Skip to content

Commit

Permalink
make bundle-generate
Browse files Browse the repository at this point in the history
Signed-off-by: Richard Wall <richard.wall@venafi.com>
  • Loading branch information
wallrj committed Oct 2, 2024
1 parent e3030f4 commit 100ac75
Show file tree
Hide file tree
Showing 14 changed files with 4,472 additions and 279 deletions.
4 changes: 2 additions & 2 deletions bundle/bundle.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,8 @@ LABEL operators.operatorframework.io.bundle.mediatype.v1=registry+v1
LABEL operators.operatorframework.io.bundle.manifests.v1=manifests/
LABEL operators.operatorframework.io.bundle.metadata.v1=metadata/
LABEL operators.operatorframework.io.bundle.package.v1=cert-manager
LABEL operators.operatorframework.io.bundle.channels.v1=stable,candidate
LABEL operators.operatorframework.io.bundle.channel.default.v1=stable
LABEL operators.operatorframework.io.bundle.channels.v1=candidate
LABEL operators.operatorframework.io.bundle.channel.default.v1=candidate
LABEL operators.operatorframework.io.metrics.builder=operator-sdk-v1.33.0
LABEL operators.operatorframework.io.metrics.mediatype.v1=metrics+v1
LABEL operators.operatorframework.io.metrics.project_layout=unknown
Expand Down
1,549 changes: 1,448 additions & 101 deletions bundle/manifests/acme.cert-manager.io_challenges.yaml

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion bundle/manifests/acme.cert-manager.io_orders.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ metadata:
app.kubernetes.io/component: crds
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cert-manager
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
name: orders.acme.cert-manager.io
spec:
group: acme.cert-manager.io
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ metadata:
app.kubernetes.io/component: controller
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cert-manager
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true"
name: cert-manager-cluster-view
rules:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ metadata:
app.kubernetes.io/component: controller
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cert-manager
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
name: cert-manager-edit
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ metadata:
app.kubernetes.io/component: controller
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cert-manager
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
Expand Down
6 changes: 5 additions & 1 deletion bundle/manifests/cert-manager-webhook_v1_service.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,14 +7,18 @@ metadata:
app.kubernetes.io/component: webhook
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: webhook
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
name: cert-manager-webhook
spec:
ports:
- name: https
port: 443
protocol: TCP
targetPort: https
- name: metrics
port: 9402
protocol: TCP
targetPort: http-metrics
selector:
app.kubernetes.io/component: webhook
app.kubernetes.io/instance: cert-manager
Expand Down
55 changes: 37 additions & 18 deletions bundle/manifests/cert-manager.clusterserviceversion.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -67,9 +67,8 @@ metadata:
]
capabilities: Full Lifecycle
categories: Security
containerImage: quay.io/jetstack/cert-manager-controller:v1.15.2
createdAt: '2024-07-30T13:50:01'
olm.skipRange: '>=1.15.0 <1.15.2'
containerImage: quay.io/jetstack/cert-manager-controller:v1.16.0-beta.0
createdAt: '2024-10-02T16:10:00'
operators.operatorframework.io/builder: operator-sdk-v1.33.0
operators.operatorframework.io/internal-objects: |-
[
Expand All @@ -84,7 +83,7 @@ metadata:
operatorframework.io/arch.arm64: supported
operatorframework.io/arch.ppc64le: supported
operatorframework.io/arch.s390x: supported
name: cert-manager.v1.15.2
name: cert-manager.v1.16.0-beta.0
namespace: placeholder
spec:
apiservicedefinitions: {}
Expand All @@ -94,12 +93,10 @@ spec:
A CertificateRequest is used to request a signed certificate from one of the
configured issuers.
All fields within the CertificateRequest's `spec` are immutable after creation.
A CertificateRequest will either succeed or fail, as denoted by its `Ready` status
condition and its `status.failureTime` field.
A CertificateRequest is a one-shot resource, meaning it represents a single
point in time request for a certificate and cannot be re-used.
displayName: CertificateRequest
Expand All @@ -110,7 +107,6 @@ spec:
A Certificate resource should be created to ensure an up to date and signed
X.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.
The stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).
displayName: Certificate
kind: Certificate
Expand Down Expand Up @@ -633,7 +629,7 @@ spec:
app.kubernetes.io/component: controller
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cert-manager
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
name: cert-manager
spec:
replicas: 1
Expand All @@ -654,21 +650,21 @@ spec:
app.kubernetes.io/component: controller
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cert-manager
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
spec:
containers:
- args:
- --v=2
- --cluster-resource-namespace=$(POD_NAMESPACE)
- --leader-election-namespace=kube-system
- --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.15.2
- --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.16.0-beta.0
- --max-concurrent-challenges=60
env:
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
image: quay.io/jetstack/cert-manager-controller:v1.15.2
image: quay.io/jetstack/cert-manager-controller:v1.16.0-beta.0
imagePullPolicy: IfNotPresent
livenessProbe:
failureThreshold: 8
Expand Down Expand Up @@ -708,7 +704,7 @@ spec:
app.kubernetes.io/component: cainjector
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cainjector
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
name: cert-manager-cainjector
spec:
replicas: 1
Expand All @@ -720,12 +716,16 @@ spec:
strategy: {}
template:
metadata:
annotations:
prometheus.io/path: /metrics
prometheus.io/port: '9402'
prometheus.io/scrape: 'true'
labels:
app: cainjector
app.kubernetes.io/component: cainjector
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cainjector
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
spec:
containers:
- args:
Expand All @@ -736,9 +736,13 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
image: quay.io/jetstack/cert-manager-cainjector:v1.15.2
image: quay.io/jetstack/cert-manager-cainjector:v1.16.0-beta.0
imagePullPolicy: IfNotPresent
name: cert-manager-cainjector
ports:
- containerPort: 9402
name: http-metrics
protocol: TCP
resources: {}
securityContext:
allowPrivilegeEscalation: false
Expand All @@ -759,7 +763,7 @@ spec:
app.kubernetes.io/component: webhook
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: webhook
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
name: cert-manager-webhook
spec:
replicas: 1
Expand All @@ -771,12 +775,16 @@ spec:
strategy: {}
template:
metadata:
annotations:
prometheus.io/path: /metrics
prometheus.io/port: '9402'
prometheus.io/scrape: 'true'
labels:
app: webhook
app.kubernetes.io/component: webhook
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: webhook
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
spec:
containers:
- args:
Expand All @@ -789,7 +797,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
image: quay.io/jetstack/cert-manager-webhook:v1.15.2
image: quay.io/jetstack/cert-manager-webhook:v1.16.0-beta.0
imagePullPolicy: IfNotPresent
livenessProbe:
failureThreshold: 3
Expand All @@ -809,6 +817,9 @@ spec:
- containerPort: 6080
name: healthcheck
protocol: TCP
- containerPort: 9402
name: http-metrics
protocol: TCP
readinessProbe:
failureThreshold: 3
httpGet:
Expand Down Expand Up @@ -836,6 +847,14 @@ spec:
serviceAccountName: cert-manager-webhook
permissions:
- rules:
- apiGroups:
- ''
resourceNames:
- cert-manager
resources:
- serviceaccounts/token
verbs:
- create
- apiGroups:
- coordination.k8s.io
resourceNames:
Expand Down Expand Up @@ -919,7 +938,7 @@ spec:
provider:
name: The cert-manager maintainers
url: https://cert-manager.io/
version: 1.15.2
version: 1.16.0-beta.0
webhookdefinitions:
- admissionReviewVersions:
- v1
Expand Down
13 changes: 2 additions & 11 deletions bundle/manifests/cert-manager.io_certificaterequests.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ metadata:
app: cert-manager
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/name: cert-manager
app.kubernetes.io/version: v1.15.2
app.kubernetes.io/version: v1.16.0-beta.0
name: certificaterequests.cert-manager.io
spec:
group: cert-manager.io
Expand Down Expand Up @@ -36,7 +36,7 @@ spec:
name: Issuer
type: string
- jsonPath: .spec.username
name: Requestor
name: Requester
type: string
- jsonPath: .status.conditions[?(@.type=="Ready")].message
name: Status
Expand All @@ -56,12 +56,10 @@ spec:
A CertificateRequest is used to request a signed certificate from one of the
configured issuers.
All fields within the CertificateRequest's `spec` are immutable after creation.
A CertificateRequest will either succeed or fail, as denoted by its `Ready` status
condition and its `status.failureTime` field.
A CertificateRequest is a one-shot resource, meaning it represents a single
point in time request for a certificate and cannot be re-used.
properties:
Expand Down Expand Up @@ -115,11 +113,9 @@ spec:
Requested basic constraints isCA value. Note that the issuer may choose
to ignore the requested isCA value, just like any other requested attribute.
NOTE: If the CSR in the `Request` field has a BasicConstraints extension,
it must have the same isCA value as specified here.
If true, this will automatically add the `cert sign` usage to the list
of requested `usages`.
type: boolean
Expand All @@ -130,7 +126,6 @@ spec:
as the Certificate. If the issuer is cluster-scoped, it can be used
from any namespace.
The `name` field of the reference must always be specified.
properties:
group:
Expand All @@ -150,7 +145,6 @@ spec:
The PEM-encoded X.509 certificate signing request to be submitted to the
issuer for signing.
If the CSR has a BasicConstraints extension, its isCA attribute must
match the `isCA` value of this CertificateRequest.
If the CSR has a KeyUsage extension, its key usages must match the
Expand All @@ -169,12 +163,10 @@ spec:
description: |-
Requested key usages and extended key usages.
NOTE: If the CSR in the `Request` field has uses the KeyUsage or
ExtKeyUsage extension, these extensions must have the same values
as specified here without any additional values.
If unset, defaults to `digital signature` and `key encipherment`.
items:
description: |-
Expand All @@ -183,7 +175,6 @@ spec:
https://tools.ietf.org/html/rfc5280#section-4.2.1.3
https://tools.ietf.org/html/rfc5280#section-4.2.1.12
Valid KeyUsage values are as follows:
"signing",
"digital signature",
Expand Down
Loading

0 comments on commit 100ac75

Please sign in to comment.