v0.7.0
openshift-routes provides OpenShift Route support for cert-manager.
Version v0.7.0 is a major architectural change to the project which fundamentally alters how it works behind the scenes.
READ BEFORE UPGRADING: Issuing via Certificate
Resources
Previously, openshift-routes worked by creating cert-manager CertificateRequest
resources based on the annotations added to OpenShift Route
resources.
This worked well most of the time, but caused several issues, details of which can be found in #55, #101, #34 and #49.
To address these issues, openshift-routes will now create cert-manager Certificate
resources instead, which dramatically simplifies the login in openshift-routes and provides several benefits:
- Metrics are exposed by cert-manager for
Certificate
resources, improving observability Certificate
resources are much more user friendly to read and understand- Issued certificates are also stored in Kubernetes
Secret
resources, allowing use in your applications as well as onRoute
s
Among other benefits.
What action do I need to take?
We expect that most users should be able to upgrade using Helm without seeing much difference in behaviour. Existing annotated Routes with certificates will continue to function as before. When reissuance is triggered, the Route should be updated using a Certificate
with no user interaction.
Still, given the nature of the change, it's advisable to check the state of issued certificates on your Route
resources to be sure that they're being renewed. If you find any problems, please raise an issue and ideally reach out to us on slack to let us know.
It's important to note that:
- You must upgrade properly. There are important RBAC changes which come with the upgrade. Without those changes, openshift-routes will fail to issue any certificate.
- If you're using cert-manager's approval mechanism, the CertificateRequest resources will have different names to what they had before. The names now will be deterministic per-route.
What else should I be aware of?
To check if the TLS certificate on a Route
needs to be reissued, openshift-routes needs to be able to compare it against the Secret
resource which is created by the Certificate
s which are now used for issuance. That means that after you upgrade, openshift-routes will be able to read all Secrets across the cluster.
New Annotations Supported
openshift-route now supports more annotations on routes, allowing greater flexibility in issuing certificates:
cert-manager.io/private-key-algorithm
now now supportsEd25519
keyscert-manager.io/private-key-rotation-policy
allows specifying how private keys should be rotated. Set this toAlways
unless you've got a good reason not to.cert-manager.io/revision-history-limit
controls how manyCertificateRequests
should be preserved whenCertificates
are (re-)issued. Set this to a low number to reduce cluster clutter.
What's Changed
Features
⚠️ Use Certificates over CertificateRequests (follow-up to #55) by @jacksgt and @SgtCoDFish in #101
Bug Fixes
- Fix logging issue where %s is presented by @davidcollom in #97
New Contributors
- @davidcollom made their first contribution in #97 🎉
Full Changelog: v0.6.1...v0.7.0