf13/cobra) | `1.8.1` | `1.9.1` |
| [golang.org/x/crypto](https://github.com/golang/crypto) | `0.32.0` | `0.36.0` |
| [helm.sh/helm/v3](https://github.com/helm/helm) | `3.17.0` | `3.17.1` |
| [k8s.io/api](https://github.com/kubernetes/api) | `0.32.1` | `0.32.2` |
| [k8s.io/apiextensions-apiserver](https://github.com/kubernetes/apiextensions-apiserver) | `0.32.1` | `0.32.2` |
| [k8s.io/cli-runtime](https://github.com/kubernetes/cli-runtime) | `0.32.1` | `0.32.2` |
| [k8s.io/kube-aggregator](https://github.com/kubernetes/kube-aggregator) | `0.32.1` | `0.32.2` |
| [k8s.io/kubectl](https://github.com/kubernetes/kubectl) | `0.32.1` | `0.32.2` |
| [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime) | `0.20.1` | `0.20.2` |



Updates `github.com/cert-manager/cert-manager` from 1.16.3 to 1.17.1
- [Release notes](https://github.com/cert-manager/cert-manager/releases)
- [Changelog](https://github.com/cert-manager/cert-manager/blob/master/RELEASE.md)
- [Commits](cert-manager/cert-manager@v1.16.3...v1.17.1)

Updates `github.com/spf13/cobra` from 1.8.1 to 1.9.1
- [Release notes](https://github.com/spf13/cobra/releases)
- [Commits](spf13/cobra@v1.8.1...v1.9.1)

Updates `golang.org/x/crypto` from 0.32.0 to 0.36.0
- [Commits](golang/crypto@v0.32.0...v0.36.0)

Updates `golang.org/x/exp` from 0.0.0-20240719175910-8a7402abbf56 to 0.0.0-20241217172543-b2144cdd0a67
- [Commits](https://github.com/golang/exp/commits)

Updates `golang.org/x/sync` from 0.10.0 to 0.12.0
- [Commits](golang/sync@v0.10.0...v0.12.0)

Updates `helm.sh/helm/v3` from 3.17.0 to 3.17.1
- [Release notes](https://github.com/helm/helm/releases)
- [Commits](helm/helm@v3.17.0...v3.17.1)

Updates `k8s.io/api` from 0.32.1 to 0.32.2
- [Commits](kubernetes/api@v0.32.1...v0.32.2)

Updates `k8s.io/apiextensions-apiserver` from 0.32.1 to 0.32.2
- [Release notes](https://github.com/kubernetes/apiextensions-apiserver/releases)
- [Commits](kubernetes/apiextensions-apiserver@v0.32.1...v0.32.2)

Updates `k8s.io/apimachinery` from 0.32.1 to 0.32.2
- [Commits](kubernetes/apimachinery@v0.32.1...v0.32.2)

Updates `k8s.io/cli-runtime` from 0.32.1 to 0.32.2
- [Commits](kubernetes/cli-runtime@v0.32.1...v0.32.2)

Updates `k8s.io/client-go` from 0.32.1 to 0.32.2
- [Changelog](https://github.com/kubernetes/client-go/blob/master/CHANGELOG.md)
- [Commits](kubernetes/client-go@v0.32.1...v0.32.2)

Updates `k8s.io/component-base` from 0.32.1 to 0.32.2
- [Commits](kubernetes/component-base@v0.32.1...v0.32.2)

Updates `k8s.io/kube-aggregator` from 0.32.1 to 0.32.2
- [Commits](kubernetes/kube-aggregator@v0.32.1...v0.32.2)

Updates `k8s.io/kubectl` from 0.32.1 to 0.32.2
- [Commits](kubernetes/kubectl@v0.32.1...v0.32.2)

Updates `k8s.io/utils` from 0.0.0-20241104100929-3ea5e8cea738 to 0.0.0-20241210054802-24370beab758
- [Commits](https://github.com/kubernetes/utils/commits)

Updates `sigs.k8s.io/controller-runtime` from 0.20.1 to 0.20.2
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](kubernetes-sigs/controller-runtime@v0.20.1...v0.20.2)

---
updated-dependencies:
- dependency-name: github.com/cert-manager/cert-manager
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: github.com/spf13/cobra
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: golang.org/x/crypto
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: golang.org/x/exp
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: golang.org/x/sync
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: helm.sh/helm/v3
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: k8s.io/api
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: k8s.io/apiextensions-apiserver
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: k8s.io/apimachinery
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: k8s.io/cli-runtime
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: k8s.io/client-go
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: k8s.io/component-base
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: k8s.io/kube-aggregator
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: k8s.io/kubectl
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: k8s.io/utils
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: sigs.k8s.io/controller-runtime
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/all-d873af957e branch from 323248e to 047b297 Compare April 4, 2025 23:05
@cert-manager-prow
Copy link
Contributor

@dependabot[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-cert-manager-cmctl-verify 047b297 link true /test pull-cert-manager-cmctl-verify
pull-cert-manager-cmctl-integration 047b297 link true /test pull-cert-manager-cmctl-integration
pull-cert-manager-cmctl-test 047b297 link true /test pull-cert-manager-cmctl-test

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@inteon
Copy link
Member

inteon commented Apr 7, 2025

@dependabot rebase

@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Apr 7, 2025

Looks like these dependencies are updatable in another way, so this is no longer needed.

@dependabot dependabot bot closed this Apr 7, 2025
@dependabot dependabot bot deleted the dependabot/go_modules/all-d873af957e branch April 7, 2025 17:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. dependencies Pull requests that update a dependency file go Pull requests that update Go code ok-to-test size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants