Update Helm release cert-manager to v1.18.0
No problems deploying cert-manager to Proxmox VE K3s Kubernetes cluster via Helm Chart and Flux V2 reconciliation in a GitOps approach with dependency update facilitated by Mend's Renovate Bot.
This MR contains the following updates:
| Package | Update | Change | 
|---|---|---|
| cert-manager (source) | minor | v1.17.2->v1.18.0 | 
Release Notes
cert-manager/cert-manager (cert-manager)
v1.18.0
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
cert-manager 1.18 introduces several new features and breaking changes. Highlights include support for ACME certificate profiles, a new default for Certificate.Spec.PrivateKey.RotationPolicy now set to Always (breaking change), and the default Certificate.Spec.RevisionHistoryLimit now set to 1 (potentially breaking).
ℹ️ Be sure to review all new features and changes below, and read the full release notes carefully before upgrading.
Known Issues
- ACME HTTP01 challenge paths are rejected by the ingress-nginx validating webhook (#7791)
Changes since v1.17.2:
Feature
- Add config to the Vault issuer to allow the server-name to be specified when validating the certificates the Vault server presents. (#7663, @ThatsMrTalbot)
- Added app.kubernetes.io/managed-by: cert-managerlabel to the created Let's Encrypt account keys (#7577, @terinjokes)
- Added certificate issuance and expiration time metrics (certmanager_certificate_not_before_timestamp_seconds,certmanager_certificate_not_after_timestamp_seconds). (#7612, @solidDoWant)
- Added ingress-shim option: --extra-certificate-annotations, which sets a list of annotation keys to be copied from Ingress-like to resulting Certificate object (#7083, @k0da)
- Added the issshort name for the cert-managerIssuerresource. (#7373, @SgtCoDFish)
- Added the cissshort name for the cert-managerClusterIssuerresource (#7373, @SgtCoDFish)
- Adds the global.rbac.disableHTTPChallengesRolehelm value to disable HTTP-01 ACME challenges. This allows cert-manager to drop its permission to create pods, improving security when HTTP-01 challenges are not required. (#7666, @ali-hamza-noor)
- Allow customizing signature algorithm (#7591, @tareksha)
- Cache the full DNS response and handle TTL expiration in FindZoneByFqdn(#7596, @ThatsIvan)
- Cert-manager now uses a local fork of the golang.org/x/crypto/acme package (#7752, @wallrj)
- Add support for ACME profiles extension. (#7777, @wallrj)
- Promote the UseDomainQualifiedFinalizerfeature to GA. (#7735, @jsoref)
- Switched service/servicemon definitions to use port names instead of numbers. (#7727, @jcpunk)
- The default value of Certificate.Spec.PrivateKey.RotationPolicychanged fromNevertoAlways. (#7723, @wallrj)
- Potentially breaking: Set the default revisionHistoryLimit to 1 for the CertificateRequest revisions (#7758, @ali-hamza-noor)
Documentation
- Fix some comments (#7620, @teslaedison)
Bug or Regression
- Bump go-josedependency to addressCVE-2025-27144. (#7606, @SgtCoDFish)
- Bump golang.org/x/oauth2to patchCVE-2025-22868. (#7638, @NicholasBlaskey)
- Bump golang.org/x/cryptoto patchGHSA-hcg3-q754-cr77. (#7638, @NicholasBlaskey)
- Bump github.com/golang-jwt/jwtto patchGHSA-mh63-6h87-95cp. (#7638, @NicholasBlaskey)
- Change of the Kubernetes Ingress pathType from ImplementationSpecifictoExactfor a reliable handling of ingress controllers and enhanced security. (#7767, @sspreitzer)
- Fix AWS Route53 error detection for not-found errors during deletion of DNS records. (#7690, @wallrj)
- Fix behavior when running with --namespace=<namespace>: limit the scope of cert-manager to a single namespace and disable cluster-scoped controllers. (#7678, @tsaarni)
- Fix handling of certificates with IP addresses in the commonNamefield; IP addresses are no longer added to the DNSsubjectAlternativeNamelist and are instead added to theipAddressesfield as expected. (#7081, @johnjcool)
- Fix issuing of certificates via DNS01 challenges on Cloudflare after a breaking change to the Cloudflare API (#7549, @LukeCarrier)
- Fixed the certmanager_certificate_renewal_timestamp_secondsmetric help text indicating that the metric is relative to expiration time, rather than Unix epoch time. (#7609, @solidDoWant)
- Fixing the service account template to incorporate boolean values for the annotations. (#7698, @ali-hamza-noor)
- Quote nodeSelector values in Helm Chart (#7579, @tobiasbp)
- Skip Gateway TLS listeners in Passthroughmode. (#6986, @vehagn)
- Upgrade golang.org/x/netfixingCVE-2025-22870. (#7619, @dependabot[bot])
Other (Cleanup or Flake)
- ACME E2E Tests: Upgraded Pebble to v2.7.0 and modified the ACME tests to match latest Pebble behaviour. (#7771, @wallrj)
- Patch the third_party/forked/acmepackage with support for the ACME profiles extension. (#7776, @wallrj)
- Promote the AdditionalCertificateOutputFormatsfeature to GA, making additional formats always enabled. (#7744, @erikgb)
- Remove deprecated feature gate ValidateCAA. Setting this feature gate is now a no-op which does nothing but print a warning log line (#7553, @SgtCoDFish)
- Update kind images to include the Kubernetes 1.33 node image (#7787, @cert-manager-bot)
- Upgrade Go to v1.24.4(#7785, @wallrj)
- Use slices.Contains to simplify code (#7753, @cuinix)
