cert-manager

Automatically provision and manage TLS certificates in Kubernetes

APACHE-2.0 License

Stars
11.4K
Committers
456

Bot releases are visible (Hide)

cert-manager - v0.2.0

Published by munnerz almost 7 years ago

Documentation & User Guides

Changelog since v0.1.0

Action Required

  • Move to 'jetstack' organisation. Action required: this will require updating your existing deployments to point to the new image repository, as new tags will not be pushed to the old 'jetstackexperimental/cert-manager-controllerrepository. Ahelm upgrade` should take care of this. (#145, @munnerz)
  • Set the Kubernetes secret type to TLS. Action required: this will cause renewals of existing certificates to fail. You must delete certificates that have been previously produced by cert-manager else cert-manager may enter a renewal loop when saving the new certificates. Alternatively, you may specify a new secret to store your certificate in and manually update your ingress resource/applications to reference the new secret. (#172, @munnerz)

Other notable changes

  • No longer support ClusterIssuer resources when cert-manager is running with --namespace flag set (#179, @munnerz)
  • Overcome 'registration already exists for provider key' errors in ACME provider by auto-detecting lost ACME registration URIs (#171, @munnerz)
  • Fix checking for invalid data in issuer secrets (#170, @munnerz)
  • Fix bug in ACME HTTP01 solver causing self-check to return true before paths have propagated (#166, @munnerz)
  • Fix panic if the secret named in an ACME issuer exists but contains invalid data (or no data) (#165, @munnerz)
  • Ensure 5 consecutive HTTP01 self-checks pass before issuing ACME certificate (#156, @munnerz)
  • Fix race condition in ACME HTTP01 solver when validating multiple domains (#155, @munnerz)
  • Consistently use glog throughout (#126, @munnerz)
cert-manager - v0.1.1

Published by munnerz almost 7 years ago

Documentation & User Guides

Overview

This release fixes some issues with the ACME implementation when using the GCLB ingress controller. Previously, cert-manager might have passed the HTTP01 self check before the new path had propagated to all of Google's edge locations.

This release also fixes a race in the HTTP01 challenge solver.

Changelog since v0.1.0

  • Ensure 5 consecutive HTTP01 self-checks pass before issuing ACME certificate (#156, @munnerz)
  • Fix race condition in ACME HTTP01 solver when validating multiple domains (#155, @munnerz)
  • Consistently use glog throughout (#126, @munnerz)
cert-manager - v0.1.0

Published by munnerz about 7 years ago

This is the first release of cert-manager. It is currently still not in a production ready state, and features are subject to change.

Notable features:

  • Automated certificate renewal
  • ACME DNS-01 challenge mechanism
    • CloudDNS
    • Route53
    • Cloudflare
  • ACME HTTP-01 challenge mechanism
    • Should be compatible with all ingress controllers following ingress spec (GCE & nginx tested)
  • Simple CA based issuance
    • Create an Issuer that references a Secret resource containing a signing keypair, and issue/renew certificates from that.
  • Cluster-wide issuers (aka ClusterIssuer)
  • Backed by CRDs
    • Events logged to the Kubernetes API
    • Status block utilised to store additional state about resources

Please check the README for a quick-start guide.

We really value any feedback and contributions to the project. If you'd like to get involved, please open some issues, comment or pick something up and get started!