feature

package
v1.19.3 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 2, 2026 License: Apache-2.0 Imports: 3 Imported by: 0

Documentation

Overview

feature contains controller's feature gate setup functionality. Do not import this package into any code that's shared with other components to prevent overwriting other component's feature gates, see i.e https://github.com/cert-manager/cert-manager/issues/6011

Index

Constants

View Source
const (

	// Owner: N/A
	// Alpha: v1.4
	//
	// ExperimentalCertificateSigningRequestControllers enables all CertificateSigningRequest
	// controllers that sign Kubernetes CertificateSigningRequest resources
	ExperimentalCertificateSigningRequestControllers featuregate.Feature = "ExperimentalCertificateSigningRequestControllers"

	// Owner: N/A
	// Alpha: v1.5
	// Beta: v1.15
	//
	// ExperimentalGatewayAPISupport enables the gateway-shim controller and adds support for
	// the Gateway API to the HTTP-01 challenge solver.
	ExperimentalGatewayAPISupport featuregate.Feature = "ExperimentalGatewayAPISupport"

	// Owner: @joshvanl
	// Alpha: v1.7
	// Beta: v1.15
	// GA: v1.18
	//
	// AdditionalCertificateOutputFormats enable output additional format
	AdditionalCertificateOutputFormats featuregate.Feature = "AdditionalCertificateOutputFormats"

	// Owner: @joshvanl
	// Alpha: v1.8
	//
	// ServerSideApply enables the use of ServerSideApply in all API calls.
	ServerSideApply featuregate.Feature = "ServerSideApply"

	// Owner: @spockz , @irbekrm
	// Alpha: v1.9
	//
	// LiteralCertificateSubject will enable providing a subject in the Certificate that will be used literally in the CertificateSigningRequest. The subject can be provided via `LiteralSubject` field on `Certificate`'s spec.
	// This feature gate must be used together with LiteralCertificateSubject webhook feature gate.
	// See https://github.com/cert-manager/cert-manager/issues/3203 and https://github.com/cert-manager/cert-manager/issues/4424 for context.
	LiteralCertificateSubject featuregate.Feature = "LiteralCertificateSubject"

	// Owner: @inteon
	// Alpha: v1.10
	// Beta: v1.13
	//
	// StableCertificateRequestName will enable generation of CertificateRequest resources with a fixed name. The name of the CertificateRequest will be a function of Certificate resource name and its revision
	// This feature gate will disable auto-generated CertificateRequest name
	// Github Issue: https://github.com/cert-manager/cert-manager/issues/4956
	StableCertificateRequestName featuregate.Feature = "StableCertificateRequestName"

	// Owner: @SgtCoDFish
	// Alpha: v1.11
	//
	// UseCertificateRequestBasicConstraints will add Basic Constraints section in the Extension Request of the Certificate Signing Request
	// This feature will add BasicConstraints section with CA field defaulting to false; CA field will be set true if the Certificate resource spec has isCA as true
	// Github Issue: https://github.com/cert-manager/cert-manager/issues/5539
	UseCertificateRequestBasicConstraints featuregate.Feature = "UseCertificateRequestBasicConstraints"

	// Owner: @irbekrm
	// Alpha v1.12
	// Beta: v1.13
	//
	// SecretsFilteredCaching reduces controller's memory consumption by
	// filtering which Secrets are cached in full using
	// `controller.cert-manager.io/fao` label. By default all Certificate
	// Secrets are labelled with controller.cert-manager.io/fao label. Users
	// can also label other Secrets, such as issuer credentials Secrets that
	// they know cert-manager will need to access, to speed up issuance.
	// See https://github.com/cert-manager/cert-manager/blob/master/design/20221205-memory-management.md
	SecretsFilteredCaching featuregate.Feature = "SecretsFilteredCaching"

	// Owner: @inteon
	// Beta: v1.13
	// GA: v1.15
	//
	// DisallowInsecureCSRUsageDefinition will prevent the webhook from allowing
	// CertificateRequest's usages to be only defined in the CSR, while leaving
	// the usages field empty.
	DisallowInsecureCSRUsageDefinition featuregate.Feature = "DisallowInsecureCSRUsageDefinition"

	// Owner: @tanujd11
	// Alpha: v1.14
	// Beta: v1.17
	//
	// NameConstraints adds support for Name Constraints in Certificate resources
	// with IsCA=true.
	// Github Issue: https://github.com/cert-manager/cert-manager/issues/3655
	NameConstraints featuregate.Feature = "NameConstraints"

	// Owner: @SpectralHiss
	// Alpha: v1.14
	//
	// OtherNames adds support for OtherName Subject Alternative Name values in
	// Certificate resources.
	// Github Issue: https://github.com/cert-manager/cert-manager/issues/6393
	OtherNames featuregate.Feature = "OtherNames"

	// Owner: @jsoref
	// Alpha: v1.16
	// Beta: v1.17
	// GA: v1.18
	//
	// UseDomainQualifiedFinalizer changes the finalizer added to cert-manager created
	// resources to acme.cert-manager.io/finalizer instead of finalizer.acme.cert-manager.io.
	// GitHub Issue: https://github.com/cert-manager/cert-manager/issues/7266
	UseDomainQualifiedFinalizer featuregate.Feature = "UseDomainQualifiedFinalizer"

	// Owner: N/A
	// Alpha: v0.7.2
	// Deprecated: v1.17
	// Removed: v1.18
	//
	// ValidateCAA is a now-removed feature gate which enabled CAA checking when issuing certificates
	// This was never widely adopted, and without an owner to sponsor it we decided to deprecate
	// this feature gate and then remove it.
	// The feature gate is still defined here so that users who specify the feature gate aren't
	// hit with "unknown feature gate" errors which crash the controller, but this is a no-op
	// and only prints a log line if added.
	ValidateCAA featuregate.Feature = "ValidateCAA"

	// Owner: @wallrj
	// Alpha: v1.18.0
	// Beta: v1.18.0
	//
	// DefaultPrivateKeyRotationPolicyAlways change the default value of
	// `Certificate.Spec.PrivateKey.RotationPolicy` to `Always`.
	// Why? Because the old default (`Never`) was unintuitive and insecure. For
	// example, if a private key is exposed, users may (reasonably) assume that
	// re-issuing a certificate (e.g. using cmctl renew) will generate a new
	// private key, but it won't unless the user has explicitly set
	// rotationPolicy: Always on the Certificate resource.
	// This feature skipped the Alpha phase and was instead introduced as a Beta
	// feature, because it is thought be low-risk feature and because we want to
	// accelerate the adoption of this important security feature.
	DefaultPrivateKeyRotationPolicyAlways featuregate.Feature = "DefaultPrivateKeyRotationPolicyAlways"

	// Owner: @sspreitzer, @wallrj
	// Alpha: v1.18.1
	// Beta: v1.18.1
	//
	// ACMEHTTP01IngressPathTypeExact will use Ingress pathType `Exact`.
	// `ACMEHTTP01IngressPathTypeExact` changes the default `pathType` for ACME
	// HTTP01 Ingress based challenges to `Exact`. This security feature ensures
	// that the challenge path (which is an exact path) is not misinterpreted as
	// a regular expression or some other Ingress specific (ImplementationSpecific)
	// parsing. This allows HTTP01 challenges to be solved when using standards
	// compliant Ingress controllers such as Cilium. The old default
	// `ImplementationSpecific“ can be reinstated by disabling this feature gate.
	// You may need to disable the feature for compatibility with ingress-nginx.
	// See: https://cert-manager.io/docs/releases/release-notes/release-notes-1.18
	ACMEHTTP01IngressPathTypeExact featuregate.Feature = "ACMEHTTP01IngressPathTypeExact"
)

Variables

This section is empty.

Functions

This section is empty.

Types

This section is empty.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL