Bump manifests and docs for v0.8
Signed-off-by: James Munnelly <james@munnelly.eu>
This commit is contained in:
parent
331df1b381
commit
71eda5a7d5
@ -1,6 +1,6 @@
|
||||
name: cert-manager
|
||||
version: v0.7.2
|
||||
appVersion: v0.7.0
|
||||
version: v0.8.0-alpha.0
|
||||
appVersion: v0.8.0-alpha.0
|
||||
description: A Helm chart for cert-manager
|
||||
home: https://github.com/jetstack/cert-manager
|
||||
keywords:
|
||||
|
||||
@ -21,7 +21,7 @@ To install the chart with the release name `my-release`:
|
||||
## IMPORTANT: you MUST install the cert-manager CRDs **before** installing the
|
||||
## cert-manager Helm chart
|
||||
$ kubectl apply \
|
||||
-f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml
|
||||
-f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml
|
||||
|
||||
## IMPORTANT: if the cert-manager namespace **already exists**, you MUST ensure
|
||||
## it has an additional label on it in order for the deployment to succeed
|
||||
@ -75,7 +75,7 @@ The following table lists the configurable parameters of the cert-manager chart
|
||||
| `global.imagePullSecrets` | Reference to one or more secrets to be used when pulling images | `[]` |
|
||||
| `global.rbac.create` | If `true`, create and use RBAC resources (includes sub-charts) | `true` |
|
||||
| `image.repository` | Image repository | `quay.io/jetstack/cert-manager-controller` |
|
||||
| `image.tag` | Image tag | `v0.7.0` |
|
||||
| `image.tag` | Image tag | `v0.8.0-alpha.0` |
|
||||
| `image.pullPolicy` | Image pull policy | `IfNotPresent` |
|
||||
| `replicaCount` | Number of cert-manager replicas | `1` |
|
||||
| `clusterResourceNamespace` | Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources | Same namespace as cert-manager pod
|
||||
@ -109,7 +109,7 @@ The following table lists the configurable parameters of the cert-manager chart
|
||||
| `webhook.extraArgs` | Optional flags for cert-manager webhook component | `[]` |
|
||||
| `webhook.resources` | CPU/memory resource requests/limits for the webhook pods | |
|
||||
| `webhook.image.repository` | Webhook image repository | `quay.io/jetstack/cert-manager-webhook` |
|
||||
| `webhook.image.tag` | Webhook image tag | `v0.7.0` |
|
||||
| `webhook.image.tag` | Webhook image tag | `v0.8.0-alpha.0` |
|
||||
| `webhook.image.pullPolicy` | Webhook image pull policy | `IfNotPresent` |
|
||||
| `webhook.injectAPIServerCA` | if true, the apiserver's CABundle will be automatically injected into the ValidatingWebhookConfiguration resource | `true` |
|
||||
| `cainjector.enabled` | Toggles whether the cainjector component should be installed (required for the webhook component to work) | `true` |
|
||||
@ -118,7 +118,7 @@ The following table lists the configurable parameters of the cert-manager chart
|
||||
| `cainjector.extraArgs` | Optional flags for cert-manager cainjector component | `[]` |
|
||||
| `cainjector.resources` | CPU/memory resource requests/limits for the cainjector pods | |
|
||||
| `cainjector.image.repository` | cainjector image repository | `quay.io/jetstack/cert-manager-cainjector` |
|
||||
| `cainjector.image.tag` | cainjector image tag | `v0.7.0` |
|
||||
| `cainjector.image.tag` | cainjector image tag | `v0.8.0-alpha.0` |
|
||||
| `cainjector.image.pullPolicy` | cainjector image pull policy | `IfNotPresent` |
|
||||
|
||||
Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`.
|
||||
|
||||
@ -1,7 +1,7 @@
|
||||
name: cainjector
|
||||
apiVersion: v1
|
||||
version: "v0.7.0"
|
||||
appVersion: "v0.7.0"
|
||||
version: "v0.8.0-alpha.0"
|
||||
appVersion: "v0.8.0-alpha.0"
|
||||
description: A Helm chart for deploying the cert-manager cainjector component
|
||||
home: https://github.com/jetstack/cert-manager
|
||||
sources:
|
||||
|
||||
@ -34,5 +34,5 @@ resources: {}
|
||||
|
||||
image:
|
||||
repository: quay.io/jetstack/cert-manager-cainjector
|
||||
tag: v0.7.0
|
||||
tag: v0.8.0-alpha.0
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
@ -1,9 +1,9 @@
|
||||
dependencies:
|
||||
- name: webhook
|
||||
repository: file://webhook
|
||||
version: v0.7.0
|
||||
version: v0.8.0-alpha.0
|
||||
- name: cainjector
|
||||
repository: file://cainjector
|
||||
version: v0.7.0
|
||||
digest: sha256:7042a8ac7a0499463fc2c780575a9e8b964fa0edc3b194ecd34a7b3cf6ec225d
|
||||
generated: 2019-04-17T13:19:29.906200484+02:00
|
||||
version: v0.8.0-alpha.0
|
||||
digest: sha256:7068b0db40ed5111f1db451e89a4d78af477c8220f881f30fdd87118f71f8cc5
|
||||
generated: 2019-05-01T16:50:17.726241574+01:00
|
||||
|
||||
@ -1,10 +1,10 @@
|
||||
# requirements.yaml
|
||||
dependencies:
|
||||
- name: webhook
|
||||
version: "v0.7.0"
|
||||
version: "v0.8.0-alpha.0"
|
||||
repository: "file://webhook"
|
||||
condition: webhook.enabled
|
||||
- name: cainjector
|
||||
version: "v0.7.0"
|
||||
version: "v0.8.0-alpha.0"
|
||||
repository: "file://cainjector"
|
||||
condition: cainjector.enabled
|
||||
|
||||
@ -30,7 +30,7 @@ strategy: {}
|
||||
|
||||
image:
|
||||
repository: quay.io/jetstack/cert-manager-controller
|
||||
tag: v0.7.0
|
||||
tag: v0.8.0-alpha.0
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
# Override the namespace used to store DNS provider credentials etc. for ClusterIssuer
|
||||
|
||||
@ -1,7 +1,7 @@
|
||||
name: webhook
|
||||
apiVersion: v1
|
||||
version: "v0.7.0"
|
||||
appVersion: "v0.7.0"
|
||||
version: "v0.8.0-alpha.0"
|
||||
appVersion: "v0.8.0-alpha.0"
|
||||
description: A Helm chart for deploying the cert-manager webhook component
|
||||
home: https://github.com/jetstack/cert-manager
|
||||
sources:
|
||||
|
||||
@ -30,7 +30,7 @@ resources: {}
|
||||
|
||||
image:
|
||||
repository: quay.io/jetstack/cert-manager-webhook
|
||||
tag: v0.7.0
|
||||
tag: v0.8.0-alpha.0
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
# if true, the apiserver's cabundle will be automatically injected into the
|
||||
|
||||
@ -1102,7 +1102,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: cainjector
|
||||
chart: cainjector-v0.7.0
|
||||
chart: cainjector-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
|
||||
@ -1115,7 +1115,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
---
|
||||
@ -1126,7 +1126,7 @@ metadata:
|
||||
name: cert-manager-cainjector
|
||||
labels:
|
||||
app: cainjector
|
||||
chart: cainjector-v0.7.0
|
||||
chart: cainjector-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
rules:
|
||||
@ -1152,7 +1152,7 @@ metadata:
|
||||
name: cert-manager-cainjector
|
||||
labels:
|
||||
app: cainjector
|
||||
chart: cainjector-v0.7.0
|
||||
chart: cainjector-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
roleRef:
|
||||
@ -1171,7 +1171,7 @@ metadata:
|
||||
name: cert-manager
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
rules:
|
||||
@ -1191,7 +1191,7 @@ metadata:
|
||||
name: cert-manager
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
roleRef:
|
||||
@ -1209,7 +1209,7 @@ metadata:
|
||||
name: cert-manager-view
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
||||
@ -1226,7 +1226,7 @@ metadata:
|
||||
name: cert-manager-edit
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||
@ -1244,7 +1244,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: cainjector
|
||||
chart: cainjector-v0.7.0
|
||||
chart: cainjector-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1263,7 +1263,7 @@ spec:
|
||||
serviceAccountName: cert-manager-cainjector
|
||||
containers:
|
||||
- name: cainjector
|
||||
image: "quay.io/jetstack/cert-manager-cainjector:v0.7.0"
|
||||
image: "quay.io/jetstack/cert-manager-cainjector:v0.8.0-alpha.0"
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- --v=2
|
||||
@ -1286,7 +1286,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1308,7 +1308,7 @@ spec:
|
||||
serviceAccountName: cert-manager
|
||||
containers:
|
||||
- name: cert-manager
|
||||
image: "quay.io/jetstack/cert-manager-controller:v0.7.0"
|
||||
image: "quay.io/jetstack/cert-manager-controller:v0.8.0-alpha.0"
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- --v=2
|
||||
|
||||
@ -1102,7 +1102,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: cainjector
|
||||
chart: cainjector-v0.7.0
|
||||
chart: cainjector-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
|
||||
@ -1115,7 +1115,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
|
||||
@ -1128,7 +1128,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
---
|
||||
@ -1139,7 +1139,7 @@ metadata:
|
||||
name: cert-manager-cainjector
|
||||
labels:
|
||||
app: cainjector
|
||||
chart: cainjector-v0.7.0
|
||||
chart: cainjector-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
rules:
|
||||
@ -1165,7 +1165,7 @@ metadata:
|
||||
name: cert-manager-cainjector
|
||||
labels:
|
||||
app: cainjector
|
||||
chart: cainjector-v0.7.0
|
||||
chart: cainjector-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
roleRef:
|
||||
@ -1184,7 +1184,7 @@ metadata:
|
||||
name: cert-manager
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
rules:
|
||||
@ -1204,7 +1204,7 @@ metadata:
|
||||
name: cert-manager
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
roleRef:
|
||||
@ -1222,7 +1222,7 @@ metadata:
|
||||
name: cert-manager-view
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
||||
@ -1239,7 +1239,7 @@ metadata:
|
||||
name: cert-manager-edit
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||
@ -1260,7 +1260,7 @@ metadata:
|
||||
name: cert-manager-webhook:auth-delegator
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
roleRef:
|
||||
@ -1285,7 +1285,7 @@ metadata:
|
||||
namespace: kube-system
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
roleRef:
|
||||
@ -1306,7 +1306,7 @@ metadata:
|
||||
name: cert-manager-webhook:webhook-requester
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
rules:
|
||||
@ -1327,7 +1327,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1349,7 +1349,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: cainjector
|
||||
chart: cainjector-v0.7.0
|
||||
chart: cainjector-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1368,7 +1368,7 @@ spec:
|
||||
serviceAccountName: cert-manager-cainjector
|
||||
containers:
|
||||
- name: cainjector
|
||||
image: "quay.io/jetstack/cert-manager-cainjector:v0.7.0"
|
||||
image: "quay.io/jetstack/cert-manager-cainjector:v0.8.0-alpha.0"
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- --v=2
|
||||
@ -1391,7 +1391,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1410,7 +1410,7 @@ spec:
|
||||
serviceAccountName: cert-manager-webhook
|
||||
containers:
|
||||
- name: webhook
|
||||
image: "quay.io/jetstack/cert-manager-webhook:v0.7.0"
|
||||
image: "quay.io/jetstack/cert-manager-webhook:v0.8.0-alpha.0"
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- --v=2
|
||||
@ -1442,7 +1442,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: cert-manager
|
||||
chart: cert-manager-v0.7.2
|
||||
chart: cert-manager-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1464,7 +1464,7 @@ spec:
|
||||
serviceAccountName: cert-manager
|
||||
containers:
|
||||
- name: cert-manager
|
||||
image: "quay.io/jetstack/cert-manager-controller:v0.7.0"
|
||||
image: "quay.io/jetstack/cert-manager-controller:v0.8.0-alpha.0"
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- --v=2
|
||||
@ -1491,7 +1491,7 @@ metadata:
|
||||
name: v1beta1.admission.certmanager.k8s.io
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
annotations:
|
||||
@ -1517,7 +1517,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1533,7 +1533,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1554,7 +1554,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1571,7 +1571,7 @@ metadata:
|
||||
namespace: "cert-manager"
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
spec:
|
||||
@ -1592,7 +1592,7 @@ metadata:
|
||||
name: cert-manager-webhook
|
||||
labels:
|
||||
app: webhook
|
||||
chart: webhook-v0.7.0
|
||||
chart: webhook-v0.8.0-alpha.0
|
||||
release: cert-manager
|
||||
heritage: Tiller
|
||||
annotations:
|
||||
|
||||
@ -57,7 +57,7 @@ are included in a single YAML manifest file:
|
||||
.. code-block:: shell
|
||||
|
||||
# Install the CustomResourceDefinitions and cert-manager itself
|
||||
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/cert-manager.yaml
|
||||
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/cert-manager.yaml
|
||||
|
||||
.. note::
|
||||
If you are running kubectl v1.12 or below, you will need to add the
|
||||
@ -115,7 +115,7 @@ In order to install the Helm chart, you must run:
|
||||
.. code-block:: shell
|
||||
|
||||
# Install the CustomResourceDefinition resources separately
|
||||
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml
|
||||
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml
|
||||
|
||||
# Create the namespace for cert-manager
|
||||
kubectl create namespace cert-manager
|
||||
@ -133,7 +133,7 @@ In order to install the Helm chart, you must run:
|
||||
helm install \
|
||||
--name cert-manager \
|
||||
--namespace cert-manager \
|
||||
--version v0.7.0 \
|
||||
--version v0.8.0-alpha.0 \
|
||||
jetstack/cert-manager
|
||||
|
||||
The default cert-manager configuration is good for the majority of users, but a
|
||||
@ -266,7 +266,7 @@ If you have any issues with your installation, please refer to the
|
||||
:doc:`troubleshooting guide <./troubleshooting>`.
|
||||
|
||||
.. _`CustomResourceDefinitions`: https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/
|
||||
.. _`Helm chart README`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/charts/cert-manager/README.md
|
||||
.. _`Helm chart README`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/charts/cert-manager/README.md
|
||||
.. _`kubernetes/kubernetes#69590`: https://github.com/kubernetes/kubernetes/issues/69590
|
||||
.. _`ValidatingWebhookConfiguration`: https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/
|
||||
.. _`Helm`: https://helm.sh/
|
||||
|
||||
@ -193,15 +193,15 @@ To re-install cert-manager without the webhook, run:
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
kubectl delete -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/cert-manager.yaml
|
||||
kubectl delete -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/cert-manager.yaml
|
||||
|
||||
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/cert-manager-no-webhook.yaml
|
||||
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/cert-manager-no-webhook.yaml
|
||||
|
||||
Once you have re-installed cert-manager, you should then
|
||||
:doc:`restore your configuration </tasks/backup-restore-crds>`.
|
||||
|
||||
.. _`deploy directory`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests
|
||||
.. _`cert-manager.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests/cert-manager.yaml
|
||||
.. _`cert-manager-no-webhook.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests/cert-manager-no-webhook.yaml
|
||||
.. _`deploy directory`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests
|
||||
.. _`cert-manager.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests/cert-manager.yaml
|
||||
.. _`cert-manager-no-webhook.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests/cert-manager-no-webhook.yaml
|
||||
.. _`GKE docs`: https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules
|
||||
.. _`ValidatingWebhookConfiguration`: https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/
|
||||
|
||||
@ -72,7 +72,7 @@ A full list of the fields supported on the Certificate resource can be found in
|
||||
the `API reference documentation`_.
|
||||
|
||||
.. _`#1269`: https://github.com/jetstack/cert-manager/issues/1269
|
||||
.. _`API reference documentation`: https://docs.cert-manager.io/en/release-0.7/reference/api-docs/index.html#certificatespec-v1alpha1
|
||||
.. _`API reference documentation`: https://docs.cert-manager.io/en/release-0.8/reference/api-docs/index.html#certificatespec-v1alpha1
|
||||
|
||||
Temporary certificates whilst issuing
|
||||
=====================================
|
||||
|
||||
@ -92,5 +92,5 @@ version number you want to install:
|
||||
upgrading-0.5-0.6
|
||||
|
||||
.. _`official Helm charts repository`: https://hub.helm.sh/charts/jetstack
|
||||
.. _`static deployment manifests`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests
|
||||
.. _`static deployment manifests`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests
|
||||
.. _`kubernetes/kubernetes#69590`: https://github.com/kubernetes/kubernetes/issues/69590
|
||||
|
||||
@ -76,7 +76,7 @@ Before upgrading you will need to:
|
||||
|
||||
# Install the cert-manager CRDs
|
||||
$ kubectl apply \
|
||||
-f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml
|
||||
-f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml
|
||||
|
||||
# Update helm repository cache
|
||||
$ helm repo update
|
||||
|
||||
@ -236,8 +236,8 @@ sample deployment and an associated service:
|
||||
.. literalinclude:: example/service.yaml
|
||||
:language: yaml
|
||||
|
||||
.. _`deployment.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/deployment.yaml
|
||||
.. _`service.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/service.yaml
|
||||
.. _`deployment.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/deployment.yaml
|
||||
.. _`service.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/service.yaml
|
||||
.. _`kuard`: https://github.com/kubernetes-up-and-running/kuard
|
||||
|
||||
You can create download and reference these files locally, or you can
|
||||
@ -247,10 +247,10 @@ you may use the commands:
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/deployment.yaml
|
||||
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/deployment.yaml
|
||||
deployment.extensions "kuard" created
|
||||
|
||||
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/service.yaml
|
||||
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/service.yaml
|
||||
service "kuard" created
|
||||
|
||||
An `ingress resource`_ is what Kubernetes uses to expose this example service
|
||||
@ -265,14 +265,14 @@ A sample ingress you can start with is:
|
||||
.. literalinclude:: example/ingress.yaml
|
||||
:language: yaml
|
||||
|
||||
.. _`ingress.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress.yaml
|
||||
.. _`ingress.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress.yaml
|
||||
.. _`ingress resource`: https://kubernetes.io/docs/concepts/services-networking/ingress/
|
||||
|
||||
You can download the sample manifest from github, edit it, and submit the manifest to Kubernetes with the command:
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress.yaml
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress.yaml
|
||||
|
||||
# edit the file in your editor, and once it is saved:
|
||||
ingress.extensions "kuard" created
|
||||
@ -351,8 +351,8 @@ install cert-manager. This example installed cert-manager into the
|
||||
.. code-block:: shell
|
||||
|
||||
# Install the cert-manager CRDs. We must do this before installing the Helm
|
||||
# chart in the next step for `release-0.7` of cert-manager:
|
||||
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml
|
||||
# chart in the next step for `release-0.8` of cert-manager:
|
||||
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml
|
||||
|
||||
## IMPORTANT: if the cert-manager namespace **already exists**, you MUST ensure
|
||||
## it has an additional label on it in order for the deployment to succeed
|
||||
@ -499,13 +499,13 @@ expirations and updates.
|
||||
.. literalinclude:: example/staging-issuer.yaml
|
||||
:language: yaml
|
||||
|
||||
.. _`staging-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/staging-issuer.yaml
|
||||
.. _`staging-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/staging-issuer.yaml
|
||||
|
||||
Once edited, apply the custom resource:
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/staging-issuer.yaml
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/staging-issuer.yaml
|
||||
issuer.certmanager.k8s.io "letsencrypt-staging" created
|
||||
|
||||
Also create a production issuer and deploy it. As with the staging issuer, you
|
||||
@ -517,11 +517,11 @@ will need to update this example and add in your own email address.
|
||||
:language: yaml
|
||||
:emphasize-lines: 10
|
||||
|
||||
.. _`production-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/production-issuer.yaml
|
||||
.. _`production-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/production-issuer.yaml
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/production-issuer.yaml
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/production-issuer.yaml
|
||||
issuer.certmanager.k8s.io "letsencrypt-prod" created
|
||||
|
||||
Both of these issuers are configured to use the
|
||||
@ -599,13 +599,13 @@ example:
|
||||
:language: yaml
|
||||
:emphasize-lines: 6-8
|
||||
|
||||
.. _`ingress-tls.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls.yaml
|
||||
.. _`ingress-tls.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls.yaml
|
||||
|
||||
and apply it:
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls.yaml
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls.yaml
|
||||
ingress.extensions "kuard" configured
|
||||
|
||||
Cert-manager will read these annotations and use them to create a certificate,
|
||||
@ -715,11 +715,11 @@ can update the annotations in the ingress to specify the production issuer:
|
||||
.. literalinclude:: example/ingress-tls-final.yaml
|
||||
:language: yaml
|
||||
|
||||
.. _`ingress-tls-final.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml
|
||||
.. _`ingress-tls-final.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml
|
||||
|
||||
.. code-block:: shell
|
||||
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml
|
||||
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml
|
||||
|
||||
ingress.extensions "kuard" configured
|
||||
|
||||
|
||||
Loading…
Reference in New Issue
Block a user