Skip to content

Commit 5f0cd7b

Browse files
☀ projected k8s-manifests-github from 3d797b1
Source-holobranch: k8s-manifests-github Source-commit: 3d797b1 Source: 3d797b1
2 parents 214edd5 + 3d797b1 commit 5f0cd7b

19 files changed

+542
-313
lines changed

.github/workflows/k8s-prepare.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ jobs:
5050
## build PR description body
5151
echo
5252
echo "Builing PR title+body content..."
53-
diff_size=$(du -k '/tmp/kube.diff' | cut -f1)
53+
diff_size=$(wc -c /tmp/kube.diff | awk '{print $1}')
5454
pr_head_describe="$(git describe --always --tag)"
5555
5656
pr_title="Deploy ${BRANCH_RELEASE} ${pr_head_describe}"

_/ClusterRole/cert-manager-cainjector.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@ rules:
4646
- list
4747
- watch
4848
- update
49+
- patch
4950
- apiGroups:
5051
- apiregistration.k8s.io
5152
resources:
@@ -55,6 +56,7 @@ rules:
5556
- list
5657
- watch
5758
- update
59+
- patch
5860
- apiGroups:
5961
- apiextensions.k8s.io
6062
resources:
@@ -64,3 +66,4 @@ rules:
6466
- list
6567
- watch
6668
- update
69+
- patch
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
apiVersion: rbac.authorization.k8s.io/v1
2+
kind: ClusterRole
3+
metadata:
4+
labels:
5+
app: cert-manager
6+
app.kubernetes.io/component: controller
7+
app.kubernetes.io/instance: cert-manager
8+
app.kubernetes.io/managed-by: Helm
9+
app.kubernetes.io/name: cert-manager
10+
app.kubernetes.io/version: v1.10.1
11+
helm.sh/chart: cert-manager-v1.10.1
12+
rbac.authorization.k8s.io/aggregate-to-cluster-reader: 'true'
13+
name: cert-manager-cluster-view
14+
rules:
15+
- apiGroups:
16+
- cert-manager.io
17+
resources:
18+
- clusterissuers
19+
verbs:
20+
- get
21+
- list
22+
- watch

_/ClusterRole/cert-manager-view.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ metadata:
1010
app.kubernetes.io/version: v1.10.1
1111
helm.sh/chart: cert-manager-v1.10.1
1212
rbac.authorization.k8s.io/aggregate-to-admin: 'true'
13+
rbac.authorization.k8s.io/aggregate-to-cluster-reader: 'true'
1314
rbac.authorization.k8s.io/aggregate-to-edit: 'true'
1415
rbac.authorization.k8s.io/aggregate-to-view: 'true'
1516
name: cert-manager-view

_/CustomResourceDefinition/certificaterequests.cert-manager.io.yaml

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ spec:
5757
description: >-
5858
A CertificateRequest is used to request a signed certificate from
5959
one of the configured issuers.
60-
All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field.
60+
All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `Ready` status condition and its `status.failureTime` field.
6161
A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used.
6262
properties:
6363
apiVersion:
@@ -79,12 +79,16 @@ spec:
7979
metadata:
8080
type: object
8181
spec:
82-
description: Desired state of the CertificateRequest resource.
82+
description: >-
83+
Specification of the desired state of the CertificateRequest
84+
resource.
85+
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status
8386
properties:
8487
duration:
8588
description: >-
86-
The requested 'duration' (i.e. lifetime) of the Certificate.
87-
This option may be ignored/overridden by some issuer types.
89+
Requested 'duration' (i.e. lifetime) of the Certificate.
90+
Note that the issuer may choose to ignore the requested
91+
duration, just like any other requested attribute.
8892
type: string
8993
extra:
9094
additionalProperties:
@@ -107,22 +111,19 @@ spec:
107111
x-kubernetes-list-type: atomic
108112
isCA:
109113
description: >-
110-
IsCA will request to mark the certificate as valid for
111-
certificate signing when submitting to the issuer. This will
112-
automatically add the `cert sign` usage to the list of
113-
`usages`.
114+
Requested basic constraints isCA value. Note that the issuer
115+
may choose to ignore the requested isCA value, just like any
116+
other requested attribute.
117+
NOTE: If the CSR in the `Request` field has a BasicConstraints extension, it must have the same isCA value as specified here.
118+
If true, this will automatically add the `cert sign` usage to the list of requested `usages`.
114119
type: boolean
115120
issuerRef:
116121
description: >-
117-
IssuerRef is a reference to the issuer for this
118-
CertificateRequest. If the `kind` field is not set, or set
119-
to `Issuer`, an Issuer resource with the given name in the
120-
same namespace as the CertificateRequest will be used. If
121-
the `kind` field is set to `ClusterIssuer`, a ClusterIssuer
122-
with the provided name will be used. The `name` field in
123-
this stanza is required at all times. The group field refers
124-
to the API group of the issuer which defaults to
125-
`cert-manager.io` if empty.
122+
Reference to the issuer responsible for issuing the
123+
certificate. If the issuer is namespace-scoped, it must be
124+
in the same namespace as the Certificate. If the issuer is
125+
cluster-scoped, it can be used from any namespace.
126+
The `name` field of the reference must always be specified.
126127
properties:
127128
group:
128129
description: Group of the resource being referred to.
@@ -138,8 +139,9 @@ spec:
138139
type: object
139140
request:
140141
description: >-
141-
The PEM-encoded x509 certificate signing request to be
142-
submitted to the CA for signing.
142+
The PEM-encoded X.509 certificate signing request to be
143+
submitted to the issuer for signing.
144+
If the CSR has a BasicConstraints extension, its isCA attribute must match the `isCA` value of this CertificateRequest. If the CSR has a KeyUsage extension, its key usages must match the key usages in the `usages` field of this CertificateRequest. If the CSR has a ExtKeyUsage extension, its extended key usages must match the extended key usages in the `usages` field of this CertificateRequest.
143145
format: byte
144146
type: string
145147
uid:
@@ -149,11 +151,10 @@ spec:
149151
creation and immutable.
150152
type: string
151153
usages:
152-
description: >-
153-
Usages is the set of x509 usages that are requested for the
154-
certificate. If usages are set they SHOULD be encoded inside
155-
the CSR spec Defaults to `digital signature` and `key
156-
encipherment` if not specified.
154+
description: |-
155+
Requested key usages and extended key usages.
156+
NOTE: If the CSR in the `Request` field has uses the KeyUsage or ExtKeyUsage extension, these extensions must have the same values as specified here without any additional values.
157+
If unset, defaults to `digital signature` and `key encipherment`.
157158
items:
158159
description: >-
159160
KeyUsage specifies valid usage contexts for keys. See:
@@ -199,19 +200,20 @@ spec:
199200
status:
200201
description: >-
201202
Status of the CertificateRequest. This is set and managed
202-
automatically.
203+
automatically. Read-only. More info:
204+
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status
203205
properties:
204206
ca:
205207
description: >-
206-
The PEM encoded x509 certificate of the signer, also known
208+
The PEM encoded X.509 certificate of the signer, also known
207209
as the CA (Certificate Authority). This is set on a
208210
best-effort basis by different issuers. If not set, the CA
209211
is assumed to be unknown/not available.
210212
format: byte
211213
type: string
212214
certificate:
213215
description: >-
214-
The PEM encoded x509 certificate resulting from the
216+
The PEM encoded X.509 certificate resulting from the
215217
certificate signing request. If not set, the
216218
CertificateRequest has either not been completed or has
217219
failed. More information on failure can be found by checking
@@ -221,8 +223,8 @@ spec:
221223
conditions:
222224
description: >-
223225
List of status conditions to indicate the status of a
224-
CertificateRequest. Known condition types are `Ready` and
225-
`InvalidRequest`.
226+
CertificateRequest. Known condition types are `Ready`,
227+
`InvalidRequest`, `Approved` and `Denied`.
226228
items:
227229
description: >-
228230
CertificateRequestCondition contains condition information
@@ -274,8 +276,6 @@ spec:
274276
format: date-time
275277
type: string
276278
type: object
277-
required:
278-
- spec
279279
type: object
280280
served: true
281281
storage: true

0 commit comments

Comments
 (0)