Update cert manager to 0.16.1 (#6600)
* Update cert manager to 0.16.1 * Update cert manager to 0.16.1 Co-authored-by: Barry Melbourne <9964974+bmelbourne@users.noreply.github.com>
This commit is contained in:
parent
0553814b4f
commit
fc61f8d52e
11 changed files with 17638 additions and 5412 deletions
|
@ -137,7 +137,7 @@ Note: Upstart/SysV init based OS types are not supported.
|
||||||
- [ambassador](https://github.com/datawire/ambassador): v1.5
|
- [ambassador](https://github.com/datawire/ambassador): v1.5
|
||||||
- [cephfs-provisioner](https://github.com/kubernetes-incubator/external-storage) v2.1.0-k8s1.11
|
- [cephfs-provisioner](https://github.com/kubernetes-incubator/external-storage) v2.1.0-k8s1.11
|
||||||
- [rbd-provisioner](https://github.com/kubernetes-incubator/external-storage) v2.1.1-k8s1.11
|
- [rbd-provisioner](https://github.com/kubernetes-incubator/external-storage) v2.1.1-k8s1.11
|
||||||
- [cert-manager](https://github.com/jetstack/cert-manager) v0.15.2
|
- [cert-manager](https://github.com/jetstack/cert-manager) v0.16.1
|
||||||
- [coredns](https://github.com/coredns/coredns) v1.6.7
|
- [coredns](https://github.com/coredns/coredns) v1.6.7
|
||||||
- [ingress-nginx](https://github.com/kubernetes/ingress-nginx) v0.35.0
|
- [ingress-nginx](https://github.com/kubernetes/ingress-nginx) v0.35.0
|
||||||
|
|
||||||
|
|
|
@ -583,7 +583,7 @@ ingress_ambassador_image_repo: "{{ quay_image_repo }}/datawire/ambassador-operat
|
||||||
ingress_ambassador_image_tag: "v1.2.8"
|
ingress_ambassador_image_tag: "v1.2.8"
|
||||||
alb_ingress_image_repo: "{{ docker_image_repo }}/amazon/aws-alb-ingress-controller"
|
alb_ingress_image_repo: "{{ docker_image_repo }}/amazon/aws-alb-ingress-controller"
|
||||||
alb_ingress_image_tag: "v1.1.8"
|
alb_ingress_image_tag: "v1.1.8"
|
||||||
cert_manager_version: "v0.15.2"
|
cert_manager_version: "v0.16.1"
|
||||||
cert_manager_controller_image_repo: "{{ quay_image_repo }}/jetstack/cert-manager-controller"
|
cert_manager_controller_image_repo: "{{ quay_image_repo }}/jetstack/cert-manager-controller"
|
||||||
cert_manager_controller_image_tag: "{{ cert_manager_version }}"
|
cert_manager_controller_image_tag: "{{ cert_manager_version }}"
|
||||||
cert_manager_cainjector_image_repo: "{{ quay_image_repo }}/jetstack/cert-manager-cainjector"
|
cert_manager_cainjector_image_repo: "{{ quay_image_repo }}/jetstack/cert-manager-cainjector"
|
||||||
|
|
|
@ -49,6 +49,90 @@ rules:
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
|
metadata:
|
||||||
|
name: cert-manager-controller-issuers
|
||||||
|
labels:
|
||||||
|
app: cert-manager
|
||||||
|
app.kubernetes.io/name: cert-manager
|
||||||
|
app.kubernetes.io/instance: cert-manager
|
||||||
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
app.kubernetes.io/component: controller
|
||||||
|
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
||||||
|
rules:
|
||||||
|
- apiGroups: ["cert-manager.io"]
|
||||||
|
resources: ["issuers", "issuers/status"]
|
||||||
|
verbs: ["update"]
|
||||||
|
- apiGroups: ["cert-manager.io"]
|
||||||
|
resources: ["issuers"]
|
||||||
|
verbs: ["get", "list", "watch"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["secrets"]
|
||||||
|
verbs: ["get", "list", "watch", "create", "update", "delete"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["events"]
|
||||||
|
verbs: ["create", "patch"]
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
kind: ClusterRole
|
||||||
|
metadata:
|
||||||
|
name: cert-manager-controller-clusterissuers
|
||||||
|
labels:
|
||||||
|
app: cert-manager
|
||||||
|
app.kubernetes.io/name: cert-manager
|
||||||
|
app.kubernetes.io/instance: cert-manager
|
||||||
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
app.kubernetes.io/component: controller
|
||||||
|
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
||||||
|
rules:
|
||||||
|
- apiGroups: ["cert-manager.io"]
|
||||||
|
resources: ["clusterissuers", "clusterissuers/status"]
|
||||||
|
verbs: ["update"]
|
||||||
|
- apiGroups: ["cert-manager.io"]
|
||||||
|
resources: ["clusterissuers"]
|
||||||
|
verbs: ["get", "list", "watch"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["secrets"]
|
||||||
|
verbs: ["get", "list", "watch", "create", "update", "delete"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["events"]
|
||||||
|
verbs: ["create", "patch"]
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
kind: ClusterRole
|
||||||
|
metadata:
|
||||||
|
name: cert-manager-controller-certificates
|
||||||
|
labels:
|
||||||
|
app: cert-manager
|
||||||
|
app.kubernetes.io/name: cert-manager
|
||||||
|
app.kubernetes.io/instance: cert-manager
|
||||||
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
app.kubernetes.io/component: controller
|
||||||
|
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
||||||
|
rules:
|
||||||
|
- apiGroups: ["cert-manager.io"]
|
||||||
|
resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
|
||||||
|
verbs: ["update"]
|
||||||
|
- apiGroups: ["cert-manager.io"]
|
||||||
|
resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"]
|
||||||
|
verbs: ["get", "list", "watch"]
|
||||||
|
# We require these rules to support users with the OwnerReferencesPermissionEnforcement
|
||||||
|
# admission controller enabled:
|
||||||
|
# https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
|
||||||
|
- apiGroups: ["cert-manager.io"]
|
||||||
|
resources: ["certificates/finalizers", "certificaterequests/finalizers"]
|
||||||
|
verbs: ["update"]
|
||||||
|
- apiGroups: ["acme.cert-manager.io"]
|
||||||
|
resources: ["orders"]
|
||||||
|
verbs: ["create", "delete", "get", "list", "watch"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["secrets"]
|
||||||
|
verbs: ["get", "list", "watch", "create", "update", "delete"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["events"]
|
||||||
|
verbs: ["create", "patch"]
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
name: cert-manager-controller-orders
|
name: cert-manager-controller-orders
|
||||||
labels:
|
labels:
|
||||||
|
@ -86,56 +170,6 @@ rules:
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
|
||||||
name: cert-manager-controller-ingress-shim
|
|
||||||
labels:
|
|
||||||
app: cert-manager
|
|
||||||
app.kubernetes.io/name: cert-manager
|
|
||||||
app.kubernetes.io/instance: cert-manager
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
app.kubernetes.io/component: controller
|
|
||||||
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
|
||||||
rules:
|
|
||||||
- apiGroups: ["cert-manager.io"]
|
|
||||||
resources: ["certificates", "certificaterequests"]
|
|
||||||
verbs: ["create", "update", "delete"]
|
|
||||||
- apiGroups: ["cert-manager.io"]
|
|
||||||
resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"]
|
|
||||||
verbs: ["get", "list", "watch"]
|
|
||||||
- apiGroups: ["extensions"]
|
|
||||||
resources: ["ingresses"]
|
|
||||||
verbs: ["get", "list", "watch"]
|
|
||||||
# We require these rules to support users with the OwnerReferencesPermissionEnforcement
|
|
||||||
# admission controller enabled:
|
|
||||||
# https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
|
|
||||||
- apiGroups: ["extensions"]
|
|
||||||
resources: ["ingresses/finalizers"]
|
|
||||||
verbs: ["update"]
|
|
||||||
- apiGroups: [""]
|
|
||||||
resources: ["events"]
|
|
||||||
verbs: ["create", "patch"]
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRole
|
|
||||||
metadata:
|
|
||||||
name: cert-manager-view
|
|
||||||
labels:
|
|
||||||
app: cert-manager
|
|
||||||
app.kubernetes.io/name: cert-manager
|
|
||||||
app.kubernetes.io/instance: cert-manager
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
app.kubernetes.io/component: controller
|
|
||||||
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
|
||||||
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
|
||||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
|
||||||
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
|
||||||
rules:
|
|
||||||
- apiGroups: ["cert-manager.io"]
|
|
||||||
resources: ["certificates", "certificaterequests", "issuers"]
|
|
||||||
verbs: ["get", "list", "watch"]
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
||||||
kind: ClusterRole
|
|
||||||
metadata:
|
metadata:
|
||||||
name: cert-manager-controller-challenges
|
name: cert-manager-controller-challenges
|
||||||
labels:
|
labels:
|
||||||
|
@ -193,7 +227,7 @@ rules:
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
name: cert-manager-controller-issuers
|
name: cert-manager-controller-ingress-shim
|
||||||
labels:
|
labels:
|
||||||
app: cert-manager
|
app: cert-manager
|
||||||
app.kubernetes.io/name: cert-manager
|
app.kubernetes.io/name: cert-manager
|
||||||
|
@ -203,22 +237,28 @@ metadata:
|
||||||
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
||||||
rules:
|
rules:
|
||||||
- apiGroups: ["cert-manager.io"]
|
- apiGroups: ["cert-manager.io"]
|
||||||
resources: ["issuers", "issuers/status"]
|
resources: ["certificates", "certificaterequests"]
|
||||||
verbs: ["update"]
|
verbs: ["create", "update", "delete"]
|
||||||
- apiGroups: ["cert-manager.io"]
|
- apiGroups: ["cert-manager.io"]
|
||||||
resources: ["issuers"]
|
resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"]
|
||||||
verbs: ["get", "list", "watch"]
|
verbs: ["get", "list", "watch"]
|
||||||
- apiGroups: [""]
|
- apiGroups: ["extensions"]
|
||||||
resources: ["secrets"]
|
resources: ["ingresses"]
|
||||||
verbs: ["get", "list", "watch", "create", "update", "delete"]
|
verbs: ["get", "list", "watch"]
|
||||||
|
# We require these rules to support users with the OwnerReferencesPermissionEnforcement
|
||||||
|
# admission controller enabled:
|
||||||
|
# https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
|
||||||
|
- apiGroups: ["extensions"]
|
||||||
|
resources: ["ingresses/finalizers"]
|
||||||
|
verbs: ["update"]
|
||||||
- apiGroups: [""]
|
- apiGroups: [""]
|
||||||
resources: ["events"]
|
resources: ["events"]
|
||||||
verbs: ["create", "patch"]
|
verbs: ["create", "patch"]
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
name: cert-manager-controller-clusterissuers
|
name: cert-manager-view
|
||||||
labels:
|
labels:
|
||||||
app: cert-manager
|
app: cert-manager
|
||||||
app.kubernetes.io/name: cert-manager
|
app.kubernetes.io/name: cert-manager
|
||||||
|
@ -226,19 +266,13 @@ metadata:
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
app.kubernetes.io/component: controller
|
app.kubernetes.io/component: controller
|
||||||
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
||||||
|
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
||||||
|
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||||
|
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
||||||
rules:
|
rules:
|
||||||
- apiGroups: ["cert-manager.io"]
|
- apiGroups: ["cert-manager.io"]
|
||||||
resources: ["clusterissuers", "clusterissuers/status"]
|
resources: ["certificates", "certificaterequests", "issuers"]
|
||||||
verbs: ["update"]
|
|
||||||
- apiGroups: ["cert-manager.io"]
|
|
||||||
resources: ["clusterissuers"]
|
|
||||||
verbs: ["get", "list", "watch"]
|
verbs: ["get", "list", "watch"]
|
||||||
- apiGroups: [""]
|
|
||||||
resources: ["secrets"]
|
|
||||||
verbs: ["get", "list", "watch", "create", "update", "delete"]
|
|
||||||
- apiGroups: [""]
|
|
||||||
resources: ["events"]
|
|
||||||
verbs: ["create", "patch"]
|
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
|
@ -257,37 +291,3 @@ rules:
|
||||||
- apiGroups: ["cert-manager.io"]
|
- apiGroups: ["cert-manager.io"]
|
||||||
resources: ["certificates", "certificaterequests", "issuers"]
|
resources: ["certificates", "certificaterequests", "issuers"]
|
||||||
verbs: ["create", "delete", "deletecollection", "patch", "update"]
|
verbs: ["create", "delete", "deletecollection", "patch", "update"]
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
||||||
kind: ClusterRole
|
|
||||||
metadata:
|
|
||||||
name: cert-manager-controller-certificates
|
|
||||||
labels:
|
|
||||||
app: cert-manager
|
|
||||||
app.kubernetes.io/name: cert-manager
|
|
||||||
app.kubernetes.io/instance: cert-manager
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
app.kubernetes.io/component: controller
|
|
||||||
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
|
||||||
rules:
|
|
||||||
- apiGroups: ["cert-manager.io"]
|
|
||||||
resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
|
|
||||||
verbs: ["update"]
|
|
||||||
- apiGroups: ["cert-manager.io"]
|
|
||||||
resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"]
|
|
||||||
verbs: ["get", "list", "watch"]
|
|
||||||
# We require these rules to support users with the OwnerReferencesPermissionEnforcement
|
|
||||||
# admission controller enabled:
|
|
||||||
# https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
|
|
||||||
- apiGroups: ["cert-manager.io"]
|
|
||||||
resources: ["certificates/finalizers", "certificaterequests/finalizers"]
|
|
||||||
verbs: ["update"]
|
|
||||||
- apiGroups: ["acme.cert-manager.io"]
|
|
||||||
resources: ["orders"]
|
|
||||||
verbs: ["create", "delete", "get", "list", "watch"]
|
|
||||||
- apiGroups: [""]
|
|
||||||
resources: ["secrets"]
|
|
||||||
verbs: ["get", "list", "watch", "create", "update", "delete"]
|
|
||||||
- apiGroups: [""]
|
|
||||||
resources: ["events"]
|
|
||||||
verbs: ["create", "patch"]
|
|
||||||
|
|
|
@ -36,7 +36,7 @@ subjects:
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
name: cert-manager-controller-certificates
|
name: cert-manager-controller-issuers
|
||||||
labels:
|
labels:
|
||||||
app: cert-manager
|
app: cert-manager
|
||||||
app.kubernetes.io/name: cert-manager
|
app.kubernetes.io/name: cert-manager
|
||||||
|
@ -47,7 +47,7 @@ metadata:
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
name: cert-manager-controller-certificates
|
name: cert-manager-controller-issuers
|
||||||
subjects:
|
subjects:
|
||||||
- name: cert-manager
|
- name: cert-manager
|
||||||
namespace: {{ cert_manager_namespace }}
|
namespace: {{ cert_manager_namespace }}
|
||||||
|
@ -75,6 +75,46 @@ subjects:
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: cert-manager-controller-certificates
|
||||||
|
labels:
|
||||||
|
app: cert-manager
|
||||||
|
app.kubernetes.io/name: cert-manager
|
||||||
|
app.kubernetes.io/instance: cert-manager
|
||||||
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
app.kubernetes.io/component: controller
|
||||||
|
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: cert-manager-controller-certificates
|
||||||
|
subjects:
|
||||||
|
- name: cert-manager
|
||||||
|
namespace: {{ cert_manager_namespace }}
|
||||||
|
kind: ServiceAccount
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: cert-manager-controller-orders
|
||||||
|
labels:
|
||||||
|
app: cert-manager
|
||||||
|
app.kubernetes.io/name: cert-manager
|
||||||
|
app.kubernetes.io/instance: cert-manager
|
||||||
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
app.kubernetes.io/component: controller
|
||||||
|
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: cert-manager-controller-orders
|
||||||
|
subjects:
|
||||||
|
- name: cert-manager
|
||||||
|
namespace: {{ cert_manager_namespace }}
|
||||||
|
kind: ServiceAccount
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
name: cert-manager-controller-challenges
|
name: cert-manager-controller-challenges
|
||||||
labels:
|
labels:
|
||||||
|
@ -112,43 +152,3 @@ subjects:
|
||||||
- name: cert-manager
|
- name: cert-manager
|
||||||
namespace: {{ cert_manager_namespace }}
|
namespace: {{ cert_manager_namespace }}
|
||||||
kind: ServiceAccount
|
kind: ServiceAccount
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
metadata:
|
|
||||||
name: cert-manager-controller-orders
|
|
||||||
labels:
|
|
||||||
app: cert-manager
|
|
||||||
app.kubernetes.io/name: cert-manager
|
|
||||||
app.kubernetes.io/instance: cert-manager
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
app.kubernetes.io/component: controller
|
|
||||||
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
kind: ClusterRole
|
|
||||||
name: cert-manager-controller-orders
|
|
||||||
subjects:
|
|
||||||
- name: cert-manager
|
|
||||||
namespace: {{ cert_manager_namespace }}
|
|
||||||
kind: ServiceAccount
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
metadata:
|
|
||||||
name: cert-manager-controller-issuers
|
|
||||||
labels:
|
|
||||||
app: cert-manager
|
|
||||||
app.kubernetes.io/name: cert-manager
|
|
||||||
app.kubernetes.io/instance: cert-manager
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
app.kubernetes.io/component: controller
|
|
||||||
helm.sh/chart: cert-manager-{{ cert_manager_version }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
kind: ClusterRole
|
|
||||||
name: cert-manager-controller-issuers
|
|
||||||
subjects:
|
|
||||||
- name: cert-manager
|
|
||||||
namespace: {{ cert_manager_namespace }}
|
|
||||||
kind: ServiceAccount
|
|
||||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -68,10 +68,7 @@ spec:
|
||||||
- name: v1alpha2
|
- name: v1alpha2
|
||||||
served: true
|
served: true
|
||||||
storage: true
|
storage: true
|
||||||
- name: v1alpha3
|
"schema":
|
||||||
served: true
|
|
||||||
storage: false
|
|
||||||
"validation":
|
|
||||||
"openAPIV3Schema":
|
"openAPIV3Schema":
|
||||||
description: Order is a type to represent an Order with an ACME server
|
description: Order is a type to represent an Order with an ACME server
|
||||||
type: object
|
type: object
|
||||||
|
@ -94,14 +91,14 @@ spec:
|
||||||
type: object
|
type: object
|
||||||
required:
|
required:
|
||||||
- csr
|
- csr
|
||||||
|
- dnsNames
|
||||||
- issuerRef
|
- issuerRef
|
||||||
properties:
|
properties:
|
||||||
commonName:
|
commonName:
|
||||||
description: CommonName is the common name as specified on the DER encoded
|
description: CommonName is the common name as specified on the DER
|
||||||
CSR. If CommonName is not specified, the first DNSName specified will
|
encoded CSR. If specified, this value must also be present in `dnsNames`.
|
||||||
be used as the CommonName. At least one of CommonName or a DNSNames
|
This field must match the corresponding field on the DER encoded
|
||||||
must be set. This field must match the corresponding field on the
|
CSR.
|
||||||
DER encoded CSR.
|
|
||||||
type: string
|
type: string
|
||||||
csr:
|
csr:
|
||||||
description: Certificate signing request bytes in DER encoding. This
|
description: Certificate signing request bytes in DER encoding. This
|
||||||
|
@ -111,28 +108,29 @@ spec:
|
||||||
format: byte
|
format: byte
|
||||||
dnsNames:
|
dnsNames:
|
||||||
description: DNSNames is a list of DNS names that should be included
|
description: DNSNames is a list of DNS names that should be included
|
||||||
as part of the Order validation process. If CommonName is not specified,
|
as part of the Order validation process. This field must match the
|
||||||
the first DNSName specified will be used as the CommonName. At least
|
corresponding field on the DER encoded CSR.
|
||||||
one of CommonName or a DNSNames must be set. This field must match
|
|
||||||
the corresponding field on the DER encoded CSR.
|
|
||||||
type: array
|
type: array
|
||||||
items:
|
items:
|
||||||
type: string
|
type: string
|
||||||
issuerRef:
|
issuerRef:
|
||||||
description: IssuerRef references a properly configured ACME-type Issuer
|
description: IssuerRef references a properly configured ACME-type
|
||||||
which should be used to create this Order. If the Issuer does not
|
Issuer which should be used to create this Order. If the Issuer
|
||||||
exist, processing will be retried. If the Issuer is not an 'ACME'
|
does not exist, processing will be retried. If the Issuer is not
|
||||||
Issuer, an error will be returned and the Order will be marked as
|
an 'ACME' Issuer, an error will be returned and the Order will be
|
||||||
failed.
|
marked as failed.
|
||||||
type: object
|
type: object
|
||||||
required:
|
required:
|
||||||
- name
|
- name
|
||||||
properties:
|
properties:
|
||||||
group:
|
group:
|
||||||
|
description: Group of the resource being referred to.
|
||||||
type: string
|
type: string
|
||||||
kind:
|
kind:
|
||||||
|
description: Kind of the resource being referred to.
|
||||||
type: string
|
type: string
|
||||||
name:
|
name:
|
||||||
|
description: Name of the resource being referred to.
|
||||||
type: string
|
type: string
|
||||||
status:
|
status:
|
||||||
type: object
|
type: object
|
||||||
|
@ -153,8 +151,8 @@ spec:
|
||||||
challenges:
|
challenges:
|
||||||
description: Challenges specifies the challenge types offered
|
description: Challenges specifies the challenge types offered
|
||||||
by the ACME server. One of these challenge types will be selected
|
by the ACME server. One of these challenge types will be selected
|
||||||
when validating the DNS name and an appropriate Challenge resource
|
when validating the DNS name and an appropriate Challenge
|
||||||
will be created to perform the ACME challenge process.
|
resource will be created to perform the ACME challenge process.
|
||||||
type: array
|
type: array
|
||||||
items:
|
items:
|
||||||
description: Challenge specifies a challenge offered by the
|
description: Challenge specifies a challenge offered by the
|
||||||
|
@ -167,17 +165,20 @@ spec:
|
||||||
- url
|
- url
|
||||||
properties:
|
properties:
|
||||||
token:
|
token:
|
||||||
description: Token is the token that must be presented for
|
description: Token is the token that must be presented
|
||||||
this challenge. This is used to compute the 'key' that
|
for this challenge. This is used to compute the 'key'
|
||||||
must also be presented.
|
that must also be presented.
|
||||||
type: string
|
type: string
|
||||||
type:
|
type:
|
||||||
description: Type is the type of challenge being offered,
|
description: Type is the type of challenge being offered,
|
||||||
e.g. http-01, dns-01
|
e.g. 'http-01', 'dns-01', 'tls-sni-01', etc. This is
|
||||||
|
the raw value retrieved from the ACME server. Only 'http-01'
|
||||||
|
and 'dns-01' are supported by cert-manager, other values
|
||||||
|
will be ignored.
|
||||||
type: string
|
type: string
|
||||||
url:
|
url:
|
||||||
description: URL is the URL of this challenge. It can be
|
description: URL is the URL of this challenge. It can
|
||||||
used to retrieve additional metadata about the Challenge
|
be used to retrieve additional metadata about the Challenge
|
||||||
from the ACME server.
|
from the ACME server.
|
||||||
type: string
|
type: string
|
||||||
identifier:
|
identifier:
|
||||||
|
@ -187,12 +188,12 @@ spec:
|
||||||
initialState:
|
initialState:
|
||||||
description: InitialState is the initial state of the ACME authorization
|
description: InitialState is the initial state of the ACME authorization
|
||||||
when first fetched from the ACME server. If an Authorization
|
when first fetched from the ACME server. If an Authorization
|
||||||
is already 'valid', the Order controller will not create a Challenge
|
is already 'valid', the Order controller will not create a
|
||||||
resource for the authorization. This will occur when working
|
Challenge resource for the authorization. This will occur
|
||||||
with an ACME server that enables 'authz reuse' (such as Let's
|
when working with an ACME server that enables 'authz reuse'
|
||||||
Encrypt's production endpoint). If not set and 'identifier'
|
(such as Let's Encrypt's production endpoint). If not set
|
||||||
is set, the state is assumed to be pending and a Challenge will
|
and 'identifier' is set, the state is assumed to be pending
|
||||||
be created.
|
and a Challenge will be created.
|
||||||
type: string
|
type: string
|
||||||
enum:
|
enum:
|
||||||
- valid
|
- valid
|
||||||
|
@ -207,17 +208,392 @@ spec:
|
||||||
completed
|
completed
|
||||||
type: string
|
type: string
|
||||||
wildcard:
|
wildcard:
|
||||||
description: Wildcard will be true if this authorization is for
|
description: Wildcard will be true if this authorization is
|
||||||
a wildcard DNS name. If this is true, the identifier will be
|
for a wildcard DNS name. If this is true, the identifier will
|
||||||
the *non-wildcard* version of the DNS name. For example, if
|
be the *non-wildcard* version of the DNS name. For example,
|
||||||
'*.example.com' is the DNS name being validated, this field
|
if '*.example.com' is the DNS name being validated, this field
|
||||||
will be 'true' and the 'identifier' field will be 'example.com'.
|
will be 'true' and the 'identifier' field will be 'example.com'.
|
||||||
type: boolean
|
type: boolean
|
||||||
certificate:
|
certificate:
|
||||||
description: Certificate is a copy of the PEM encoded certificate for
|
description: Certificate is a copy of the PEM encoded certificate
|
||||||
this Order. This field will be populated after the order has been
|
for this Order. This field will be populated after the order has
|
||||||
successfully finalized with the ACME server, and the order has transitioned
|
been successfully finalized with the ACME server, and the order
|
||||||
to the 'valid' state.
|
has transitioned to the 'valid' state.
|
||||||
|
type: string
|
||||||
|
format: byte
|
||||||
|
failureTime:
|
||||||
|
description: FailureTime stores the time that this order failed. This
|
||||||
|
is used to influence garbage collection and back-off.
|
||||||
|
type: string
|
||||||
|
format: date-time
|
||||||
|
finalizeURL:
|
||||||
|
description: FinalizeURL of the Order. This is used to obtain certificates
|
||||||
|
for this order once it has been completed.
|
||||||
|
type: string
|
||||||
|
reason:
|
||||||
|
description: Reason optionally provides more information about a why
|
||||||
|
the order is in the current state.
|
||||||
|
type: string
|
||||||
|
state:
|
||||||
|
description: State contains the current state of this Order resource.
|
||||||
|
States 'success' and 'expired' are 'final'
|
||||||
|
type: string
|
||||||
|
enum:
|
||||||
|
- valid
|
||||||
|
- ready
|
||||||
|
- pending
|
||||||
|
- processing
|
||||||
|
- invalid
|
||||||
|
- expired
|
||||||
|
- errored
|
||||||
|
url:
|
||||||
|
description: URL of the Order. This will initially be empty when the
|
||||||
|
resource is first created. The Order controller will populate this
|
||||||
|
field when the Order is first processed. This field will be immutable
|
||||||
|
after it is initially set.
|
||||||
|
type: string
|
||||||
|
- name: v1alpha3
|
||||||
|
served: true
|
||||||
|
storage: false
|
||||||
|
"schema":
|
||||||
|
"openAPIV3Schema":
|
||||||
|
description: Order is a type to represent an Order with an ACME server
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- metadata
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- csr
|
||||||
|
- dnsNames
|
||||||
|
- issuerRef
|
||||||
|
properties:
|
||||||
|
commonName:
|
||||||
|
description: CommonName is the common name as specified on the DER
|
||||||
|
encoded CSR. If specified, this value must also be present in `dnsNames`.
|
||||||
|
This field must match the corresponding field on the DER encoded
|
||||||
|
CSR.
|
||||||
|
type: string
|
||||||
|
csr:
|
||||||
|
description: Certificate signing request bytes in DER encoding. This
|
||||||
|
will be used when finalizing the order. This field must be set on
|
||||||
|
the order.
|
||||||
|
type: string
|
||||||
|
format: byte
|
||||||
|
dnsNames:
|
||||||
|
description: DNSNames is a list of DNS names that should be included
|
||||||
|
as part of the Order validation process. This field must match the
|
||||||
|
corresponding field on the DER encoded CSR.
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
issuerRef:
|
||||||
|
description: IssuerRef references a properly configured ACME-type
|
||||||
|
Issuer which should be used to create this Order. If the Issuer
|
||||||
|
does not exist, processing will be retried. If the Issuer is not
|
||||||
|
an 'ACME' Issuer, an error will be returned and the Order will be
|
||||||
|
marked as failed.
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- name
|
||||||
|
properties:
|
||||||
|
group:
|
||||||
|
description: Group of the resource being referred to.
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: Kind of the resource being referred to.
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: Name of the resource being referred to.
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
authorizations:
|
||||||
|
description: Authorizations contains data returned from the ACME server
|
||||||
|
on what authorizations must be completed in order to validate the
|
||||||
|
DNS names specified on the Order.
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
description: ACMEAuthorization contains data returned from the ACME
|
||||||
|
server on an authorization that must be completed in order validate
|
||||||
|
a DNS name on an ACME Order resource.
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- url
|
||||||
|
properties:
|
||||||
|
challenges:
|
||||||
|
description: Challenges specifies the challenge types offered
|
||||||
|
by the ACME server. One of these challenge types will be selected
|
||||||
|
when validating the DNS name and an appropriate Challenge
|
||||||
|
resource will be created to perform the ACME challenge process.
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
description: Challenge specifies a challenge offered by the
|
||||||
|
ACME server for an Order. An appropriate Challenge resource
|
||||||
|
can be created to perform the ACME challenge process.
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- token
|
||||||
|
- type
|
||||||
|
- url
|
||||||
|
properties:
|
||||||
|
token:
|
||||||
|
description: Token is the token that must be presented
|
||||||
|
for this challenge. This is used to compute the 'key'
|
||||||
|
that must also be presented.
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: Type is the type of challenge being offered,
|
||||||
|
e.g. 'http-01', 'dns-01', 'tls-sni-01', etc. This is
|
||||||
|
the raw value retrieved from the ACME server. Only 'http-01'
|
||||||
|
and 'dns-01' are supported by cert-manager, other values
|
||||||
|
will be ignored.
|
||||||
|
type: string
|
||||||
|
url:
|
||||||
|
description: URL is the URL of this challenge. It can
|
||||||
|
be used to retrieve additional metadata about the Challenge
|
||||||
|
from the ACME server.
|
||||||
|
type: string
|
||||||
|
identifier:
|
||||||
|
description: Identifier is the DNS name to be validated as part
|
||||||
|
of this authorization
|
||||||
|
type: string
|
||||||
|
initialState:
|
||||||
|
description: InitialState is the initial state of the ACME authorization
|
||||||
|
when first fetched from the ACME server. If an Authorization
|
||||||
|
is already 'valid', the Order controller will not create a
|
||||||
|
Challenge resource for the authorization. This will occur
|
||||||
|
when working with an ACME server that enables 'authz reuse'
|
||||||
|
(such as Let's Encrypt's production endpoint). If not set
|
||||||
|
and 'identifier' is set, the state is assumed to be pending
|
||||||
|
and a Challenge will be created.
|
||||||
|
type: string
|
||||||
|
enum:
|
||||||
|
- valid
|
||||||
|
- ready
|
||||||
|
- pending
|
||||||
|
- processing
|
||||||
|
- invalid
|
||||||
|
- expired
|
||||||
|
- errored
|
||||||
|
url:
|
||||||
|
description: URL is the URL of the Authorization that must be
|
||||||
|
completed
|
||||||
|
type: string
|
||||||
|
wildcard:
|
||||||
|
description: Wildcard will be true if this authorization is
|
||||||
|
for a wildcard DNS name. If this is true, the identifier will
|
||||||
|
be the *non-wildcard* version of the DNS name. For example,
|
||||||
|
if '*.example.com' is the DNS name being validated, this field
|
||||||
|
will be 'true' and the 'identifier' field will be 'example.com'.
|
||||||
|
type: boolean
|
||||||
|
certificate:
|
||||||
|
description: Certificate is a copy of the PEM encoded certificate
|
||||||
|
for this Order. This field will be populated after the order has
|
||||||
|
been successfully finalized with the ACME server, and the order
|
||||||
|
has transitioned to the 'valid' state.
|
||||||
|
type: string
|
||||||
|
format: byte
|
||||||
|
failureTime:
|
||||||
|
description: FailureTime stores the time that this order failed. This
|
||||||
|
is used to influence garbage collection and back-off.
|
||||||
|
type: string
|
||||||
|
format: date-time
|
||||||
|
finalizeURL:
|
||||||
|
description: FinalizeURL of the Order. This is used to obtain certificates
|
||||||
|
for this order once it has been completed.
|
||||||
|
type: string
|
||||||
|
reason:
|
||||||
|
description: Reason optionally provides more information about a why
|
||||||
|
the order is in the current state.
|
||||||
|
type: string
|
||||||
|
state:
|
||||||
|
description: State contains the current state of this Order resource.
|
||||||
|
States 'success' and 'expired' are 'final'
|
||||||
|
type: string
|
||||||
|
enum:
|
||||||
|
- valid
|
||||||
|
- ready
|
||||||
|
- pending
|
||||||
|
- processing
|
||||||
|
- invalid
|
||||||
|
- expired
|
||||||
|
- errored
|
||||||
|
url:
|
||||||
|
description: URL of the Order. This will initially be empty when the
|
||||||
|
resource is first created. The Order controller will populate this
|
||||||
|
field when the Order is first processed. This field will be immutable
|
||||||
|
after it is initially set.
|
||||||
|
type: string
|
||||||
|
- name: v1beta1
|
||||||
|
served: true
|
||||||
|
storage: false
|
||||||
|
"schema":
|
||||||
|
"openAPIV3Schema":
|
||||||
|
description: Order is a type to represent an Order with an ACME server
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- metadata
|
||||||
|
- spec
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- dnsNames
|
||||||
|
- issuerRef
|
||||||
|
- request
|
||||||
|
properties:
|
||||||
|
commonName:
|
||||||
|
description: CommonName is the common name as specified on the DER
|
||||||
|
encoded CSR. If specified, this value must also be present in `dnsNames`.
|
||||||
|
This field must match the corresponding field on the DER encoded
|
||||||
|
CSR.
|
||||||
|
type: string
|
||||||
|
dnsNames:
|
||||||
|
description: DNSNames is a list of DNS names that should be included
|
||||||
|
as part of the Order validation process. This field must match the
|
||||||
|
corresponding field on the DER encoded CSR.
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
issuerRef:
|
||||||
|
description: IssuerRef references a properly configured ACME-type
|
||||||
|
Issuer which should be used to create this Order. If the Issuer
|
||||||
|
does not exist, processing will be retried. If the Issuer is not
|
||||||
|
an 'ACME' Issuer, an error will be returned and the Order will be
|
||||||
|
marked as failed.
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- name
|
||||||
|
properties:
|
||||||
|
group:
|
||||||
|
description: Group of the resource being referred to.
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: Kind of the resource being referred to.
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: Name of the resource being referred to.
|
||||||
|
type: string
|
||||||
|
request:
|
||||||
|
description: Certificate signing request bytes in DER encoding. This
|
||||||
|
will be used when finalizing the order. This field must be set on
|
||||||
|
the order.
|
||||||
|
type: string
|
||||||
|
format: byte
|
||||||
|
status:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
authorizations:
|
||||||
|
description: Authorizations contains data returned from the ACME server
|
||||||
|
on what authorizations must be completed in order to validate the
|
||||||
|
DNS names specified on the Order.
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
description: ACMEAuthorization contains data returned from the ACME
|
||||||
|
server on an authorization that must be completed in order validate
|
||||||
|
a DNS name on an ACME Order resource.
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- url
|
||||||
|
properties:
|
||||||
|
challenges:
|
||||||
|
description: Challenges specifies the challenge types offered
|
||||||
|
by the ACME server. One of these challenge types will be selected
|
||||||
|
when validating the DNS name and an appropriate Challenge
|
||||||
|
resource will be created to perform the ACME challenge process.
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
description: Challenge specifies a challenge offered by the
|
||||||
|
ACME server for an Order. An appropriate Challenge resource
|
||||||
|
can be created to perform the ACME challenge process.
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- token
|
||||||
|
- type
|
||||||
|
- url
|
||||||
|
properties:
|
||||||
|
token:
|
||||||
|
description: Token is the token that must be presented
|
||||||
|
for this challenge. This is used to compute the 'key'
|
||||||
|
that must also be presented.
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: Type is the type of challenge being offered,
|
||||||
|
e.g. 'http-01', 'dns-01', 'tls-sni-01', etc. This is
|
||||||
|
the raw value retrieved from the ACME server. Only 'http-01'
|
||||||
|
and 'dns-01' are supported by cert-manager, other values
|
||||||
|
will be ignored.
|
||||||
|
type: string
|
||||||
|
url:
|
||||||
|
description: URL is the URL of this challenge. It can
|
||||||
|
be used to retrieve additional metadata about the Challenge
|
||||||
|
from the ACME server.
|
||||||
|
type: string
|
||||||
|
identifier:
|
||||||
|
description: Identifier is the DNS name to be validated as part
|
||||||
|
of this authorization
|
||||||
|
type: string
|
||||||
|
initialState:
|
||||||
|
description: InitialState is the initial state of the ACME authorization
|
||||||
|
when first fetched from the ACME server. If an Authorization
|
||||||
|
is already 'valid', the Order controller will not create a
|
||||||
|
Challenge resource for the authorization. This will occur
|
||||||
|
when working with an ACME server that enables 'authz reuse'
|
||||||
|
(such as Let's Encrypt's production endpoint). If not set
|
||||||
|
and 'identifier' is set, the state is assumed to be pending
|
||||||
|
and a Challenge will be created.
|
||||||
|
type: string
|
||||||
|
enum:
|
||||||
|
- valid
|
||||||
|
- ready
|
||||||
|
- pending
|
||||||
|
- processing
|
||||||
|
- invalid
|
||||||
|
- expired
|
||||||
|
- errored
|
||||||
|
url:
|
||||||
|
description: URL is the URL of the Authorization that must be
|
||||||
|
completed
|
||||||
|
type: string
|
||||||
|
wildcard:
|
||||||
|
description: Wildcard will be true if this authorization is
|
||||||
|
for a wildcard DNS name. If this is true, the identifier will
|
||||||
|
be the *non-wildcard* version of the DNS name. For example,
|
||||||
|
if '*.example.com' is the DNS name being validated, this field
|
||||||
|
will be 'true' and the 'identifier' field will be 'example.com'.
|
||||||
|
type: boolean
|
||||||
|
certificate:
|
||||||
|
description: Certificate is a copy of the PEM encoded certificate
|
||||||
|
for this Order. This field will be populated after the order has
|
||||||
|
been successfully finalized with the ACME server, and the order
|
||||||
|
has transitioned to the 'valid' state.
|
||||||
type: string
|
type: string
|
||||||
format: byte
|
format: byte
|
||||||
failureTime:
|
failureTime:
|
||||||
|
|
|
@ -148,7 +148,7 @@ spec:
|
||||||
args:
|
args:
|
||||||
- --v=2
|
- --v=2
|
||||||
- --secure-port=10250
|
- --secure-port=10250
|
||||||
- --dynamic-serving-ca-secret-namespace={{ cert_manager_namespace }}
|
- --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
|
||||||
- --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
|
- --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
|
||||||
- --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
|
- --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
|
||||||
ports:
|
ports:
|
||||||
|
|
|
@ -33,8 +33,7 @@ webhooks:
|
||||||
- "cert-manager.io"
|
- "cert-manager.io"
|
||||||
- "acme.cert-manager.io"
|
- "acme.cert-manager.io"
|
||||||
apiVersions:
|
apiVersions:
|
||||||
- v1alpha2
|
- "*"
|
||||||
- v1alpha3
|
|
||||||
operations:
|
operations:
|
||||||
- CREATE
|
- CREATE
|
||||||
- UPDATE
|
- UPDATE
|
||||||
|
@ -79,8 +78,7 @@ webhooks:
|
||||||
- "cert-manager.io"
|
- "cert-manager.io"
|
||||||
- "acme.cert-manager.io"
|
- "acme.cert-manager.io"
|
||||||
apiVersions:
|
apiVersions:
|
||||||
- v1alpha2
|
- "*"
|
||||||
- v1alpha3
|
|
||||||
operations:
|
operations:
|
||||||
- CREATE
|
- CREATE
|
||||||
- UPDATE
|
- UPDATE
|
||||||
|
|
Loading…
Reference in a new issue