Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Oct 20, 2025

Bumps the all group with 3 updates: github.com/cert-manager/approver-policy, github.com/cert-manager/cert-manager and sigs.k8s.io/controller-runtime.

Updates github.com/cert-manager/approver-policy from 0.22.1 to 0.22.2

Release notes

Sourced from github.com/cert-manager/approver-policy's releases.

v0.22.2

approver-policy provides a policy engine for certificates issued by cert-manager!

This release is a patch release, upgrading Go from 1.25.1 to 1.25.3, fixing a range of CVEs: CVE-2025-61724, CVE-2025-58187, CVE-2025-47912, CVE-2025-58183, CVE-2025-61723, CVE-2025-58186, CVE-2025-58185, CVE-2025-58188, and CVE-2025-61725.

Furthermore, additional go dependencies were upgraded where possible.

What's Changed

Full Changelog: cert-manager/approver-policy@v0.22.1...v0.22.2

Commits
  • fa9e56d Merge pull request #731 from cert-manager/renovate/misc-go-deps
  • 914a803 fix(deps): update module github.com/cert-manager/cert-manager to v1.19.1
  • cc30113 Merge pull request #728 from cert-manager/renovate/kubernetes-go-deps
  • 5d78895 Merge pull request #730 from cert-manager/self-upgrade-main
  • 31717c8 BOT: run 'make upgrade-klone' and 'make generate'
  • c3c9d85 fix(deps): update module sigs.k8s.io/controller-runtime to v0.22.3
  • See full diff in compare view

Updates github.com/cert-manager/cert-manager from 1.19.0 to 1.19.1

Release notes

Sourced from github.com/cert-manager/cert-manager's releases.

v1.19.1

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

We reverted the CRD-based API defaults for Certificate.Spec.IssuerRef and CertificateRequest.Spec.IssuerRef after they were found to cause unexpected certificate renewals after upgrading to 1.19.0. We will try re-introducing these API defaults in cert-manager 1.20. We fixed a bug that caused certificates to be re-issued unexpectedly if the issuerRef kind or group was changed to one of the "runtime" default values. We upgraded Go to 1.25.3 to address the following security vulnerabilities: CVE-2025-61724, CVE-2025-58187, CVE-2025-47912, CVE-2025-58183, CVE-2025-61723, CVE-2025-58186, CVE-2025-58185, CVE-2025-58188, and CVE-2025-61725.

📖 Read the full 1.19 release notes on the cert-manager.io website before upgrading.

Changes since v1.19.0:

Bug or Regression

  • BUGFIX: in case kind or group in the issuerRef of a Certificate was omitted, upgrading to 1.19.x incorrectly caused the certificate to be renewed (#8175, @​cert-manager-bot)
  • Bump Go to 1.25.3 to fix a backwards incompatible change to the validation of DNS names in X.509 SAN fields which prevented the use of DNS names with a trailing dot (#8177, @​wallrj-cyberark)
  • Revert API defaults for issuer reference kind and group introduced in 0.19.0 (#8178, @​cert-manager-bot)
Commits
  • a22e21e Merge pull request #8180 from cert-manager-bot/cherry-pick-8168-to-release-1.19
  • e1390a4 fix(deps): update module github.com/venafi/vcert/v5 to v5.12.2
  • 36e4265 Merge pull request #8179 from cert-manager-bot/cherry-pick-8164-to-release-1.19
  • 3416dd0 fix(deps): update module sigs.k8s.io/controller-runtime to v0.22.3
  • 4a63715 Merge pull request #8178 from cert-manager-bot/cherry-pick-8173-to-release-1.19
  • a48b6fc REVERT: API defaults for issuer reference kind and group
  • 4706a48 Merge pull request #8177 from wallrj-cyberark/release-1.19-upgrade-go
  • bdfb708 [release-1.19] Disable generate-klone so we can manually update Go versions
  • 43825b6 [release-1.19] bump Go to 1.25.3
  • de44c90 Merge pull request #8175 from cert-manager-bot/cherry-pick-8160-to-release-1.19
  • Additional commits viewable in compare view

Updates sigs.k8s.io/controller-runtime from 0.22.2 to 0.22.3

Release notes

Sourced from sigs.k8s.io/controller-runtime's releases.

v0.22.3

What's Changed

Full Changelog: kubernetes-sigs/controller-runtime@v0.22.2...v0.22.3

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the all group with 3 updates: [github.com/cert-manager/approver-policy](https://github.com/cert-manager/approver-policy), [github.com/cert-manager/cert-manager](https://github.com/cert-manager/cert-manager) and [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime).


Updates `github.com/cert-manager/approver-policy` from 0.22.1 to 0.22.2
- [Release notes](https://github.com/cert-manager/approver-policy/releases)
- [Changelog](https://github.com/cert-manager/approver-policy/blob/main/RELEASE.md)
- [Commits](cert-manager/approver-policy@v0.22.1...v0.22.2)

Updates `github.com/cert-manager/cert-manager` from 1.19.0 to 1.19.1
- [Release notes](https://github.com/cert-manager/cert-manager/releases)
- [Changelog](https://github.com/cert-manager/cert-manager/blob/master/RELEASE.md)
- [Commits](cert-manager/cert-manager@v1.19.0...v1.19.1)

Updates `sigs.k8s.io/controller-runtime` from 0.22.2 to 0.22.3
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](kubernetes-sigs/controller-runtime@v0.22.2...v0.22.3)

---
updated-dependencies:
- dependency-name: github.com/cert-manager/approver-policy
  dependency-version: 0.22.2
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/cert-manager/cert-manager
  dependency-version: 1.19.1
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: sigs.k8s.io/controller-runtime
  dependency-version: 0.22.3
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Oct 20, 2025
Copy link
Member

@erikgb erikgb left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@cert-manager-prow
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: erikgb

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@cert-manager-prow cert-manager-prow bot merged commit 6670c47 into main Oct 24, 2025
4 checks passed
@dependabot dependabot bot deleted the dependabot/go_modules/all-f89b27126a branch October 24, 2025 21:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved dco-signoff: yes dependencies Pull requests that update a dependency file go Pull requests that update go code lgtm size/S

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants