You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add cert-manager v1.19.1 release notes and upgrade warning
- Add v1.19.1 changelog and Important Upgrade Notes to release notes
- Update upgrading guide to recommend latest patch (v1.19.1)
- Add v1.19.0/v1.19.1 to spelling list and bump variables.json v1.19.1
Signed-off-by: Richard Wall <richard.wall@cyberark.com>
Copy file name to clipboardExpand all lines: content/docs/releases/release-notes/release-notes-1.19.md
+20Lines changed: 20 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,11 @@ This release focuses on expanding platform compatibility, improving deployment f
9
9
10
10
Be sure to review all new features and changes below, and read the full release notes carefully before upgrading.
11
11
12
+
## Important Upgrade Notes
13
+
14
+
When upgrading to cert-manager `1.19`, use the latest patch version: `[[VAR::cert_manager_latest_version]]`.
15
+
There is a bug in `v1.19.0` which may cause certificates to be re-issued unnecessarily. We fixed this in `v1.19.1`.
16
+
12
17
## Major Themes
13
18
14
19
### Deployment and Platform Compatibility
@@ -67,6 +72,21 @@ And finally, thanks to the cert-manager steering committee for their feedback in
67
72
-[`@ssyno`](https://github.com/ssyno)
68
73
{/* END steerers */}
69
74
75
+
{/* BEGIN changelog v1.19.1 */}
76
+
## `v1.19.1`
77
+
78
+
We reverted the CRD-based API defaults for `Certificate.Spec.IssuerRef` and `CertificateRequest.Spec.IssuerRef` after they were found to cause unexpected certificate renewals after upgrading to 1.19.0. We will try re-introducing these API defaults in cert-manager `1.20`.
79
+
We fixed a bug that caused certificates to be re-issued unexpectedly if the `issuerRef` kind or group was changed to one of the "runtime" default values.
80
+
We upgraded Go to `1.25.3` to address the following security vulnerabilities: `CVE-2025-61724`, `CVE-2025-58187`, `CVE-2025-47912`, `CVE-2025-58183`, `CVE-2025-61723`, `CVE-2025-58186`, `CVE-2025-58185`, `CVE-2025-58188`, and `CVE-2025-61725`.
81
+
82
+
Changes since `v1.19.0`:
83
+
84
+
### Bug or Regression
85
+
86
+
- BUGFIX: in case kind or group in the `issuerRef` of a Certificate was omitted, upgrading to `1.19.x` incorrectly caused the certificate to be renewed ([`#8175`](https://github.com/cert-manager/cert-manager/pull/8175), [`@cert-manager-bot`](https://github.com/cert-manager-bot))
87
+
- Bump Go to 1.25.3 to fix a backwards incompatible change to the validation of DNS names in X.509 SAN fields which prevented the use of DNS names with a trailing dot ([`#8177`](https://github.com/cert-manager/cert-manager/pull/8177), [`@wallrj-cyberark`](https://github.com/wallrj-cyberark))
88
+
- Revert API defaults for issuer reference kind and group introduced in `1.19.0` ([`#8178`](https://github.com/cert-manager/cert-manager/pull/8178), [`@cert-manager-bot`](https://github.com/cert-manager-bot))
A high cardinality label, called `path`, was removed from the `certmanager_acme_client_request_count` and `certmanager_acme_client_request_duration_seconds` metrics.
0 commit comments