Skip to content

[release-next] Merge master into release-next#1996

Merged
cert-manager-prow[bot] merged 19 commits intocert-manager:masterfrom
maelvls:merge-master-into-release-next
Mar 10, 2026
Merged

[release-next] Merge master into release-next#1996
cert-manager-prow[bot] merged 19 commits intocert-manager:masterfrom
maelvls:merge-master-into-release-next

Conversation

@maelvls
Copy link
Member

@maelvls maelvls commented Mar 10, 2026

In preparation for release-1.20.

cert-manager-prow bot and others added 19 commits November 4, 2025 15:30
Sync the release-next branch with master
- Add v1.20 release notes file
- Update releases manifest and README to include 1.20 and upgrade guide
- Add v1.20 to .spelling
- Set cert_manager_latest_version to v1.20.0-alpha.0

Signed-off-by: Richard Wall <richard.wall@cyberark.com>
…t-cert-manager-1.20.0-alpha.0

Add cert-manager 1.20 release notes
…ride-ingress-ingressclassname"

Signed-off-by: Yuedong Wu <dwcn22@outlook.com>
…ingressclassname"

Signed-off-by: Yuedong Wu <dwcn22@outlook.com>
Co-authored-by: Ashley Davis <SgtCoDFish@users.noreply.github.com>
Signed-off-by: Yuedong Wu <57584831+lunarwhite@users.noreply.github.com>
Add doc content for new Ingress annotation `http01-ingress-ingressclassname`
…master

Signed-off-by: Richard Wall <richard.wall@cyberark.com>
…t-merge-master

Merge the master branch into release-next
Document Venafi "global" custom fields feature implemented in
cert-manager/cert-manager#8301

Signed-off-by: Dinar Valeev <k0da@opensuse.org>
Co-authored-by: Peter Fiddes <hawksight@users.noreply.github.com>
venafi: Issuer custom fields documentation
Merge the master branch into release-next
…s rules

- Document default NetworkPolicy behavior and recommend restricting rules
- Add example Helm values for enabling networkPolicy per component
- Update public best-practice YAML to enable networkPolicy keys

Signed-off-by: Richard Wall <richard.wall@cyberark.com>
…-network-policy

[VC-48226]: document default NetworkPolicy and example values
Signed-off-by: Maël Valais <mael@vls.dev>
Signed-off-by: Maël Valais <mael@vls.dev>
cert-manager.io/issuer-name
cert-manager.io/renew-before-percentage

Signed-off-by: Maël Valais <mael@vls.dev>
…tation

[release-next] Document the new ListenerSet feature
Copilot AI review requested due to automatic review settings March 10, 2026 14:24
@cert-manager-prow cert-manager-prow bot added dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. labels Mar 10, 2026
@maelvls maelvls changed the title Merge master into release next [release-1.20] Merge master into release next Mar 10, 2026
@netlify
Copy link

netlify bot commented Mar 10, 2026

Deploy Preview for cert-manager ready!

Built without sensitive environment variables

Name Link
🔨 Latest commit 9e79d81
🔍 Latest deploy log https://app.netlify.com/projects/cert-manager/deploys/69b0298363165c00087a4c47
😎 Deploy Preview https://deploy-preview-1996--cert-manager.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@maelvls maelvls changed the title [release-1.20] Merge master into release next [release-next] Merge master into release-next Mar 10, 2026
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the documentation site for the cert-manager 1.20 release line, including new release pages, annotation docs, and improved best-practice configuration examples.

Changes:

  • Add/extend docs for Helm chart NetworkPolicy defaults and examples.
  • Introduce 1.20 release notes + upgrade guide entries and update “latest version” variable.
  • Document new/updated annotations (Ingress/Gateway/ListenerSet) and add redirect mappings.

Reviewed changes

Copilot reviewed 14 out of 14 changed files in this pull request and generated 13 comments.

Show a summary per file
File Description
public/docs/installation/best-practice/values.best-practice.yaml Adds example NetworkPolicy configuration/egress rules for components.
public/_redirects Adds redirects for newly documented annotations.
content/docs/variables.json Updates docs “latest version” variable to 1.20 alpha.
content/docs/usage/ingress.md Refines Ingress annotation documentation (ingress class fields).
content/docs/usage/gateway.md Updates Gateway docs; adds ListenerSet section and examples.
content/docs/releases/upgrading/upgrading-1.19-1.20.md Introduces new upgrade guide stub for 1.19 → 1.20.
content/docs/releases/release-notes/release-notes-1.20.md Introduces new 1.20 release notes page (placeholder content + changelog).
content/docs/releases/README.md Updates the 1.20 reference link to local release notes.
content/docs/reference/annotations.md Updates/adds annotation reference entries (Ingress class, parentRef).
content/docs/manifest.json Adds navigation entries for 1.20 release content.
content/docs/installation/best-practice.md Documents new Helm chart NetworkPolicy behavior and example values.
content/docs/configuration/venafi.md Adds Issuer custom-fields documentation and examples.
content/docs/configuration/acme/http01/README.md Adds cross-links showing per-Ingress overrides via annotations.
.spelling Adds new 1.20-related terms to spelling allowlist.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines +586 to +588
allowedListeners:
namespaces:
from: All
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

allowedListeners is not a valid field in the Gateway API Gateway spec (v1). This example YAML will fail to apply. Use the correct allowedRoutes field (typically under each listener), or adjust the example to match the intended Gateway API version/schema.

Suggested change
allowedListeners:
namespaces:
from: All
allowedRoutes:
namespaces:
from: All

Copilot uses AI. Check for mistakes.
:::info

⚠️ cert-manager does not yet support the new ListenerSet resource. If you want to maintain the self-service TLS configuration experience that developers are accustomed to with the Ingress resource, you will need to configure RBAC to allow application developers to edit Gateway resources. You can learn more about upcoming cert-manager improvements that will enable self-service TLS without giving away control over Gateway resources in [Ingress-nginx End-of-Life: What cert-manager Supports Today and What's Coming](/announcements/2025/11/26/ingress-nginx-eol-and-gateway-api/).
⚠️ **ListenerSet support** is now available in cert-manager v1.20.0-beta.0+.
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The doc currently states ListenerSet support is available in v1.20.0-beta.0+ while also marking the feature state as 1.20 [alpha]. These statements conflict. Please align the version gating and the feature-state label (and, if relevant, match what’s referenced elsewhere in the docs such as the cert_manager_latest_version).

Suggested change
⚠️ **ListenerSet support** is now available in cert-manager v1.20.0-beta.0+.
⚠️ **ListenerSet support** is now available in cert-manager v1.20.0-alpha.0+.

Copilot uses AI. Check for mistakes.

## ListenerSet

**FEATURE STATE**: cert-manager 1.20 [alpha]
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The doc currently states ListenerSet support is available in v1.20.0-beta.0+ while also marking the feature state as 1.20 [alpha]. These statements conflict. Please align the version gating and the feature-state label (and, if relevant, match what’s referenced elsewhere in the docs such as the cert_manager_latest_version).

Suggested change
**FEATURE STATE**: cert-manager 1.20 [alpha]
**FEATURE STATE**: cert-manager 1.20 [beta]

Copilot uses AI. Check for mistakes.
# Use port 6443 on OpenShift clusters.
- ports:
- port: 443
protocol: TCP
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The comment says to use port 6443 on OpenShift, but the example rule only allows 443. Either add an additional 6443/TCP port in the example egress rule, or adjust the comment so it matches the example as-written.

Suggested change
protocol: TCP
protocol: TCP
- port: 6443
protocol: TCP

Copilot uses AI. Check for mistakes.
Comment on lines +6 to +7
TODO

Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This page is linked from the releases navigation but still contains a TODO placeholder. If it’s not ready, consider removing it from the manifest until content is available, or replace TODO with at least a minimal set of upgrade notes (breaking changes, required actions, known issues).

Suggested change
TODO
This page describes what to check when upgrading an existing cert-manager installation
from v1.19 to v1.20.
> Note: The information below is intentionally high-level. Always review the
> detailed v1.20 release notes and changelog for the exact list of changes
> that apply to your environment.
## Breaking changes
At the time of writing, there are no generally applicable breaking changes
that require mandatory manual intervention for a standard upgrade from
v1.19 to v1.20.
However, you **must** verify the following before upgrading:
- Review the v1.20 release notes for any API removals or behavioral changes
that affect the issuers, certificate types, or integrations you use.
- Check for any flags, configuration fields, or Kubernetes API versions
that are marked as removed or no longer supported in v1.20.
If any removed or changed features are in use in your cluster, plan the
corresponding configuration updates before upgrading.
## Required actions
Before upgrading:
- Ensure your cluster meets the minimum supported Kubernetes version for
cert-manager v1.20 as documented in the release notes.
- Take a backup of:
- cert-manager custom resources (`Issuers`, `ClusterIssuers`, `Certificates`,
and related resources),
- the `cert-manager` namespace (or the namespace where cert-manager is
installed),
- and any custom configuration (Helm values, manifests, or operator config).
- If you are using Helm or another package manager, update your repository
indices so that the v1.20 charts are available.
- Test the upgrade in a non-production or staging environment that closely
matches your production configuration.
During and after the upgrade:
- Monitor the cert-manager controller, webhook, and cainjector pods for
readiness and error logs.
- Verify that new Certificates can be issued and that existing Certificates
continue to renew as expected.
## Known issues
- Known issues and any late-breaking changes for v1.20 are tracked in the
v1.20 release notes and the project issue tracker.
- Before upgrading production clusters, review the release notes and open
issues for items that match your environment (specific issuers, DNS
providers, ingress controllers, or custom integrations).
If you encounter unexpected behavior after upgrading, consult the troubleshooting
documentation and the project issue tracker, and consider rolling back to
v1.19 while you investigate.

Copilot uses AI. Check for mistakes.
Final configuration will be:

```json
{"name": "Environemnt", "value": "Dev"},
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Correct spelling: EnvironemntEnvironment (appears in both the Issuer example and the final configuration snippet).

Copilot uses AI. Check for mistakes.
Comment on lines +322 to +325
venafi.cert-manager.io/custom-fields: |-
[
{"name": "Environemnt", "value": "Dev"},
]
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The JSON examples are not valid as written: (1) both arrays include a trailing comma after the last element, and (2) the “Final configuration” snippet shows two objects rather than a JSON array, and also includes a trailing comma. Since users may copy/paste these annotations, please make the JSON syntactically valid and consistent (e.g., show a single array containing both objects).

Copilot uses AI. Check for mistakes.
Comment on lines +336 to +339
venafi.cert-manager.io/custom-fields: |-
[
{"name": "Team", "value": "amber"},
]
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The JSON examples are not valid as written: (1) both arrays include a trailing comma after the last element, and (2) the “Final configuration” snippet shows two objects rather than a JSON array, and also includes a trailing comma. Since users may copy/paste these annotations, please make the JSON syntactically valid and consistent (e.g., show a single array containing both objects).

Copilot uses AI. Check for mistakes.
```

Final configuration will be:

Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The JSON examples are not valid as written: (1) both arrays include a trailing comma after the last element, and (2) the “Final configuration” snippet shows two objects rather than a JSON array, and also includes a trailing comma. Since users may copy/paste these annotations, please make the JSON syntactically valid and consistent (e.g., show a single array containing both objects).

Copilot uses AI. Check for mistakes.
v1.19
v1.19.0
v1.19.1
v1.20.0
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

v1.20.0 is duplicated in the spelling allowlist. Remove the duplicate entry to keep the list clean (and, if the file expects sorting, keep the remaining entry in the correct order).

Suggested change
v1.20.0

Copilot uses AI. Check for mistakes.
@hjoshi123
Copy link

/lgtm
/approve

@cert-manager-prow
Copy link
Contributor

@hjoshi123: adding LGTM is restricted to approvers and reviewers in OWNERS files.

Details

In response to this:

/lgtm
/approve

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@maelvls maelvls added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 10, 2026
@maelvls maelvls added the lgtm Indicates that a PR is ready to be merged. label Mar 10, 2026
@cert-manager-prow
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

Approval requirements bypassed by manually added approval.

This pull-request has been approved by: hjoshi123

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@cert-manager-prow cert-manager-prow bot merged commit 3f8b3f5 into cert-manager:master Mar 10, 2026
10 checks passed
@maelvls
Copy link
Member Author

maelvls commented Mar 10, 2026

I did the opposite of what I wanted.... I wanted to merge master into release-next, I ended up merging release-next into master....

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. lgtm Indicates that a PR is ready to be merged. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants