Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update cert-manager helm release to v1.16.2 #1314

Merged
merged 1 commit into from
Nov 20, 2024

Conversation

gabe565-renovate[bot]
Copy link
Contributor

This PR contains the following updates:

Package Update Change
cert-manager (source) patch v1.16.1 -> v1.16.2

Release Notes

cert-manager/cert-manager (cert-manager)

v1.16.2

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

This patch release of cert-manager 1.16 makes several changes to how PEM input is validated, adding maximum sizes appropriate to the type of PEM data which is being parsed.

This is to prevent an unacceptable slow-down in parsing specially crafted PEM data. The issue was found by Google's OSS-Fuzz project.

The issue is low severity; to exploit the PEM issue would require privileged access which would likely allow Denial-of-Service through other methods.

Note also that since most PEM data parsed by cert-manager comes from ConfigMap or Secret resources which have a max size limit of approximately 1MB, it's difficult to force cert-manager to parse large amounts of PEM data.

Further information is available in GHSA-r4pg-vg54-wxx4

In addition, the version of Go used to build cert-manager 1.16 was updated along with the base images.

Changes by Kind

Bug or Regression
  • Set a maximum size for PEM inputs which cert-manager will accept to remove possibility of taking a long time to process an input (#​7401, @​SgtCoDFish)
Other (Cleanup or Flake)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link

Kustomization Diff

Cluster tennant
Changes ${\tt\large\color{green}+1\enspace\color{red}-\negthinspace1}$
Click to expand
--- kubernetes/templates/apps/cert-manager/app Kustomization: cert-manager/app HelmRelease: cert-manager/cert-manager

+++ kubernetes/templates/apps/cert-manager/app Kustomization: cert-manager/app HelmRelease: cert-manager/cert-manager

@@ -13,13 +13,13 @@

       chart: cert-manager
       interval: 1h
       sourceRef:
         kind: HelmRepository
         name: cert-manager
         namespace: cert-manager
-      version: v1.16.1
+      version: v1.16.2
   driftDetection:
     mode: enabled
   install:
     crds: Create
   interval: 1h
   upgrade:

Copy link

HelmRelease Diff

Cluster tennant
Changes ${\tt\large\color{green}+5\enspace\color{red}-\negthinspace5}$
Click to expand
--- HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager-cainjector

+++ HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager-cainjector

@@ -37,13 +37,13 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-cainjector
-        image: quay.io/jetstack/cert-manager-cainjector:v1.16.1
+        image: quay.io/jetstack/cert-manager-cainjector:v1.16.2
         imagePullPolicy: IfNotPresent
         args:
         - --v=2
         - --leader-election-namespace=kube-system
         ports:
         - containerPort: 9402
--- HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager

+++ HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager

@@ -40,19 +40,19 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-controller
-        image: quay.io/jetstack/cert-manager-controller:v1.16.1
+        image: quay.io/jetstack/cert-manager-controller:v1.16.2
         imagePullPolicy: IfNotPresent
         args:
         - --v=2
         - --cluster-resource-namespace=$(POD_NAMESPACE)
         - --leader-election-namespace=kube-system
-        - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.16.1
+        - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.16.2
         - --max-concurrent-challenges=60
         ports:
         - containerPort: 9402
           name: http-metrics
           protocol: TCP
         - containerPort: 9403
--- HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager-webhook

+++ HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager-webhook

@@ -37,13 +37,13 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-webhook
-        image: quay.io/jetstack/cert-manager-webhook:v1.16.1
+        image: quay.io/jetstack/cert-manager-webhook:v1.16.2
         imagePullPolicy: IfNotPresent
         args:
         - --v=2
         - --secure-port=10250
         - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
         - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
--- HelmRelease: cert-manager/cert-manager Job: cert-manager/cert-manager-startupapicheck

+++ HelmRelease: cert-manager/cert-manager Job: cert-manager/cert-manager-startupapicheck

@@ -32,13 +32,13 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-startupapicheck
-        image: quay.io/jetstack/cert-manager-startupapicheck:v1.16.1
+        image: quay.io/jetstack/cert-manager-startupapicheck:v1.16.2
         imagePullPolicy: IfNotPresent
         args:
         - check
         - api
         - --wait=1m
         - -v

Copy link

Kustomization Diff

Cluster gabernetes
Changes ${\tt\large\color{green}+1\enspace\color{red}-\negthinspace1}$
Click to expand
--- kubernetes/templates/apps/cert-manager/app Kustomization: cert-manager/app HelmRelease: cert-manager/cert-manager

+++ kubernetes/templates/apps/cert-manager/app Kustomization: cert-manager/app HelmRelease: cert-manager/cert-manager

@@ -13,13 +13,13 @@

       chart: cert-manager
       interval: 1h
       sourceRef:
         kind: HelmRepository
         name: cert-manager
         namespace: cert-manager
-      version: v1.16.1
+      version: v1.16.2
   driftDetection:
     mode: enabled
   install:
     crds: Create
   interval: 1h
   upgrade:

Copy link

HelmRelease Diff

Cluster gabernetes
Changes ${\tt\large\color{green}+5\enspace\color{red}-\negthinspace5}$
Click to expand
--- HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager-cainjector

+++ HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager-cainjector

@@ -37,13 +37,13 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-cainjector
-        image: quay.io/jetstack/cert-manager-cainjector:v1.16.1
+        image: quay.io/jetstack/cert-manager-cainjector:v1.16.2
         imagePullPolicy: IfNotPresent
         args:
         - --v=2
         - --leader-election-namespace=kube-system
         ports:
         - containerPort: 9402
--- HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager

+++ HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager

@@ -40,19 +40,19 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-controller
-        image: quay.io/jetstack/cert-manager-controller:v1.16.1
+        image: quay.io/jetstack/cert-manager-controller:v1.16.2
         imagePullPolicy: IfNotPresent
         args:
         - --v=2
         - --cluster-resource-namespace=$(POD_NAMESPACE)
         - --leader-election-namespace=kube-system
-        - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.16.1
+        - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.16.2
         - --max-concurrent-challenges=60
         ports:
         - containerPort: 9402
           name: http-metrics
           protocol: TCP
         - containerPort: 9403
--- HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager-webhook

+++ HelmRelease: cert-manager/cert-manager Deployment: cert-manager/cert-manager-webhook

@@ -37,13 +37,13 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-webhook
-        image: quay.io/jetstack/cert-manager-webhook:v1.16.1
+        image: quay.io/jetstack/cert-manager-webhook:v1.16.2
         imagePullPolicy: IfNotPresent
         args:
         - --v=2
         - --secure-port=10250
         - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
         - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
--- HelmRelease: cert-manager/cert-manager Job: cert-manager/cert-manager-startupapicheck

+++ HelmRelease: cert-manager/cert-manager Job: cert-manager/cert-manager-startupapicheck

@@ -32,13 +32,13 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-startupapicheck
-        image: quay.io/jetstack/cert-manager-startupapicheck:v1.16.1
+        image: quay.io/jetstack/cert-manager-startupapicheck:v1.16.2
         imagePullPolicy: IfNotPresent
         args:
         - check
         - api
         - --wait=1m
         - -v

@gabe565 gabe565 merged commit a1edb63 into main Nov 20, 2024
6 checks passed
@gabe565 gabe565 deleted the renovate/cert-manager-1.x branch November 20, 2024 19:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant