diff --git a/docs/examples/ca-issuer.yaml b/docs/examples/ca-issuer.yaml deleted file mode 100644 index b384dbf17..000000000 --- a/docs/examples/ca-issuer.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: certmanager.k8s.io/v1alpha1 -kind: Issuer -metadata: - name: ca-issuer -spec: - ca: - secretName: ca-key-pair diff --git a/docs/examples/crd.yaml b/docs/examples/crd.yaml deleted file mode 100644 index 8340e8347..000000000 --- a/docs/examples/crd.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificates.certmanager.k8s.io -spec: - group: certmanager.k8s.io - version: v1alpha1 - names: - kind: Certificate - plural: certificates - scope: Namespaced # Can also be cluster level using "Cluster" ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - version: v1alpha1 - names: - kind: Issuer - plural: issuers - scope: Namespaced # Can also be cluster level using "Cluster" diff --git a/docs/examples/tpr.yaml b/docs/examples/tpr.yaml deleted file mode 100644 index 3cc2dd650..000000000 --- a/docs/examples/tpr.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: extensions/v1beta1 -kind: ThirdPartyResource -metadata: - name: certificate.certmanager.k8s.io -description: "A specification for a cert-manager certificate" -versions: -- name: v1alpha1 ---- -apiVersion: extensions/v1beta1 -kind: ThirdPartyResource -metadata: - name: issuer.certmanager.k8s.io -description: "A specification for a cert-manager issuer" -versions: -- name: v1alpha1 diff --git a/docs/user-guides/deploying.md b/docs/user-guides/deploying.md index 6890e6d6e..0d966445c 100644 --- a/docs/user-guides/deploying.md +++ b/docs/user-guides/deploying.md @@ -30,7 +30,7 @@ $ helm install \ stable/cert-manager ``` -> **NOTE**: if your cluster does not use RBAC (Role Based Access Control), you should add `--set rbac.enabled=false` when running your `helm install` command. +> **NOTE**: if your cluster does not use RBAC (Role Based Access Control), you should add `--set rbac.create=false` when running your `helm install` command. The default cert-manager configuration is good for the majority of users, but a full list of the available options can be found in the [Helm chart README](https://github.com/kubernetes/charts/blob/master/stable/cert-manager/README.md). @@ -41,7 +41,7 @@ issue certificates. ## Addendum -* If your cluster does not use RBAC, you should add `--set rbac.enabled=false` to +* If your cluster does not use RBAC, you should add `--set rbac.create=false` to your `helm install` command. All RBAC related resources will not be created in this instance.