Skip to content

Commit 9a333ad

Browse files
Merge pull request #1999 from cert-manager/revert-1996-merge-master-into-release-next
Revert "[release-next] Merge master into release-next"
2 parents 3f8b3f5 + 828601f commit 9a333ad

14 files changed

Lines changed: 22 additions & 566 deletions

File tree

.spelling

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -594,11 +594,8 @@ v1.18.0.
594594
v1.19
595595
v1.19.0
596596
v1.19.1
597-
v1.20.0
598597
v1.19.2
599-
v1.20.0
600598
alpha.0
601-
beta.0
602599
v1.4.1
603600
v1.5
604601
v1.5.0
@@ -864,9 +861,6 @@ example.org
864861
experimental.cert
865862
http01-edit-in-place
866863
http01-ingress-class
867-
http01-ingress-ingressclassname
868-
http01-parentrefkind
869-
http01-parentrefname
870864
ingress.class
871865
ip-sans
872866
kubernetes.io

content/docs/configuration/acme/http01/README.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -69,9 +69,6 @@ controllers support `ingressClassName`, with the notable exception of
6969
ingress-gce (as per the page [Configure Ingress for external load
7070
balancing](https://cloud.google.com/kubernetes-engine/docs/how-to/load-balance-ingress)).
7171

72-
> You can override the `ingressClassName` on a per-Ingress basis using the
73-
[`acme.cert-manager.io/http01-ingress-ingressclassname`](https://cert-manager.io/docs/reference/annotations/#acmecert-manageriohttp01-ingress-ingressclassname) annotation.
74-
7572
### `class`
7673

7774
If the `class` field is specified, a new Ingress resource with a randomly
@@ -82,9 +79,6 @@ value set to the value of the `class` field.
8279
This field is only recommended with ingress-gce. ingress-gce [doesn't support the
8380
`ingressClassName` field](https://cloud.google.com/kubernetes-engine/docs/how-to/load-balance-ingress).
8481

85-
> You can override the `class` on a per-Ingress basis using the
86-
[`acme.cert-manager.io/http01-ingress-class`](https://cert-manager.io/docs/reference/annotations/#acmecert-manageriohttp01-ingress-class) annotation.
87-
8882
### `name`
8983

9084
If the `name` field is specified, cert-manager will edit the named

content/docs/configuration/venafi.md

Lines changed: 0 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -304,45 +304,3 @@ metadata:
304304
]
305305
...
306306
```
307-
308-
### Issuer Custom Fields
309-
310-
Starting `v1.20`, you can use `venafi.cert-manager.io/custom-fields` annotation on an `Issuer` or `ClusterIssuer` resource.
311-
This configuration would be applied to all Certificate requests created from `Issuer`.
312-
313-
It is possible to override or append custom configuration to `Certificate` resources via the `Issuer` assigned to it.
314-
For example with an `Issuer` such as:
315-
316-
```yaml
317-
apiVersion: cert-manager.io/v1
318-
kind: Issuer
319-
metadata:
320-
name: corp-issuer
321-
annotations:
322-
venafi.cert-manager.io/custom-fields: |-
323-
[
324-
{"name": "Environemnt", "value": "Dev"},
325-
]
326-
```
327-
328-
and a `Certificate` resource:
329-
330-
```yaml
331-
apiVersion: cert-manager.io/v1
332-
kind: Certificate
333-
metadata:
334-
name: example-com-certificate
335-
annotations:
336-
venafi.cert-manager.io/custom-fields: |-
337-
[
338-
{"name": "Team", "value": "amber"},
339-
]
340-
...
341-
```
342-
343-
Final configuration will be:
344-
345-
```json
346-
{"name": "Environemnt", "value": "Dev"},
347-
{"name": "Team", "value": "amber"}
348-
```

content/docs/installation/best-practice.md

Lines changed: 0 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -47,44 +47,6 @@ Or you may prefer to use the custom resources provided by your CNI software.
4747
> 📖 Learn about the [Kubernetes builtin NetworkPolicy API](https://kubernetes.io/docs/concepts/services-networking/network-policies/)
4848
> and see [some example policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/#default-policies).
4949
50-
The cert-manager Helm chart allows you to create a `NetworkPolicy` resource for
51-
each `Deployment`.
52-
53-
By default, it allows inbound traffic to all the listening ports of each component.
54-
And by default, it allows outbound traffic to:
55-
- TCP port 443: For connections to the Kubernetes API server and other
56-
in-cluster and external HTTPS API servers.
57-
- TCP port 6443: For connections to the Kubernetes API server on OpenShift.
58-
- TCP and UDP port 53: To resolve DNS names using the in-cluster DNS and
59-
external DNS servers when using DNS01.
60-
- TCP port 80: So that the controller can perform ACME HTTP01 self-checks before
61-
accepting the ACME server challenge.
62-
63-
These are over-permissive defaults to provide a good installation experience.
64-
65-
You should customize the `ingress` and `egress` rules to restrict the inbound
66-
and outbound traffic to allow only those connections which are necessary for
67-
your cert-manager configuration.
68-
69-
Example Helm values:
70-
71-
```yaml
72-
# helm-values.yaml
73-
networkPolicy:
74-
enabled: true
75-
76-
webhook:
77-
networkPolicy:
78-
enabled: true
79-
80-
cainjector:
81-
networkPolicy:
82-
enabled: true
83-
```
84-
85-
There are examples of extended egress rules in the example Helm chart values
86-
file at the end of this document.
87-
8850
### Network Requirements
8951

9052
Here is an overview of the network requirements:

content/docs/manifest.json

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -21,16 +21,8 @@
2121
"path": "/docs/releases/README.md"
2222
},
2323
{
24-
"title": "1.20",
25-
"path": "/docs/releases/release-notes/release-notes-1.20.md"
26-
},
27-
{
28-
"title": "Upgrade 1.19 to 1.20",
29-
"path": "/docs/releases/upgrading/upgrading-1.19-1.20.md"
30-
},
31-
{
32-
"title": "1.19",
33-
"path": "/docs/releases/release-notes/release-notes-1.19.md"
24+
"title": "1.19",
25+
"path": "/docs/releases/release-notes/release-notes-1.19.md"
3426
},
3527
{
3628
"title": "Upgrade 1.18 to 1.19",

content/docs/reference/annotations.md

Lines changed: 6 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -27,43 +27,12 @@ This is useful for keeping compatibility with the `ingress-gce` component.
2727
## acme.cert-manager.io/http01-ingress-class
2828
- [Ingress](../usage/ingress.md)
2929

30-
Allows the `kubernetes.io/ingress.class` annotation to be configured.
31-
Customizing this is useful when you are trying
32-
to secure internal services, and need to solve challenges using a different ingress class
33-
to that of the ingress. If not specified and the `acme-http01-edit-in-place` annotation is
34-
not set, this defaults to the `http01.ingress.class` defined in the Issuer resource.
35-
36-
## acme.cert-manager.io/http01-ingress-ingressclassname
37-
38-
- [Ingress](../usage/ingress.md)
39-
40-
Allows the Ingress's `spec.ingressClassName` to be configured.
41-
Customizing this is useful when you are trying
42-
to secure internal services, and need to solve challenges using a different ingress class
43-
to that of the ingress. If not specified and the `acme-http01-edit-in-place` annotation is
44-
not set, this defaults to the `http01.ingress.ingressClassName` defined in the Issuer resource.
45-
46-
## acme.cert-manager.io/http01-parentrefkind
47-
48-
- [Certificate](../usage/certificate.md)
49-
50-
This annotation is automatically added by cert-manager to Certificate resources
51-
when they are created from a [Gateway](../usage/gateway.md) or
52-
[ListenerSet](../usage/gateway.md#listenerset) resource. It stores the kind of
53-
the parent resource (either `Gateway` or `ListenerSet`) that triggered the
54-
creation of the Certificate. This is used internally by the ACME HTTP-01 solver
55-
to know where to attach the temporary HTTPRoute for the challenge.
56-
57-
## acme.cert-manager.io/http01-parentrefname
58-
59-
- [Certificate](../usage/certificate.md)
60-
61-
This annotation is automatically added by cert-manager to Certificate resources
62-
when they are created from a [Gateway](../usage/gateway.md) or
63-
[ListenerSet](../usage/gateway.md#listenerset) resource. It stores the name of
64-
the parent resource that triggered the creation of the Certificate. This is used
65-
internally by the ACME HTTP-01 solver to know where to attach the temporary
66-
HTTPRoute for the challenge.
30+
this annotation allows you to configure the ingress class that will be used to
31+
solve challenges for this ingress. Customizing this is useful when you are
32+
trying to secure internal services, and need to solve challenges using a
33+
different ingress class to that of the ingress. If not specified and the
34+
`acme-http01-edit-in-place` annotation is not set, this defaults to the ingress
35+
class defined in the Issuer resource.
6736

6837
## cert-manager.io/allow-direct-injection
6938
- `Secret`

content/docs/releases/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@ NB: cert-manager 1.12 was a public Long Term Support (LTS) release sponsored by
332332

333333
[s]: #kubernetes-supported-versions
334334
[test]: #supported-vs-tested
335-
[1.20]: ./release-notes/release-notes-1.20.md
335+
[1.20]: https://github.com/cert-manager/cert-manager/milestone/42
336336
[1.19]: ./release-notes/release-notes-1.19.md
337337
[1.18]: ./release-notes/release-notes-1.18.md
338338
[1.17]: ./release-notes/release-notes-1.17.md

content/docs/releases/release-notes/release-notes-1.20.md

Lines changed: 0 additions & 80 deletions
This file was deleted.

content/docs/releases/upgrading/upgrading-1.19-1.20.md

Lines changed: 0 additions & 10 deletions
This file was deleted.

0 commit comments

Comments
 (0)