Skip to content

Commit fd2dbbc

Browse files
Merge pull request #102348 from openshift-cherrypick-robot/cherry-pick-101426-to-enterprise-4.18
[enterprise-4.18] OSDOCS#16898: cert-manager 1.18 Release notes
2 parents c599180 + 5368c60 commit fd2dbbc

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed

security/cert_manager_operator/cert-manager-operator-release-notes.adoc

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,50 @@ These release notes track the development of {cert-manager-operator}.
1212

1313
For more information, see xref:../../security/cert_manager_operator/index.adoc#cert-manager-operator-about[About the {cert-manager-operator}].
1414

15+
16+
[id="cert-manager-operator-release-notes-1-18-0_{context}"]
17+
== {cert-manager-operator} 1.18.0
18+
19+
Issued: 2025-11-12
20+
21+
The following advisories are available for the {cert-manager-operator} 1.18.0:
22+
23+
* link:https://access.redhat.com/errata/RHBA-2025:21087[RHBA-2025:21087]
24+
* link:https://access.redhat.com/errata/RHBA-2025:21086[RHBA-2025:21086]
25+
* link:https://access.redhat.com/errata/RHBA-2025:21088[RHBA-2025:21088]
26+
* link:https://access.redhat.com/errata/RHBA-2025:21114[RHBA-2025:21114]
27+
28+
Version `1.18.0` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.18.3`. For more information, see the link:https://cert-manager.io/docs/releases/release-notes/release-notes-1.18#v1183[cert-manager project release notes for v1.18.3].
29+
30+
[id="cert-manager-operator-1-18-0-features-enhancements_{context}"]
31+
=== New features and enhancements
32+
33+
*Istio-CSR integration with {cert-manager-operator} (Generally Available)*
34+
35+
With this release, the integration of the {cert-manager-operator} with Istio-CSR, which was previously provided as a Technology Preview feature, is fully supported. This feature offers enhanced support for securing workloads and control plane components within {SMProductName} or Istio environments. By utilizing the {cert-manager-operator} managed Istio-CSR agent, Istio can obtain, sign, deliver, and renew certificates required for mutual TLS (mTLS).
36+
For more information, see xref:../../security/cert_manager_operator/cert-manager-operator-integrating-istio.adoc#cert-manager-operator-istio-csr-installing_cert-manager-operator-integrating-istio[Integrating the cert-manager Operator with Istio-CSR].
37+
38+
*Replica count configuration for {cert-manager-operator} operands*
39+
40+
With this release, you can override the default replica counts for the {cert-manager-operator} `controller`, `webhook`, and `cainjector` operands. To configure these values, specify the new `overrideReplicas` fields in the `CertManager` custom resource. With this enhancement, you can configure high availability (HA) and scale operands based on your specific operational requirements. For more information, see xref:../../security/cert_manager_operator/cert-manager-customizing-api-fields.adoc#cert-manager-explanation-of-certmanager-cr-fields_cert-manager-customizing-api-fields[Common configurable fields in the CertManager CR for the cert-manager components].
41+
42+
*Root filesystem is read-only for {cert-manager-operator} containers*
43+
44+
With this release, to improve security, the {cert-manager-operator} and all its operands have the `readOnlyRootFilesystem` security context set to `true` by default. This enhancement hardens the containers and prevents a potential attacker from modifying the contents of the container's root file system.
45+
46+
*Network policy hardening is now available for {cert-manager-operator} components*
47+
48+
With this release, the {cert-manager-operator} includes predefined `NetworkPolicy` resources to enhance security by controlling ingress and egress traffic for its components. These policies cover internal traffic, such as ingress to metrics and webhook servers, and egress to the OpenShift API and DNS servers.
49+
50+
By default, this feature is disabled to prevent connectivity issues during upgrades. You must explicitly enable it in the `CertManager` custom resource. For more information, see xref:../../security/cert_manager_operator/cert-manager-nw-policy.adoc#cert-manager-nw-policy[Network policy configuration for {cert-manager-operator}].
51+
52+
53+
[id="cert-manager-operator-1-18-0-known-issues_{context}"]
54+
=== Known issues
55+
56+
* The upstream cert-manager `v1.18` release updated the ACME HTTP-01 challenge ingress path type from `ImplementationSpecific` to `Exact`. The OpenShift Route API does not have an equivalent for the `Exact` path type, which prevents the ingress-to-route controller from supporting it. As a result, ingress resources created for HTTP-01 challenges cannot route traffic to the solver pod, causing the challenge to fail with a 503 error.
57+
To mitigate this issue, the `ACMEHTTP01IngressPathTypeExact` feature gate is disabled by default in this release.
58+
1559
[id="cert-manager-operator-release-notes-1-17-0_{context}"]
1660
== {cert-manager-operator} 1.17.0
1761

0 commit comments

Comments
 (0)