Go to file
Nicolas Fischer 3b838758a3 support an arbitrary SecurityContext block for the main deployment
Signed-off-by: Nicolas Fischer <nicolas@emberspark.io>
2020-01-10 10:15:42 +00:00
.github Add additional issue template types 2018-08-09 15:22:37 +01:00
cmd Merge pull request #2428 from haines/remove-nameserver-ip-address-validation 2019-12-12 16:31:14 +00:00
deploy support an arbitrary SecurityContext block for the main deployment 2020-01-10 10:15:42 +00:00
design Mark 'csr' field as required in CertificateRequest 2019-11-15 01:01:43 +00:00
docs Fixup redirects to point to cert-manager.io 2019-11-28 13:34:22 +00:00
hack support an arbitrary SecurityContext block for the main deployment 2020-01-10 10:15:42 +00:00
logo Add logo in svg format 2019-07-08 16:01:11 +01:00
pkg Merge pull request #2470 from munnerz/remove-misleading-errors 2020-01-07 14:24:19 +00:00
test support an arbitrary SecurityContext block for the main deployment 2020-01-10 10:15:42 +00:00
.bazelrc Move print-workspace-status.sh into hack/build 2019-09-27 12:07:08 +01:00
.gitignore Add IP Address in CSR 2019-01-25 18:38:12 +01:00
BUILD.bazel Switch to using upstream golang.org/x/crypto 2019-12-03 16:49:31 +00:00
CODE_OF_CONDUCT.md Create CODE_OF_CONDUCT.md 2017-10-23 00:16:10 +01:00
CONTRIBUTING.md Add details on DCO sign-off 2018-08-13 16:09:02 +01:00
go.mod Use fork of x/crypto with support for EAB 2019-12-11 10:37:16 +00:00
go.sum Use fork of x/crypto with support for EAB 2019-12-11 10:37:16 +00:00
LICENSE add apache 2.0 license 2017-07-22 12:04:24 +01:00
LICENSES Run fuzz tests for API schema generation 2019-11-15 12:26:11 +00:00
Makefile Merge pull request #2236 from munnerz/covered-images 2019-11-14 10:54:09 +00:00
OWNERS Adds joshvanl to OWNERS 2019-07-17 11:21:10 +01:00
README.md Missing a fullstop 2019-10-31 01:20:30 +05:30
WORKSPACE Merge pull request #2367 from munnerz/docs-redirects 2019-11-15 11:52:32 +00:00

Build Status Go Report Card

cert-manager

cert-manager is a Kubernetes add-on to automate the management and issuance of TLS certificates from various issuing sources.

It will ensure certificates are valid and up to date periodically, and attempt to renew certificates at an appropriate time before expiry.

It is loosely based upon the work of kube-lego and has borrowed some wisdom from other similar projects e.g. kube-cert-manager.

cert-manager high level overview diagram

Current status

As this project is pre-1.0, we do not currently offer strong guarantees around our API stability.

Notably, we may choose to make breaking changes to our API specification (i.e. the Issuer, ClusterIssuer and Certificate resources) in new minor releases.

These will always be clearly documented in the upgrade section of the documentation.

Documentation

Documentation for cert-manager can be found at docs.cert-manager.io. Please make sure to select the correct version of the documentation to view on the bottom left of the page.

For the common use-case of automatically issuing TLS certificates to Ingress resources, aka a kube-lego replacement, see the cert-manager nginx ingress quick start guide.

See Getting started within the documentation for installation instructions.

Troubleshooting

If you encounter any issues whilst using cert-manager, we have a number of places you can use to try and get help.

The quickest way to ask a question is to first post on our Slack channel (#cert-manager) on the Kubernetes Slack. There are a lot of community members in this channel, and you can often get an answer to your question straight away!

You can also try searching for an existing issue. Properly searching for an existing issue will help reduce the number of duplicates, and help you find the answer you are looking for quicker.

Please also make sure to read through the relevant pages in the documentation before opening an issue. You can also search the documentation using the search box on the top left of the page.

If you believe you have encountered a bug, and cannot find an existing issue similar to your own, you may open a new issue. Please be sure to include as much information as possible about your environment.

Community

There is a Google Group used for project wide announcements and development coordination. Anybody can join the group by visiting here and clicking "Join Group". A Google account is required to join the group.

Once you have become a member, you should receive an invite to the weekly development meeting, hosted on Wednesdays at 4pm UTC on Zoom.us.

Anyone is welcome to join these calls, even if just to ask questions.

Meeting notes are recorded in Google docs.

Contributing

We welcome pull requests with open arms! There's a lot of work to do here, and we're especially concerned with ensuring the longevity and reliability of the project.

Please take a look at our issue tracker if you are unsure where to start with getting involved!

We also use the #cert-manager channel on kubernetes.slack.com for chat relating to the project.

Developer documentation is available in the official documentation.

Changelog

The list of releases is the best place to look for information on changes between releases.

Logo design by Zoe Paterson