Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the all group with 1 update #84

Merged
merged 2 commits into from
Feb 8, 2024

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 5, 2024

Bumps the all group with 1 update: github.com/cert-manager/cert-manager.

Updates github.com/cert-manager/cert-manager from 1.13.3 to 1.14.1

Release notes

Sourced from github.com/cert-manager/cert-manager's releases.

v1.14.1

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

cert-manager 1.14 brings a variety of features, security improvements and bug fixes, including: support for creating X.509 certificates with "Other Name" fields, and support for creating CA certificates with "Name Constraints" and "Authority Information Accessors" extensions.

📢 cert-manager v1.14.1 fixes bugs found during the release of v1.14.0.

When upgrading to cert-manager release 1.14, please skip v1.14.0 and install this patch version instead.

Documentation

Changes since v1.14.0

Bug or Regression

  • Fix broken cainjector image value in Helm chart (#6693, @​SgtCoDFish)
  • Fix bug in cmctl namespace detection which prevented it being used as a startupapicheck image in namespaces other than cert-manager. (#6706, @​inteon)
  • Fix bug in cmctl which caused cmctl experimental install to panic. (#6706, @​inteon)

v1.14.0

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

cert-manager 1.14 brings a variety of features, security improvements and bug fixes, including: support for creating X.509 certificates with "Other Name" fields, and support for creating CA certificates with "Name Constraints" and "Authority Information Accessors" extensions.

⚠️ This version has known issues. Please install v1.14.1 instead.

During the release of v1.14.0, the Helm chart was found to use the wrong OCI image for the cainjector Deployment, which caused the Helm installation and the static manifest based installation to fail. Upon discovery of this bug, the release of v1.14.0 was paused before the Helm chart or GitHub release were published; but the Git tag and the OCI images had already been published.

The cert-manager team next fixed the Helm chart and two other bugs which are listed in the "Known Issues" section below, and then released v1.14.1, which is the version that users are strongly advised to install when they upgrade to 1.14.

In order to complete the stalled v1.14.0 release, the Helm chart and static YAML installation files were regenerated on a team member's laptop, using exactly the same build scripts as are used in the automated release process, and using the v1.14.1 version of the code. The working v1.14.0 Helm chart was published, and the working versions of the static manifest files attached to the draft v1.14.0 GitHub release, and that was then published.

For these reasons, users are strongly advised to skip this version and install the v1.14.1 Helm chart instead.

Known Issues

  • During the release of v1.14.0, the Helm chart for this version was found to use the wrong OCI image for the cainjector Deployment, which caused the Helm installation to fail.

... (truncated)

Commits
  • c7b1e30 Merge pull request #6706 from inteon/release-1.14-cli-flags-bugfix
  • f5bae17 Merge pull request #6702 from SgtCoDFish/release-1.14-update-helm-tool
  • 241e64f fix flag parsing bug introduced in #6562
  • 6f0ab39 [release-1.14] update helm-tool and regenerate helm README
  • 7a45ca9 Merge pull request #6704 from SgtCoDFish/release-1.14-helmreadmeci
  • 152b1fb [release-1.14] add CI check for updated helm docs
  • 95d6fc4 Merge pull request #6703 from SgtCoDFish/release-1.14-promfix
  • 3af8e83 [release-1.14] Update deploy/charts/cert-manager/values.yaml
  • f4901be [release-1.14] fix backwards incompatible change: include a prometheus servic...
  • 83b23a9 Merge pull request #6698 from SgtCoDFish/release-1.14-updatereadme
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the all group with 1 update: [github.com/cert-manager/cert-manager](https://github.com/cert-manager/cert-manager).


Updates `github.com/cert-manager/cert-manager` from 1.13.3 to 1.14.1
- [Release notes](https://github.com/cert-manager/cert-manager/releases)
- [Commits](cert-manager/cert-manager@v1.13.3...v1.14.1)

---
updated-dependencies:
- dependency-name: github.com/cert-manager/cert-manager
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Feb 5, 2024
@jetstack-bot jetstack-bot added dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Feb 5, 2024
@jetstack-bot
Copy link
Contributor

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@jetstack-bot jetstack-bot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Feb 5, 2024
@inteon
Copy link
Member

inteon commented Feb 6, 2024

/approve
/lgtm

@jetstack-bot jetstack-bot added the lgtm Indicates that a PR is ready to be merged. label Feb 6, 2024
@jetstack-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: inteon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@jetstack-bot jetstack-bot added approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. and removed lgtm Indicates that a PR is ready to be merged. labels Feb 6, 2024
@inteon inteon force-pushed the dependabot/go_modules/all-d0a6ca6226 branch from 387b8b1 to 6d39713 Compare February 6, 2024 19:21
@jetstack-bot jetstack-bot added lgtm Indicates that a PR is ready to be merged. and removed lgtm Indicates that a PR is ready to be merged. labels Feb 6, 2024
@inteon inteon force-pushed the dependabot/go_modules/all-d0a6ca6226 branch from 6d39713 to 4bb4d70 Compare February 8, 2024 13:49
@jetstack-bot jetstack-bot removed the lgtm Indicates that a PR is ready to be merged. label Feb 8, 2024
@inteon
Copy link
Member

inteon commented Feb 8, 2024

/lgtm

@jetstack-bot jetstack-bot added the lgtm Indicates that a PR is ready to be merged. label Feb 8, 2024
@inteon
Copy link
Member

inteon commented Feb 8, 2024

/retest

@jetstack-bot jetstack-bot merged commit 76b0311 into main Feb 8, 2024
5 checks passed
@dependabot dependabot bot deleted the dependabot/go_modules/all-d0a6ca6226 branch February 8, 2024 15:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. dependencies Pull requests that update a dependency file go Pull requests that update Go code lgtm Indicates that a PR is ready to be merged. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants