Files @ 037539eb52c3
Branch filter:

Location: pomerium/30-cert-manager/50-cert-manager.yaml - annotation

drewp@bigasterisk.com
change issuer ns to make it work today, but this is questionable. maybe they should be clusterissuers anyway
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
0ae82df13719
# Copyright 2021 The cert-manager Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Source: cert-manager/templates/webhook-config.yaml
apiVersion: v1
kind: ConfigMap
metadata:
  name: cert-manager-webhook
  namespace: cert-manager
  labels:
    app: webhook
    app.kubernetes.io/name: webhook
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "webhook"
data:
---
# Source: cert-manager/templates/service.yaml
apiVersion: v1
kind: Service
metadata:
  name: cert-manager
  namespace: cert-manager
  labels:
    app: cert-manager
    app.kubernetes.io/name: cert-manager
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "controller"
    app.kubernetes.io/version: "v1.10.1"
spec:
  type: ClusterIP
  ports:
  - protocol: TCP
    port: 9402
    name: tcp-prometheus-servicemonitor
    targetPort: 9402
  selector:
    app.kubernetes.io/name: cert-manager
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "controller"
---
# Source: cert-manager/templates/webhook-service.yaml
apiVersion: v1
kind: Service
metadata:
  name: cert-manager-webhook
  namespace: cert-manager
  labels:
    app: webhook
    app.kubernetes.io/name: webhook
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "webhook"
    app.kubernetes.io/version: "v1.10.1"
spec:
  type: ClusterIP
  ports:
  - name: https
    port: 443
    protocol: TCP
    targetPort: "https"
  selector:
    app.kubernetes.io/name: webhook
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "webhook"
---
# Source: cert-manager/templates/cainjector-deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
  name: cert-manager-cainjector
  namespace: cert-manager
  labels:
    app: cainjector
    app.kubernetes.io/name: cainjector
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "cainjector"
    app.kubernetes.io/version: "v1.10.1"
spec:
  replicas: 1
  selector:
    matchLabels:
      app.kubernetes.io/name: cainjector
      app.kubernetes.io/instance: cert-manager
      app.kubernetes.io/component: "cainjector"
  template:
    metadata:
      labels:
        app: cainjector
        app.kubernetes.io/name: cainjector
        app.kubernetes.io/instance: cert-manager
        app.kubernetes.io/component: "cainjector"
        app.kubernetes.io/version: "v1.10.1"
    spec:
      serviceAccountName: cert-manager-cainjector
      securityContext:
        runAsNonRoot: true
      containers:
        - name: cert-manager
          image: "quay.io/jetstack/cert-manager-cainjector:v1.10.1"
          imagePullPolicy: IfNotPresent
          args:
          - --v=2
          - --leader-election-namespace=kube-system
          env:
          - name: POD_NAMESPACE
            valueFrom:
              fieldRef:
                fieldPath: metadata.namespace
          securityContext:
            allowPrivilegeEscalation: false
      nodeSelector:
        kubernetes.io/os: linux
---
# Source: cert-manager/templates/deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
  name: cert-manager
  namespace: cert-manager
  labels:
    app: cert-manager
    app.kubernetes.io/name: cert-manager
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "controller"
    app.kubernetes.io/version: "v1.10.1"
spec:
  replicas: 1
  selector:
    matchLabels:
      app.kubernetes.io/name: cert-manager
      app.kubernetes.io/instance: cert-manager
      app.kubernetes.io/component: "controller"
  template:
    metadata:
      labels:
        app: cert-manager
        app.kubernetes.io/name: cert-manager
        app.kubernetes.io/instance: cert-manager
        app.kubernetes.io/component: "controller"
        app.kubernetes.io/version: "v1.10.1"
      annotations:
        prometheus.io/path: "/metrics"
        prometheus.io/scrape: 'true'
        prometheus.io/port: '9402'
    spec:
      serviceAccountName: cert-manager
      securityContext:
        runAsNonRoot: true
      # https://github.com/cert-manager/cert-manager/issues/4941#issuecomment-1189160798
      dnsPolicy: None
      dnsConfig:
        nameservers:
          - 8.8.4.4
          - 8.8.8.8
      containers:
        - name: cert-manager
          image: "quay.io/jetstack/cert-manager-controller:v1.10.1"
          imagePullPolicy: IfNotPresent
          args:
          - --v=2
          - --cluster-resource-namespace=$(POD_NAMESPACE)
          - --leader-election-namespace=kube-system
          ports:
          - containerPort: 9402
            name: http-metrics
            protocol: TCP
          securityContext:
            allowPrivilegeEscalation: false
          env:
          - name: POD_NAMESPACE
            valueFrom:
              fieldRef:
                fieldPath: metadata.namespace
      nodeSelector:
        kubernetes.io/os: linux
---
# Source: cert-manager/templates/webhook-deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
  name: cert-manager-webhook
  namespace: cert-manager
  labels:
    app: webhook
    app.kubernetes.io/name: webhook
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "webhook"
    app.kubernetes.io/version: "v1.10.1"
spec:
  replicas: 1
  selector:
    matchLabels:
      app.kubernetes.io/name: webhook
      app.kubernetes.io/instance: cert-manager
      app.kubernetes.io/component: "webhook"
  template:
    metadata:
      labels:
        app: webhook
        app.kubernetes.io/name: webhook
        app.kubernetes.io/instance: cert-manager
        app.kubernetes.io/component: "webhook"
        app.kubernetes.io/version: "v1.10.1"
    spec:
      serviceAccountName: cert-manager-webhook
      securityContext:
        runAsNonRoot: true
      containers:
        - name: cert-manager
          image: "quay.io/jetstack/cert-manager-webhook:v1.10.1"
          imagePullPolicy: IfNotPresent
          args:
          - --v=2
          - --secure-port=10250
          - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
          - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
          - --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
          ports:
          - name: https
            protocol: TCP
            containerPort: 10250
          livenessProbe:
            httpGet:
              path: /livez
              port: 6080
              scheme: HTTP
            initialDelaySeconds: 60
            periodSeconds: 10
            timeoutSeconds: 1
            successThreshold: 1
            failureThreshold: 3
          readinessProbe:
            httpGet:
              path: /healthz
              port: 6080
              scheme: HTTP
            initialDelaySeconds: 5
            periodSeconds: 5
            timeoutSeconds: 1
            successThreshold: 1
            failureThreshold: 3
          securityContext:
            allowPrivilegeEscalation: false
          env:
          - name: POD_NAMESPACE
            valueFrom:
              fieldRef:
                fieldPath: metadata.namespace
      nodeSelector:
        kubernetes.io/os: linux
---
# Source: cert-manager/templates/webhook-mutating-webhook.yaml
apiVersion: admissionregistration.k8s.io/v1
kind: MutatingWebhookConfiguration
metadata:
  name: cert-manager-webhook
  labels:
    app: webhook
    app.kubernetes.io/name: webhook
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "webhook"
    app.kubernetes.io/version: "v1.10.1"
  annotations:
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
webhooks:
  - name: webhook.cert-manager.io
    rules:
      - apiGroups:
          - "cert-manager.io"
          - "acme.cert-manager.io"
        apiVersions:
          - "v1"
        operations:
          - CREATE
          - UPDATE
        resources:
          - "*/*"
    admissionReviewVersions: ["v1"]
    # This webhook only accepts v1 cert-manager resources.
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
    # this webhook (after the resources have been converted to v1).
    matchPolicy: Equivalent
    timeoutSeconds: 10
    failurePolicy: Fail
    # Only include 'sideEffects' field in Kubernetes 1.12+
    sideEffects: None
    clientConfig:
      service:
        name: cert-manager-webhook
        namespace: cert-manager
        path: /mutate
---
# Source: cert-manager/templates/webhook-validating-webhook.yaml
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
  name: cert-manager-webhook
  labels:
    app: webhook
    app.kubernetes.io/name: webhook
    app.kubernetes.io/instance: cert-manager
    app.kubernetes.io/component: "webhook"
    app.kubernetes.io/version: "v1.10.1"
  annotations:
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
webhooks:
  - name: webhook.cert-manager.io
    namespaceSelector:
      matchExpressions:
      - key: "cert-manager.io/disable-validation"
        operator: "NotIn"
        values:
        - "true"
      - key: "name"
        operator: "NotIn"
        values:
        - cert-manager
    rules:
      - apiGroups:
          - "cert-manager.io"
          - "acme.cert-manager.io"
        apiVersions:
          - "v1"
        operations:
          - CREATE
          - UPDATE
        resources:
          - "*/*"
    admissionReviewVersions: ["v1"]
    # This webhook only accepts v1 cert-manager resources.
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
    # this webhook (after the resources have been converted to v1).
    matchPolicy: Equivalent
    timeoutSeconds: 10
    failurePolicy: Fail
    sideEffects: None
    clientConfig:
      service:
        name: cert-manager-webhook
        namespace: cert-manager
        path: /validate