Skip to content

Releases: cloudflare/origin-ca-issuer

v0.13.0

24 Oct 12:35

Choose a tag to compare

What's Changed

🆕 issuer-lib

The project is now based on cert-manager's issuer-lib a project to standardize the behavior of external issuers. The retry and backoff behavior should now more closely match that of cert-manager's in-tree issuers. Fixes #161.

🆕 Leader Election

The controller now implements leader election, implemented with Kubernetes lease objects. This now allow multiple replicas without duplicative Origin CA certificates being created. Fixes #181.

🆕 Validate Origin Issuer Authentication

The .spec.auth of OriginIssuers and ClusterOriginIssuers now enforces that only one of serviceKeyRef or tokenRef is set, enforced by the API server with CEL validation.

We continue to recommend the use of scoped API tokens over that of API service keys.

⚠️ Certificate Default Durations

The default duration of certificates, if not specified on the Certificate resources, is now 90 days, up from 7. This matches the default validity of in-tree issuers, and the cert-manager FAQ.

Durations are still rounded the the nearest values accepted by the Cloudflare API.

Full Changelog: v0.12.1...v0.13.0

v0.12.1

13 Mar 11:23

Choose a tag to compare

  • Rebuild with Go 1.24.1 and cert-manager v1.17.1.

v0.12.0

19 Feb 19:26

Choose a tag to compare

What's Changed

🆕 Controller Versioning

The version of origin-ca-issuer is now embedded by Go 1.24's go build. This version is included as part of the User-Agent sent to the Cloudflare API when creating or renewing an Origin CA certificate.

🆕 CA Certificate

The CA Certificate is now included on secrets for new or renewed certificates, for compatibility with applications that require a chain instead of just a leaf certificate. Fixes #70.

🥇 Image Signatures

The OCI artifacts for this release have been signed using cosign with the GitHub Actions OIDC Token identity, and published to the public Rekor instance. The signing of Helm artifacts is planned.

cosign verify docker.io/cloudflare/origin-ca-issuer:v0.12.0 \
  --certificate-identity https://github.com/cloudflare/origin-ca-issuer/.github/workflows/docker.yaml@refs/tags/v0.12.0 \
  --certificate-oidc-issuer https://token.actions.githubusercontent.com

As this is the first release with signatures, they are experimental. Please report any issues you have.

Full Changelog: v0.11.0...v0.12.0

v0.11.0

01 Nov 23:19

Choose a tag to compare

Breaking Changes

Certificate Issuer References Group Now Required

The Origin CA Issuer now requires the spec.issuerRef.group field to be set to "cert-manager.k8s.cloudflare.com" on Certificate resources (and equivalent annotations, such as cert-manager.io/issuer-group on Ingresses). The documentation has always included this group in examples, but an empty group was previously accepted. Certificates without this group set will now be ignored by the Origin CA Issuer.

What's Changed

  • fix(certificaterequest): ignore empty issuer group by @terinjokes in #150

Full Changelog: v0.10.0...v0.11.0

v0.10.0

04 Oct 01:51

Choose a tag to compare

What's Changed

Full Changelog: v0.9.0...v0.10.0

v0.9.0

05 Jul 21:20

Choose a tag to compare

What's Changed

Full Changelog: v0.8.0...v0.9.0

v0.8.0

22 May 00:49

Choose a tag to compare

What's Changed

Full Changelog: v0.7.0...v0.8.0

v0.7.0

17 Jan 21:29

Choose a tag to compare

Breaking Change

  • The certificate request type in the OriginIssuer now selects the correct Origin CA. The signature algorithm used will be corrected on the next renewal. Fixes #72

New Features

  • A Helm chart compatible with Helm 3.8+ are now being released to GitHub Container Registry at oci://ghcr.io/cloudflare/origin-ca-issuer-charts/origin-ca-issuer. Fixes #97

v0.6.1

07 Dec 01:48

Choose a tag to compare

  • This is a minor release to fix an issue parsing API responses from the Cloudflare API that resulted in certificates not being issued and the error message not providing sufficient information. #46
  • Introduces an experimental Helm chart repository. #17