Go to file
Maartje Eyskens 560fe3828d Improve errors
Signed-off-by: Maartje Eyskens <maartje@eyskens.me>
2020-02-18 11:17:20 +01:00
.github Add additional issue template types 2018-08-09 15:22:37 +01:00
build Add release-tars targets to construct cert-manager release artifacts 2020-01-30 21:02:58 +00:00
cmd Merge pull request #2556 from munnerz/release-tars 2020-02-10 16:10:13 +00:00
deploy Write CRD filter for OpenShift 2020-02-18 10:52:42 +01:00
design add securityContext.enabled deprecation doc to the design folder 2020-01-10 10:15:42 +00:00
devel Merge pull request #2592 from JoshVanL/export-logs-on-successs 2020-02-17 11:13:24 +00:00
docs Remove docs/ directory and replace with basic README 2020-01-20 14:53:02 +00:00
hack Improve errors 2020-02-18 11:17:20 +01:00
logo Add logo in svg format 2019-07-08 16:01:11 +01:00
pkg Merge pull request #2573 from meyskens/venafi-custom-fields 2020-02-17 12:24:24 +00:00
test Add release-tars targets to construct cert-manager release artifacts 2020-01-30 21:02:58 +00:00
.bazelrc Move print-workspace-status.sh into hack/build 2019-09-27 12:07:08 +01:00
.gitignore Add IP Address in CSR 2019-01-25 18:38:12 +01:00
BUILD.bazel Add release-tars targets to construct cert-manager release artifacts 2020-01-30 21:02:58 +00:00
CODE_OF_CONDUCT.md Create CODE_OF_CONDUCT.md 2017-10-23 00:16:10 +01:00
CONTRIBUTING.md Add details on DCO sign-off 2018-08-13 16:09:02 +01:00
go.mod Write CRD filter for OpenShift 2020-02-18 10:52:42 +01:00
go.sum Write CRD filter for OpenShift 2020-02-18 10:52:42 +01:00
LICENSE add apache 2.0 license 2017-07-22 12:04:24 +01:00
LICENSES Remove hack/release tool 2020-01-31 10:35:22 +00:00
Makefile Add release-tars targets to construct cert-manager release artifacts 2020-01-30 21:02:58 +00:00
OWNERS Adds joshvanl to OWNERS 2019-07-17 11:21:10 +01:00
README.md Update community section 2020-02-07 13:52:36 +01:00
WORKSPACE Add release-tars targets to construct cert-manager release artifacts 2020-01-30 21:02:58 +00:00

Build Status Go Report Card

cert-manager

cert-manager is a Kubernetes add-on to automate the management and issuance of TLS certificates from various issuing sources.

It will ensure certificates are valid and up to date periodically, and attempt to renew certificates at an appropriate time before expiry.

It is loosely based upon the work of kube-lego and has borrowed some wisdom from other similar projects e.g. kube-cert-manager.

cert-manager high level overview diagram

Current status

As this project is pre-1.0, we do not currently offer strong guarantees around our API stability.

Notably, we may choose to make breaking changes to our API specification (i.e. the Issuer, ClusterIssuer and Certificate resources) in new minor releases.

These will always be clearly documented in the upgrade section of the documentation.

Documentation

Documentation for cert-manager can be found at cert-manager.io. Please make sure to select the correct version of the documentation to view on the top right of the page.

For the common use-case of automatically issuing TLS certificates to Ingress resources, aka a kube-lego replacement, see the cert-manager nginx ingress quick start guide.

See Installation within the documentation for installation instructions.

Troubleshooting

If you encounter any issues whilst using cert-manager, we have a number of places you can use to try and get help.

The quickest way to ask a question is to first post on our Slack channel (#cert-manager) on the Kubernetes Slack. There are a lot of community members in this channel, and you can often get an answer to your question straight away!

You can also try searching for an existing issue. Properly searching for an existing issue will help reduce the number of duplicates, and help you find the answer you are looking for quicker.

Please also make sure to read through the relevant pages in the documentation before opening an issue. You can also search the documentation using the search box on the top left of the page.

If you believe you have encountered a bug, and cannot find an existing issue similar to your own, you may open a new issue. Please be sure to include as much information as possible about your environment.

Community

There is a Google Group used for project wide announcements and development coordination. Anybody can join the group by visiting here and clicking "Join Group". A Google account is required to join the group.

Bi-weekly development meeting

Once you have become a member, you should receive an invite to the bi-weekly development meeting, hosted on Wednesdays at 5pm UK Time on Zoom.us.

Anyone is welcome to join these calls, even if just to ask questions.
Meeting notes are recorded in Google docs.

Daily standups

You are also welcome to join our daily standup every day at 10.30am UK Time on Google Meet. Invites are sent via the Google Group

Contributing

We welcome pull requests with open arms! There's a lot of work to do here, and we're especially concerned with ensuring the longevity and reliability of the project.

Please take a look at our issue tracker if you are unsure where to start with getting involved!

We also use the #cert-manager channel on kubernetes.slack.com for chat relating to the project.

Developer documentation is available in the official documentation.

Changelog

The list of releases is the best place to look for information on changes between releases.

Logo design by Zoe Paterson