From 71eda5a7d5f5bad323880f59cb2f0ea10c9c8e0f Mon Sep 17 00:00:00 2001 From: James Munnelly Date: Wed, 1 May 2019 16:53:10 +0100 Subject: [PATCH] Bump manifests and docs for v0.8 Signed-off-by: James Munnelly --- deploy/charts/cert-manager/Chart.yaml | 4 +- deploy/charts/cert-manager/README.md | 8 +-- .../charts/cert-manager/cainjector/Chart.yaml | 4 +- .../cert-manager/cainjector/values.yaml | 2 +- deploy/charts/cert-manager/requirements.lock | 8 +-- deploy/charts/cert-manager/requirements.yaml | 4 +- deploy/charts/cert-manager/values.yaml | 2 +- deploy/charts/cert-manager/webhook/Chart.yaml | 4 +- .../charts/cert-manager/webhook/values.yaml | 2 +- deploy/manifests/cert-manager-no-webhook.yaml | 24 ++++----- deploy/manifests/cert-manager.yaml | 50 +++++++++---------- docs/getting-started/install.rst | 8 +-- docs/getting-started/webhook.rst | 10 ++-- docs/tasks/issuing-certificates/index.rst | 2 +- docs/tasks/upgrading/index.rst | 2 +- docs/tasks/upgrading/upgrading-0.5-0.6.rst | 2 +- docs/tutorials/acme/quick-start/index.rst | 32 ++++++------ 17 files changed, 84 insertions(+), 84 deletions(-) diff --git a/deploy/charts/cert-manager/Chart.yaml b/deploy/charts/cert-manager/Chart.yaml index 023170398..dd60189e6 100644 --- a/deploy/charts/cert-manager/Chart.yaml +++ b/deploy/charts/cert-manager/Chart.yaml @@ -1,6 +1,6 @@ name: cert-manager -version: v0.7.2 -appVersion: v0.7.0 +version: v0.8.0-alpha.0 +appVersion: v0.8.0-alpha.0 description: A Helm chart for cert-manager home: https://github.com/jetstack/cert-manager keywords: diff --git a/deploy/charts/cert-manager/README.md b/deploy/charts/cert-manager/README.md index bb1d215a5..ed961f2a1 100644 --- a/deploy/charts/cert-manager/README.md +++ b/deploy/charts/cert-manager/README.md @@ -21,7 +21,7 @@ To install the chart with the release name `my-release`: ## IMPORTANT: you MUST install the cert-manager CRDs **before** installing the ## cert-manager Helm chart $ kubectl apply \ - -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml + -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml ## IMPORTANT: if the cert-manager namespace **already exists**, you MUST ensure ## it has an additional label on it in order for the deployment to succeed @@ -75,7 +75,7 @@ The following table lists the configurable parameters of the cert-manager chart | `global.imagePullSecrets` | Reference to one or more secrets to be used when pulling images | `[]` | | `global.rbac.create` | If `true`, create and use RBAC resources (includes sub-charts) | `true` | | `image.repository` | Image repository | `quay.io/jetstack/cert-manager-controller` | -| `image.tag` | Image tag | `v0.7.0` | +| `image.tag` | Image tag | `v0.8.0-alpha.0` | | `image.pullPolicy` | Image pull policy | `IfNotPresent` | | `replicaCount` | Number of cert-manager replicas | `1` | | `clusterResourceNamespace` | Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources | Same namespace as cert-manager pod @@ -109,7 +109,7 @@ The following table lists the configurable parameters of the cert-manager chart | `webhook.extraArgs` | Optional flags for cert-manager webhook component | `[]` | | `webhook.resources` | CPU/memory resource requests/limits for the webhook pods | | | `webhook.image.repository` | Webhook image repository | `quay.io/jetstack/cert-manager-webhook` | -| `webhook.image.tag` | Webhook image tag | `v0.7.0` | +| `webhook.image.tag` | Webhook image tag | `v0.8.0-alpha.0` | | `webhook.image.pullPolicy` | Webhook image pull policy | `IfNotPresent` | | `webhook.injectAPIServerCA` | if true, the apiserver's CABundle will be automatically injected into the ValidatingWebhookConfiguration resource | `true` | | `cainjector.enabled` | Toggles whether the cainjector component should be installed (required for the webhook component to work) | `true` | @@ -118,7 +118,7 @@ The following table lists the configurable parameters of the cert-manager chart | `cainjector.extraArgs` | Optional flags for cert-manager cainjector component | `[]` | | `cainjector.resources` | CPU/memory resource requests/limits for the cainjector pods | | | `cainjector.image.repository` | cainjector image repository | `quay.io/jetstack/cert-manager-cainjector` | -| `cainjector.image.tag` | cainjector image tag | `v0.7.0` | +| `cainjector.image.tag` | cainjector image tag | `v0.8.0-alpha.0` | | `cainjector.image.pullPolicy` | cainjector image pull policy | `IfNotPresent` | Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. diff --git a/deploy/charts/cert-manager/cainjector/Chart.yaml b/deploy/charts/cert-manager/cainjector/Chart.yaml index 0685c1c74..f9b7d4239 100644 --- a/deploy/charts/cert-manager/cainjector/Chart.yaml +++ b/deploy/charts/cert-manager/cainjector/Chart.yaml @@ -1,7 +1,7 @@ name: cainjector apiVersion: v1 -version: "v0.7.0" -appVersion: "v0.7.0" +version: "v0.8.0-alpha.0" +appVersion: "v0.8.0-alpha.0" description: A Helm chart for deploying the cert-manager cainjector component home: https://github.com/jetstack/cert-manager sources: diff --git a/deploy/charts/cert-manager/cainjector/values.yaml b/deploy/charts/cert-manager/cainjector/values.yaml index 9fa93fc58..f482d04f7 100644 --- a/deploy/charts/cert-manager/cainjector/values.yaml +++ b/deploy/charts/cert-manager/cainjector/values.yaml @@ -34,5 +34,5 @@ resources: {} image: repository: quay.io/jetstack/cert-manager-cainjector - tag: v0.7.0 + tag: v0.8.0-alpha.0 pullPolicy: IfNotPresent diff --git a/deploy/charts/cert-manager/requirements.lock b/deploy/charts/cert-manager/requirements.lock index 8c1791a1b..5fb10fa36 100644 --- a/deploy/charts/cert-manager/requirements.lock +++ b/deploy/charts/cert-manager/requirements.lock @@ -1,9 +1,9 @@ dependencies: - name: webhook repository: file://webhook - version: v0.7.0 + version: v0.8.0-alpha.0 - name: cainjector repository: file://cainjector - version: v0.7.0 -digest: sha256:7042a8ac7a0499463fc2c780575a9e8b964fa0edc3b194ecd34a7b3cf6ec225d -generated: 2019-04-17T13:19:29.906200484+02:00 + version: v0.8.0-alpha.0 +digest: sha256:7068b0db40ed5111f1db451e89a4d78af477c8220f881f30fdd87118f71f8cc5 +generated: 2019-05-01T16:50:17.726241574+01:00 diff --git a/deploy/charts/cert-manager/requirements.yaml b/deploy/charts/cert-manager/requirements.yaml index 8d98d78ca..af389ac2e 100644 --- a/deploy/charts/cert-manager/requirements.yaml +++ b/deploy/charts/cert-manager/requirements.yaml @@ -1,10 +1,10 @@ # requirements.yaml dependencies: - name: webhook - version: "v0.7.0" + version: "v0.8.0-alpha.0" repository: "file://webhook" condition: webhook.enabled - name: cainjector - version: "v0.7.0" + version: "v0.8.0-alpha.0" repository: "file://cainjector" condition: cainjector.enabled diff --git a/deploy/charts/cert-manager/values.yaml b/deploy/charts/cert-manager/values.yaml index 78f981a3c..d988dedc3 100644 --- a/deploy/charts/cert-manager/values.yaml +++ b/deploy/charts/cert-manager/values.yaml @@ -30,7 +30,7 @@ strategy: {} image: repository: quay.io/jetstack/cert-manager-controller - tag: v0.7.0 + tag: v0.8.0-alpha.0 pullPolicy: IfNotPresent # Override the namespace used to store DNS provider credentials etc. for ClusterIssuer diff --git a/deploy/charts/cert-manager/webhook/Chart.yaml b/deploy/charts/cert-manager/webhook/Chart.yaml index 77c8434ff..ec03749ae 100644 --- a/deploy/charts/cert-manager/webhook/Chart.yaml +++ b/deploy/charts/cert-manager/webhook/Chart.yaml @@ -1,7 +1,7 @@ name: webhook apiVersion: v1 -version: "v0.7.0" -appVersion: "v0.7.0" +version: "v0.8.0-alpha.0" +appVersion: "v0.8.0-alpha.0" description: A Helm chart for deploying the cert-manager webhook component home: https://github.com/jetstack/cert-manager sources: diff --git a/deploy/charts/cert-manager/webhook/values.yaml b/deploy/charts/cert-manager/webhook/values.yaml index 83d400e38..b62c04622 100644 --- a/deploy/charts/cert-manager/webhook/values.yaml +++ b/deploy/charts/cert-manager/webhook/values.yaml @@ -30,7 +30,7 @@ resources: {} image: repository: quay.io/jetstack/cert-manager-webhook - tag: v0.7.0 + tag: v0.8.0-alpha.0 pullPolicy: IfNotPresent # if true, the apiserver's cabundle will be automatically injected into the diff --git a/deploy/manifests/cert-manager-no-webhook.yaml b/deploy/manifests/cert-manager-no-webhook.yaml index b95b00d23..6051009a9 100644 --- a/deploy/manifests/cert-manager-no-webhook.yaml +++ b/deploy/manifests/cert-manager-no-webhook.yaml @@ -1102,7 +1102,7 @@ metadata: namespace: "cert-manager" labels: app: cainjector - chart: cainjector-v0.7.0 + chart: cainjector-v0.8.0-alpha.0 release: cert-manager heritage: Tiller @@ -1115,7 +1115,7 @@ metadata: namespace: "cert-manager" labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller --- @@ -1126,7 +1126,7 @@ metadata: name: cert-manager-cainjector labels: app: cainjector - chart: cainjector-v0.7.0 + chart: cainjector-v0.8.0-alpha.0 release: cert-manager heritage: Tiller rules: @@ -1152,7 +1152,7 @@ metadata: name: cert-manager-cainjector labels: app: cainjector - chart: cainjector-v0.7.0 + chart: cainjector-v0.8.0-alpha.0 release: cert-manager heritage: Tiller roleRef: @@ -1171,7 +1171,7 @@ metadata: name: cert-manager labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller rules: @@ -1191,7 +1191,7 @@ metadata: name: cert-manager labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller roleRef: @@ -1209,7 +1209,7 @@ metadata: name: cert-manager-view labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller rbac.authorization.k8s.io/aggregate-to-view: "true" @@ -1226,7 +1226,7 @@ metadata: name: cert-manager-edit labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -1244,7 +1244,7 @@ metadata: namespace: "cert-manager" labels: app: cainjector - chart: cainjector-v0.7.0 + chart: cainjector-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1263,7 +1263,7 @@ spec: serviceAccountName: cert-manager-cainjector containers: - name: cainjector - image: "quay.io/jetstack/cert-manager-cainjector:v0.7.0" + image: "quay.io/jetstack/cert-manager-cainjector:v0.8.0-alpha.0" imagePullPolicy: IfNotPresent args: - --v=2 @@ -1286,7 +1286,7 @@ metadata: namespace: "cert-manager" labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1308,7 +1308,7 @@ spec: serviceAccountName: cert-manager containers: - name: cert-manager - image: "quay.io/jetstack/cert-manager-controller:v0.7.0" + image: "quay.io/jetstack/cert-manager-controller:v0.8.0-alpha.0" imagePullPolicy: IfNotPresent args: - --v=2 diff --git a/deploy/manifests/cert-manager.yaml b/deploy/manifests/cert-manager.yaml index 89d3fdb9e..a4a198ae9 100644 --- a/deploy/manifests/cert-manager.yaml +++ b/deploy/manifests/cert-manager.yaml @@ -1102,7 +1102,7 @@ metadata: namespace: "cert-manager" labels: app: cainjector - chart: cainjector-v0.7.0 + chart: cainjector-v0.8.0-alpha.0 release: cert-manager heritage: Tiller @@ -1115,7 +1115,7 @@ metadata: namespace: "cert-manager" labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller @@ -1128,7 +1128,7 @@ metadata: namespace: "cert-manager" labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller --- @@ -1139,7 +1139,7 @@ metadata: name: cert-manager-cainjector labels: app: cainjector - chart: cainjector-v0.7.0 + chart: cainjector-v0.8.0-alpha.0 release: cert-manager heritage: Tiller rules: @@ -1165,7 +1165,7 @@ metadata: name: cert-manager-cainjector labels: app: cainjector - chart: cainjector-v0.7.0 + chart: cainjector-v0.8.0-alpha.0 release: cert-manager heritage: Tiller roleRef: @@ -1184,7 +1184,7 @@ metadata: name: cert-manager labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller rules: @@ -1204,7 +1204,7 @@ metadata: name: cert-manager labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller roleRef: @@ -1222,7 +1222,7 @@ metadata: name: cert-manager-view labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller rbac.authorization.k8s.io/aggregate-to-view: "true" @@ -1239,7 +1239,7 @@ metadata: name: cert-manager-edit labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -1260,7 +1260,7 @@ metadata: name: cert-manager-webhook:auth-delegator labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller roleRef: @@ -1285,7 +1285,7 @@ metadata: namespace: kube-system labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller roleRef: @@ -1306,7 +1306,7 @@ metadata: name: cert-manager-webhook:webhook-requester labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller rules: @@ -1327,7 +1327,7 @@ metadata: namespace: "cert-manager" labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1349,7 +1349,7 @@ metadata: namespace: "cert-manager" labels: app: cainjector - chart: cainjector-v0.7.0 + chart: cainjector-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1368,7 +1368,7 @@ spec: serviceAccountName: cert-manager-cainjector containers: - name: cainjector - image: "quay.io/jetstack/cert-manager-cainjector:v0.7.0" + image: "quay.io/jetstack/cert-manager-cainjector:v0.8.0-alpha.0" imagePullPolicy: IfNotPresent args: - --v=2 @@ -1391,7 +1391,7 @@ metadata: namespace: "cert-manager" labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1410,7 +1410,7 @@ spec: serviceAccountName: cert-manager-webhook containers: - name: webhook - image: "quay.io/jetstack/cert-manager-webhook:v0.7.0" + image: "quay.io/jetstack/cert-manager-webhook:v0.8.0-alpha.0" imagePullPolicy: IfNotPresent args: - --v=2 @@ -1442,7 +1442,7 @@ metadata: namespace: "cert-manager" labels: app: cert-manager - chart: cert-manager-v0.7.2 + chart: cert-manager-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1464,7 +1464,7 @@ spec: serviceAccountName: cert-manager containers: - name: cert-manager - image: "quay.io/jetstack/cert-manager-controller:v0.7.0" + image: "quay.io/jetstack/cert-manager-controller:v0.8.0-alpha.0" imagePullPolicy: IfNotPresent args: - --v=2 @@ -1491,7 +1491,7 @@ metadata: name: v1beta1.admission.certmanager.k8s.io labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller annotations: @@ -1517,7 +1517,7 @@ metadata: namespace: "cert-manager" labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1533,7 +1533,7 @@ metadata: namespace: "cert-manager" labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1554,7 +1554,7 @@ metadata: namespace: "cert-manager" labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1571,7 +1571,7 @@ metadata: namespace: "cert-manager" labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller spec: @@ -1592,7 +1592,7 @@ metadata: name: cert-manager-webhook labels: app: webhook - chart: webhook-v0.7.0 + chart: webhook-v0.8.0-alpha.0 release: cert-manager heritage: Tiller annotations: diff --git a/docs/getting-started/install.rst b/docs/getting-started/install.rst index 0089dcc17..0b67170f8 100644 --- a/docs/getting-started/install.rst +++ b/docs/getting-started/install.rst @@ -57,7 +57,7 @@ are included in a single YAML manifest file: .. code-block:: shell # Install the CustomResourceDefinitions and cert-manager itself - kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/cert-manager.yaml + kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/cert-manager.yaml .. note:: If you are running kubectl v1.12 or below, you will need to add the @@ -115,7 +115,7 @@ In order to install the Helm chart, you must run: .. code-block:: shell # Install the CustomResourceDefinition resources separately - kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml + kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml # Create the namespace for cert-manager kubectl create namespace cert-manager @@ -133,7 +133,7 @@ In order to install the Helm chart, you must run: helm install \ --name cert-manager \ --namespace cert-manager \ - --version v0.7.0 \ + --version v0.8.0-alpha.0 \ jetstack/cert-manager The default cert-manager configuration is good for the majority of users, but a @@ -266,7 +266,7 @@ If you have any issues with your installation, please refer to the :doc:`troubleshooting guide <./troubleshooting>`. .. _`CustomResourceDefinitions`: https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/ -.. _`Helm chart README`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/charts/cert-manager/README.md +.. _`Helm chart README`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/charts/cert-manager/README.md .. _`kubernetes/kubernetes#69590`: https://github.com/kubernetes/kubernetes/issues/69590 .. _`ValidatingWebhookConfiguration`: https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/ .. _`Helm`: https://helm.sh/ diff --git a/docs/getting-started/webhook.rst b/docs/getting-started/webhook.rst index c3b62d764..d34971875 100644 --- a/docs/getting-started/webhook.rst +++ b/docs/getting-started/webhook.rst @@ -193,15 +193,15 @@ To re-install cert-manager without the webhook, run: .. code-block:: shell - kubectl delete -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/cert-manager.yaml + kubectl delete -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/cert-manager.yaml - kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/cert-manager-no-webhook.yaml + kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/cert-manager-no-webhook.yaml Once you have re-installed cert-manager, you should then :doc:`restore your configuration `. -.. _`deploy directory`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests -.. _`cert-manager.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests/cert-manager.yaml -.. _`cert-manager-no-webhook.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests/cert-manager-no-webhook.yaml +.. _`deploy directory`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests +.. _`cert-manager.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests/cert-manager.yaml +.. _`cert-manager-no-webhook.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests/cert-manager-no-webhook.yaml .. _`GKE docs`: https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules .. _`ValidatingWebhookConfiguration`: https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/ diff --git a/docs/tasks/issuing-certificates/index.rst b/docs/tasks/issuing-certificates/index.rst index bcb0679e9..4af9160e6 100644 --- a/docs/tasks/issuing-certificates/index.rst +++ b/docs/tasks/issuing-certificates/index.rst @@ -72,7 +72,7 @@ A full list of the fields supported on the Certificate resource can be found in the `API reference documentation`_. .. _`#1269`: https://github.com/jetstack/cert-manager/issues/1269 -.. _`API reference documentation`: https://docs.cert-manager.io/en/release-0.7/reference/api-docs/index.html#certificatespec-v1alpha1 +.. _`API reference documentation`: https://docs.cert-manager.io/en/release-0.8/reference/api-docs/index.html#certificatespec-v1alpha1 Temporary certificates whilst issuing ===================================== diff --git a/docs/tasks/upgrading/index.rst b/docs/tasks/upgrading/index.rst index f665532ad..2b0f3e419 100644 --- a/docs/tasks/upgrading/index.rst +++ b/docs/tasks/upgrading/index.rst @@ -92,5 +92,5 @@ version number you want to install: upgrading-0.5-0.6 .. _`official Helm charts repository`: https://hub.helm.sh/charts/jetstack -.. _`static deployment manifests`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests +.. _`static deployment manifests`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests .. _`kubernetes/kubernetes#69590`: https://github.com/kubernetes/kubernetes/issues/69590 diff --git a/docs/tasks/upgrading/upgrading-0.5-0.6.rst b/docs/tasks/upgrading/upgrading-0.5-0.6.rst index 56d6c1106..46d9cfb0a 100644 --- a/docs/tasks/upgrading/upgrading-0.5-0.6.rst +++ b/docs/tasks/upgrading/upgrading-0.5-0.6.rst @@ -76,7 +76,7 @@ Before upgrading you will need to: # Install the cert-manager CRDs $ kubectl apply \ - -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml + -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml # Update helm repository cache $ helm repo update diff --git a/docs/tutorials/acme/quick-start/index.rst b/docs/tutorials/acme/quick-start/index.rst index bb68fd5fd..98429fe4e 100644 --- a/docs/tutorials/acme/quick-start/index.rst +++ b/docs/tutorials/acme/quick-start/index.rst @@ -236,8 +236,8 @@ sample deployment and an associated service: .. literalinclude:: example/service.yaml :language: yaml -.. _`deployment.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/deployment.yaml -.. _`service.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/service.yaml +.. _`deployment.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/deployment.yaml +.. _`service.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/service.yaml .. _`kuard`: https://github.com/kubernetes-up-and-running/kuard You can create download and reference these files locally, or you can @@ -247,10 +247,10 @@ you may use the commands: .. code-block:: shell - $ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/deployment.yaml + $ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/deployment.yaml deployment.extensions "kuard" created - $ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/service.yaml + $ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/service.yaml service "kuard" created An `ingress resource`_ is what Kubernetes uses to expose this example service @@ -265,14 +265,14 @@ A sample ingress you can start with is: .. literalinclude:: example/ingress.yaml :language: yaml -.. _`ingress.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress.yaml +.. _`ingress.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress.yaml .. _`ingress resource`: https://kubernetes.io/docs/concepts/services-networking/ingress/ You can download the sample manifest from github, edit it, and submit the manifest to Kubernetes with the command: .. code-block:: shell - $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress.yaml + $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress.yaml # edit the file in your editor, and once it is saved: ingress.extensions "kuard" created @@ -351,8 +351,8 @@ install cert-manager. This example installed cert-manager into the .. code-block:: shell # Install the cert-manager CRDs. We must do this before installing the Helm - # chart in the next step for `release-0.7` of cert-manager: - $ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml + # chart in the next step for `release-0.8` of cert-manager: + $ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml ## IMPORTANT: if the cert-manager namespace **already exists**, you MUST ensure ## it has an additional label on it in order for the deployment to succeed @@ -499,13 +499,13 @@ expirations and updates. .. literalinclude:: example/staging-issuer.yaml :language: yaml -.. _`staging-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/staging-issuer.yaml +.. _`staging-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/staging-issuer.yaml Once edited, apply the custom resource: .. code-block:: shell - $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/staging-issuer.yaml + $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/staging-issuer.yaml issuer.certmanager.k8s.io "letsencrypt-staging" created Also create a production issuer and deploy it. As with the staging issuer, you @@ -517,11 +517,11 @@ will need to update this example and add in your own email address. :language: yaml :emphasize-lines: 10 -.. _`production-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/production-issuer.yaml +.. _`production-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/production-issuer.yaml .. code-block:: shell - $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/production-issuer.yaml + $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/production-issuer.yaml issuer.certmanager.k8s.io "letsencrypt-prod" created Both of these issuers are configured to use the @@ -599,13 +599,13 @@ example: :language: yaml :emphasize-lines: 6-8 -.. _`ingress-tls.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls.yaml +.. _`ingress-tls.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls.yaml and apply it: .. code-block:: shell - $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls.yaml + $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls.yaml ingress.extensions "kuard" configured Cert-manager will read these annotations and use them to create a certificate, @@ -715,11 +715,11 @@ can update the annotations in the ingress to specify the production issuer: .. literalinclude:: example/ingress-tls-final.yaml :language: yaml -.. _`ingress-tls-final.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml +.. _`ingress-tls-final.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml .. code-block:: shell - $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml + $ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml ingress.extensions "kuard" configured