Changeset - 0ae82df13719
[Not reviewed]
default
9 0 15
drewp@bigasterisk.com - 2 years ago 2022-12-13 07:15:13
drewp@bigasterisk.com
renames and file splits, mostly
13 files changed:
0 comments (0 inline, 0 general)
00-defs/00-namespace.yaml
Show inline comments
 
file renamed from kube/00-namespace.yaml to 00-defs/00-namespace.yaml
00-defs/01-crd.yaml
Show inline comments
 
new file 100644
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  annotations:
 
    controller-gen.kubebuilder.io/version: v0.9.0
 
  creationTimestamp: null
 
  labels:
 
    app.kubernetes.io/name: pomerium
 
  name: pomerium.ingress.pomerium.io
 
spec:
 
  group: ingress.pomerium.io
 
  names:
 
    kind: Pomerium
 
    listKind: PomeriumList
 
    plural: pomerium
 
    singular: pomerium
 
  scope: Cluster
 
  versions:
 
  - name: v1
 
    schema:
 
      openAPIV3Schema:
 
        description: Pomerium define runtime-configurable Pomerium settings that do
 
          not fall into the category of deployment parameters
 
        properties:
 
          apiVersion:
 
            description: 'APIVersion defines the versioned schema of this representation
 
              of an object. Servers should convert recognized schemas to the latest
 
              internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
            type: string
 
          kind:
 
            description: 'Kind is a string value representing the REST resource this
 
              object represents. Servers may infer this from the endpoint the client
 
              submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
            type: string
 
          metadata:
 
            type: object
 
          spec:
 
            description: PomeriumSpec defines Pomerium-specific configuration parameters.
 
            properties:
 
              authenticate:
 
                description: Authenticate sets authenticate service parameters
 
                properties:
 
                  callbackPath:
 
                    description: "CallbackPath sets the path at which the authenticate
 
                      service receives callback responses from your identity provider.
 
                      The value must exactly match one of the authorized redirect
 
                      URIs for the OAuth 2.0 client. \n <p>This value is referred
 
                      to as the redirect_url in the OpenIDConnect and OAuth2 specs.</p>
 
                      <p>Defaults to <code>/oauth2/callback</code></p>"
 
                    type: string
 
                  url:
 
                    description: "AuthenticateURL is a dedicated domain URL the non-authenticated
 
                      persons would be referred to. \n <p><ul> <li>You do not need
 
                      to create a dedicated <code>Ingress</code> for this virtual
 
                      route, as it is handled by Pomerium internally. </li> <li>You
 
                      do need create a secret with corresponding TLS certificate for
 
                      this route and reference it via <a href=\"#prop-certificates\"><code>certificates</code></a>.
 
                      If you use <code>cert-manager</code> with <code>HTTP01</code>
 
                      challenge, you may use <code>pomerium</code> <code>ingressClass</code>
 
                      to solve it.</li> </ul></p>"
 
                    format: uri
 
                    pattern: ^https://
 
                    type: string
 
                required:
 
                - url
 
                type: object
 
              certificates:
 
                description: Certificates is a list of secrets of type TLS to use
 
                format: namespace/name
 
                items:
 
                  type: string
 
                type: array
 
              cookie:
 
                description: Cookie defines Pomerium session cookie options.
 
                properties:
 
                  domain:
 
                    description: Domain defaults to the same host that set the cookie.
 
                      If you specify the domain explicitly, then subdomains would
 
                      also be included.
 
                    type: string
 
                  expire:
 
                    description: Expire sets cookie and Pomerium session expiration
 
                      time. Once session expires, users would have to re-login. If
 
                      you change this parameter, existing sessions are not affected.
 
                      <p>See <a href="https://www.pomerium.com/docs/enterprise/about#session-management">Session
 
                      Management</a> (Enterprise) for a more fine-grained session
 
                      controls.</p> <p>Defaults to 14 hours.</p>
 
                    format: duration
 
                    type: string
 
                  httpOnly:
 
                    description: HTTPOnly if set to <code>false</code>, the cookie
 
                      would be accessible from within the JavaScript. Defaults to
 
                      <code>true</code>.
 
                    type: boolean
 
                  name:
 
                    description: Name sets the Pomerium session cookie name. Defaults
 
                      to <code>_pomerium</code>
 
                    type: string
 
                  secure:
 
                    description: Secure if set to false, would make a cookie accessible
 
                      over insecure protocols (HTTP). Defaults to <code>true</code>.
 
                    type: boolean
 
                type: object
 
              identityProvider:
 
                description: IdentityProvider configure single-sign-on authentication
 
                  and user identity details by integrating with your <a href="https://www.pomerium.com/docs/identity-providers/">Identity
 
                  Provider</a>
 
                properties:
 
                  provider:
 
                    description: Provider is the short-hand name of a built-in OpenID
 
                      Connect (oidc) identity provider to be used for authentication.
 
                      To use a generic provider, set to <code>oidc</code>.
 
                    enum:
 
                    - auth0
 
                    - azure
 
                    - google
 
                    - okta
 
                    - onelogin
 
                    - oidc
 
                    - ping
 
                    - github
 
                    type: string
 
                  refreshDirectory:
 
                    description: RefreshDirectory is no longer supported, please see
 
                      <a href="https://docs.pomerium.com/docs/overview/upgrading#idp-directory-sync">Upgrade
 
                      Guide</a>.
 
                    properties:
 
                      interval:
 
                        description: interval is the time that pomerium will sync
 
                          your IDP directory.
 
                        format: duration
 
                        type: string
 
                      timeout:
 
                        description: timeout is the maximum time allowed each run.
 
                        format: duration
 
                        type: string
 
                    required:
 
                    - interval
 
                    - timeout
 
                    type: object
 
                  requestParams:
 
                    additionalProperties:
 
                      type: string
 
                    description: RequestParams to be added as part of a signin request
 
                      using OAuth2 code flow.
 
                    format: namespace/name
 
                    type: object
 
                  requestParamsSecret:
 
                    description: RequestParamsSecret is a reference to a secret for
 
                      additional parameters you'd prefer not to provide in plaintext.
 
                    format: namespace/name
 
                    type: string
 
                  scopes:
 
                    description: Scopes Identity provider scopes correspond to access
 
                      privilege scopes as defined in Section 3.3 of OAuth 2.0 RFC6749.
 
                    items:
 
                      type: string
 
                    type: array
 
                  secret:
 
                    description: Secret containing IdP provider specific parameters.
 
                      and must contain at least <code>client_id</code> and <code>client_secret</code>
 
                      values.
 
                    format: namespace/name
 
                    minLength: 1
 
                    type: string
 
                  serviceAccountFromSecret:
 
                    description: ServiceAccountFromSecret is no longer supported,
 
                      see <a href="https://docs.pomerium.com/docs/overview/upgrading#idp-directory-sync">Upgrade
 
                      Guide</a>.
 
                    type: string
 
                  url:
 
                    description: URL is the base path to an identity provider's OpenID
 
                      connect discovery document. See <a href="https://pomerium.com/docs/identity-providers">Identity
 
                      Providers</a> guides for details.
 
                    format: uri
 
                    pattern: ^https://
 
                    type: string
 
                required:
 
                - provider
 
                - secret
 
                type: object
 
              jwtClaimHeaders:
 
                additionalProperties:
 
                  type: string
 
                description: JWTClaimHeaders convert claims from the assertion token
 
                  into HTTP headers and adds them into JWT assertion header. Please
 
                  make sure to read <a href="https://www.pomerium.com/docs/topics/getting-users-identity">
 
                  Getting User Identity</a> guide.
 
                type: object
 
              secrets:
 
                description: "Secrets references a Secret with Pomerium bootstrap
 
                  parameters. \n <p> <ul> <li><a href=\"https://pomerium.com/docs/reference/shared-secret\"><code>shared_secret</code></a>
 
                  - secures inter-Pomerium service communications. </li> <li><a href=\"https://pomerium.com/docs/reference/cookie-secret\"><code>cookie_secret</code></a>
 
                  - encrypts Pomerium session browser cookie. See also other <a href=\"#cookie\">Cookie</a>
 
                  parameters. </li> <li><a href=\"https://pomerium.com/docs/reference/signing-key\"><code>signing_key</code></a>
 
                  signs Pomerium JWT assertion header. See <a href=\"https://www.pomerium.com/docs/topics/getting-users-identity\">Getting
 
                  the user's identity</a> guide. </li> </ul> </p> <p> In a default
 
                  Pomerium installation manifest, they would be generated via a <a
 
                  href=\"https://github.com/pomerium/ingress-controller/blob/main/config/gen_secrets/job.yaml\">one-time
 
                  job</a> and stored in a <code>pomerium/bootstrap</code> Secret.
 
                  You may re-run the job to rotate the secrets, or update the Secret
 
                  values manually. </p>"
 
                format: namespace/name
 
                minLength: 1
 
                type: string
 
              storage:
 
                description: Storage defines persistent storage for sessions and other
 
                  data. See <a href="https://www.pomerium.com/docs/topics/data-storage">Storage</a>
 
                  for details. If no storage is specified, Pomerium would use a transient
 
                  in-memory storage (not recommended for production).
 
                properties:
 
                  postgres:
 
                    description: Postgres specifies PostgreSQL database connection
 
                      parameters
 
                    properties:
 
                      caSecret:
 
                        description: CASecret should refer to a k8s secret with key
 
                          <code>ca.crt</code> containing CA certificate that, if specified,
 
                          would be used to populate <code>sslrootcert</code> parameter
 
                          of the connection string.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      secret:
 
                        description: Secret specifies a name of a Secret that must
 
                          contain <code>connection</code> key. See <a href="https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-CONNSTRING">DSN
 
                          Format and Parameters</a>. Do not set <code>sslrootcert</code>,
 
                          <code>sslcert</code> and <code>sslkey</code> via connection
 
                          string, use <code>tlsCecret</code> and <code>caSecret</code>
 
                          CRD options instead.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      tlsSecret:
 
                        description: TLSSecret should refer to a k8s secret of type
 
                          <code>kubernetes.io/tls</code> and allows to specify an
 
                          optional client certificate and key, by constructing <code>sslcert</code>
 
                          and <code>sslkey</code> connection string <a href="https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-PARAMKEYWORDS">
 
                          parameter values</a>.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                    required:
 
                    - secret
 
                    type: object
 
                  redis:
 
                    description: Redis defines REDIS connection parameters
 
                    properties:
 
                      caSecret:
 
                        description: CASecret should refer to a k8s secret with key
 
                          <code>ca.crt</code> that must be a PEM-encoded certificate
 
                          authority to use when connecting to the databroker storage
 
                          engine.
 
                        format: namespace/name
 
                        type: string
 
                      secret:
 
                        description: Secret specifies a name of a Secret that must
 
                          contain <code>connection</code> key.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      tlsSecret:
 
                        description: TLSSecret should refer to a k8s secret of type
 
                          <code>kubernetes.io/tls</code> that would be used to perform
 
                          TLS connection to REDIS.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      tlsSkipVerify:
 
                        description: TLSSkipVerify disables TLS certificate chain
 
                          validation.
 
                        type: boolean
 
                    required:
 
                    - secret
 
                    type: object
 
                type: object
 
            required:
 
            - authenticate
 
            - identityProvider
 
            - secrets
 
            type: object
 
          status:
 
            description: PomeriumStatus represents configuration and Ingress status.
 
            properties:
 
              ingress:
 
                additionalProperties:
 
                  description: ResourceStatus represents the outcome of the latest
 
                    attempt to reconcile relevant Kubernetes resource with Pomerium.
 
                  properties:
 
                    error:
 
                      description: Error that prevented latest observedGeneration
 
                        to be synchronized with Pomerium.
 
                      type: string
 
                    observedAt:
 
                      description: ObservedAt is when last reconciliation attempt
 
                        was made.
 
                      format: date-time
 
                      type: string
 
                    observedGeneration:
 
                      description: ObservedGeneration represents the <code>.metadata.generation</code>
 
                        that was last presented to Pomerium.
 
                      format: int64
 
                      type: integer
 
                    reconciled:
 
                      description: Reconciled is whether this object generation was
 
                        successfully synced with pomerium.
 
                      type: boolean
 
                    warnings:
 
                      description: Warnings while parsing the resource.
 
                      items:
 
                        type: string
 
                      type: array
 
                  required:
 
                  - reconciled
 
                  type: object
 
                description: Routes provide per-Ingress status.
 
                type: object
 
              settingsStatus:
 
                description: SettingsStatus represent most recent main configuration
 
                  reconciliation status.
 
                properties:
 
                  error:
 
                    description: Error that prevented latest observedGeneration to
 
                      be synchronized with Pomerium.
 
                    type: string
 
                  observedAt:
 
                    description: ObservedAt is when last reconciliation attempt was
 
                      made.
 
                    format: date-time
 
                    type: string
 
                  observedGeneration:
 
                    description: ObservedGeneration represents the <code>.metadata.generation</code>
 
                      that was last presented to Pomerium.
 
                    format: int64
 
                    type: integer
 
                  reconciled:
 
                    description: Reconciled is whether this object generation was
 
                      successfully synced with pomerium.
 
                    type: boolean
 
                  warnings:
 
                    description: Warnings while parsing the resource.
 
                    items:
 
                      type: string
 
                    type: array
 
                required:
 
                - reconciled
 
                type: object
 
            type: object
 
        type: object
 
    served: true
 
    storage: true
 
    subresources:
 
      status: {}
00-defs/49-cert-manager-crd.yaml
Show inline comments
 
file renamed from kube/50-cert-manager.yaml to 00-defs/49-cert-manager-crd.yaml
 
# Copyright 2021 The cert-manager Authors.
 
#
 
# Licensed under the Apache License, Version 2.0 (the "License");
 
# you may not use this file except in compliance with the License.
 
# You may obtain a copy of the License at
 
#
 
#     http://www.apache.org/licenses/LICENSE-2.0
 
#
 
# Unless required by applicable law or agreed to in writing, software
 
# distributed under the License is distributed on an "AS IS" BASIS,
 
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 
# See the License for the specific language governing permissions and
 
# limitations under the License.
 

	
 
apiVersion: v1
 
kind: Namespace
 
metadata:
 
  name: cert-manager
 
---
 
# Source: cert-manager/templates/crd-templates.yaml
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  name: certificaterequests.cert-manager.io
 
  labels:
 
    app: 'cert-manager'
 
    app.kubernetes.io/name: 'cert-manager'
 
    app.kubernetes.io/instance: 'cert-manager'
 
    # Generated labels
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  group: cert-manager.io
 
  names:
 
    kind: CertificateRequest
 
    listKind: CertificateRequestList
 
    plural: certificaterequests
 
    shortNames:
 
      - cr
 
      - crs
 
    singular: certificaterequest
 
    categories:
 
      - cert-manager
 
  scope: Namespaced
 
  versions:
 
    - name: v1
 
      subresources:
 
        status: {}
 
      additionalPrinterColumns:
 
        - jsonPath: .status.conditions[?(@.type=="Approved")].status
 
          name: Approved
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Denied")].status
 
          name: Denied
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].status
 
          name: Ready
 
          type: string
 
        - jsonPath: .spec.issuerRef.name
 
          name: Issuer
 
          type: string
 
        - jsonPath: .spec.username
 
          name: Requestor
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].message
 
          name: Status
 
          priority: 1
 
          type: string
 
        - jsonPath: .metadata.creationTimestamp
 
          description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
 
          name: Age
 
          type: date
 
      schema:
 
        openAPIV3Schema:
 
          description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used."
 
          type: object
 
          required:
 
            - spec
 
          properties:
 
            apiVersion:
 
              description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
              type: string
 
            kind:
 
              description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
              type: string
 
            metadata:
 
              type: object
 
            spec:
 
              description: Desired state of the CertificateRequest resource.
 
              type: object
 
              required:
 
                - issuerRef
 
                - request
 
              properties:
 
                duration:
 
                  description: The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types.
 
                  type: string
 
                extra:
 
                  description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: object
 
                  additionalProperties:
 
                    type: array
 
                    items:
 
                      type: string
 
                groups:
 
                  description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: array
 
                  items:
 
                    type: string
 
                  x-kubernetes-list-type: atomic
 
                isCA:
 
                  description: IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`.
 
                  type: boolean
 
                issuerRef:
 
                  description: IssuerRef is a reference to the issuer for this CertificateRequest.  If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used.  If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty.
 
                  type: object
 
                  required:
 
                    - name
 
                  properties:
 
                    group:
 
                      description: Group of the resource being referred to.
 
                      type: string
 
                    kind:
 
                      description: Kind of the resource being referred to.
 
                      type: string
 
                    name:
 
                      description: Name of the resource being referred to.
 
                      type: string
 
                request:
 
                  description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing.
 
                  type: string
 
                  format: byte
 
                uid:
 
                  description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: string
 
                usages:
 
                  description: Usages is the set of x509 usages that are requested for the certificate. If usages are set they SHOULD be encoded inside the CSR spec Defaults to `digital signature` and `key encipherment` if not specified.
 
                  type: array
 
                  items:
 
                    description: 'KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: "signing", "digital signature", "content commitment", "key encipherment", "key agreement", "data encipherment", "cert sign", "crl sign", "encipher only", "decipher only", "any", "server auth", "client auth", "code signing", "email protection", "s/mime", "ipsec end system", "ipsec tunnel", "ipsec user", "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"'
 
                    type: string
 
                    enum:
 
                      - signing
 
                      - digital signature
 
                      - content commitment
 
                      - key encipherment
 
                      - key agreement
 
                      - data encipherment
 
                      - cert sign
 
                      - crl sign
 
                      - encipher only
 
                      - decipher only
 
                      - any
 
                      - server auth
 
                      - client auth
 
                      - code signing
 
                      - email protection
 
                      - s/mime
 
                      - ipsec end system
 
                      - ipsec tunnel
 
                      - ipsec user
 
                      - timestamping
 
                      - ocsp signing
 
                      - microsoft sgc
 
                      - netscape sgc
 
                username:
 
                  description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: string
 
            status:
 
              description: Status of the CertificateRequest. This is set and managed automatically.
 
              type: object
 
              properties:
 
                ca:
 
                  description: The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available.
 
                  type: string
 
                  format: byte
 
                certificate:
 
                  description: The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field.
 
                  type: string
 
                  format: byte
 
                conditions:
 
                  description: List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`.
 
                  type: array
 
                  items:
 
                    description: CertificateRequestCondition contains condition information for a CertificateRequest.
 
                    type: object
 
                    required:
 
                      - status
 
                      - type
 
                    properties:
 
                      lastTransitionTime:
 
                        description: LastTransitionTime is the timestamp corresponding to the last status change of this condition.
 
                        type: string
 
                        format: date-time
 
                      message:
 
                        description: Message is a human readable description of the details of the last transition, complementing reason.
 
                        type: string
 
                      reason:
 
                        description: Reason is a brief machine readable explanation for the condition's last transition.
 
                        type: string
 
                      status:
 
                        description: Status of the condition, one of (`True`, `False`, `Unknown`).
 
                        type: string
 
                        enum:
 
                          - "True"
 
                          - "False"
 
                          - Unknown
 
                      type:
 
                        description: Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`).
 
                        type: string
 
                  x-kubernetes-list-map-keys:
 
                    - type
 
                  x-kubernetes-list-type: map
 
                failureTime:
 
                  description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off.
 
                  type: string
 
                  format: date-time
 
      served: true
 
      storage: true
 
---
 
# Source: cert-manager/templates/crd-templates.yaml
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  name: certificates.cert-manager.io
 
  labels:
 
    app: 'cert-manager'
 
    app.kubernetes.io/name: 'cert-manager'
 
    app.kubernetes.io/instance: 'cert-manager'
 
    # Generated labels
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  group: cert-manager.io
 
  names:
 
    kind: Certificate
 
    listKind: CertificateList
 
    plural: certificates
 
    shortNames:
 
      - cert
 
      - certs
 
    singular: certificate
 
    categories:
 
      - cert-manager
 
  scope: Namespaced
 
  versions:
 
    - name: v1
 
      subresources:
 
        status: {}
 
      additionalPrinterColumns:
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].status
 
          name: Ready
 
          type: string
 
        - jsonPath: .spec.secretName
 
          name: Secret
 
          type: string
 
        - jsonPath: .spec.issuerRef.name
 
          name: Issuer
 
          priority: 1
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].message
 
          name: Status
 
          priority: 1
 
          type: string
 
        - jsonPath: .metadata.creationTimestamp
 
          description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
 
          name: Age
 
          type: date
 
      schema:
 
        openAPIV3Schema:
 
          description: "A Certificate resource should be created to ensure an up to date and signed x509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`. \n The stored certificate will be renewed before it expires (as configured by `spec.renewBefore`)."
 
          type: object
 
          required:
 
            - spec
 
          properties:
 
            apiVersion:
 
              description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
              type: string
 
            kind:
 
              description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
              type: string
 
            metadata:
 
              type: object
 
            spec:
 
              description: Desired state of the Certificate resource.
 
              type: object
 
              required:
 
                - issuerRef
 
                - secretName
 
              properties:
 
                additionalOutputFormats:
 
                  description: AdditionalOutputFormats defines extra output formats of the private key and signed certificate chain to be written to this Certificate's target Secret. This is an Alpha Feature and is only enabled with the `--feature-gates=AdditionalCertificateOutputFormats=true` option on both the controller and webhook components.
 
                  type: array
 
                  items:
 
                    description: CertificateAdditionalOutputFormat defines an additional output format of a Certificate resource. These contain supplementary data formats of the signed certificate chain and paired private key.
 
                    type: object
 
                    required:
 
                      - type
 
                    properties:
 
                      type:
 
                        description: Type is the name of the format type that should be written to the Certificate's target Secret.
 
                        type: string
 
                        enum:
 
                          - DER
 
                          - CombinedPEM
 
                commonName:
 
                  description: 'CommonName is a common name to be used on the Certificate. The CommonName should have a length of 64 characters or fewer to avoid generating invalid CSRs. This value is ignored by TLS clients when any subject alt name is set. This is x509 behaviour: https://tools.ietf.org/html/rfc6125#section-6.4.4'
 
                  type: string
 
                dnsNames:
 
                  description: DNSNames is a list of DNS subjectAltNames to be set on the Certificate.
 
                  type: array
 
                  items:
 
                    type: string
 
                duration:
 
                  description: The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types. If unset this defaults to 90 days. Certificate will be renewed either 2/3 through its duration or `renewBefore` period before its expiry, whichever is later. Minimum accepted duration is 1 hour. Value must be in units accepted by Go time.ParseDuration https://golang.org/pkg/time/#ParseDuration
 
                  type: string
 
                emailAddresses:
 
                  description: EmailAddresses is a list of email subjectAltNames to be set on the Certificate.
 
                  type: array
 
                  items:
 
                    type: string
 
                encodeUsagesInRequest:
 
                  description: EncodeUsagesInRequest controls whether key usages should be present in the CertificateRequest
 
                  type: boolean
 
                ipAddresses:
 
                  description: IPAddresses is a list of IP address subjectAltNames to be set on the Certificate.
 
                  type: array
 
                  items:
 
                    type: string
 
                isCA:
 
                  description: IsCA will mark this Certificate as valid for certificate signing. This will automatically add the `cert sign` usage to the list of `usages`.
 
                  type: boolean
 
                issuerRef:
 
                  description: IssuerRef is a reference to the issuer for this certificate. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the Certificate will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times.
 
                  type: object
 
                  required:
 
                    - name
 
                  properties:
 
                    group:
 
                      description: Group of the resource being referred to.
 
                      type: string
 
                    kind:
 
                      description: Kind of the resource being referred to.
 
                      type: string
 
                    name:
 
                      description: Name of the resource being referred to.
 
                      type: string
 
                keystores:
 
                  description: Keystores configures additional keystore output formats stored in the `secretName` Secret resource.
 
                  type: object
 
                  properties:
 
                    jks:
 
                      description: JKS configures options for storing a JKS keystore in the `spec.secretName` Secret resource.
 
                      type: object
 
                      required:
 
                        - create
 
                        - passwordSecretRef
 
                      properties:
 
                        create:
 
                          description: Create enables JKS keystore creation for the Certificate. If true, a file named `keystore.jks` will be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef`. The keystore file will only be updated upon re-issuance. A file named `truststore.jks` will also be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef` containing the issuing Certificate Authority
 
                          type: boolean
 
                        passwordSecretRef:
 
                          description: PasswordSecretRef is a reference to a key in a Secret resource containing the password used to encrypt the JKS keystore.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            key:
 
                              description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                              type: string
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                    pkcs12:
 
                      description: PKCS12 configures options for storing a PKCS12 keystore in the `spec.secretName` Secret resource.
 
                      type: object
 
                      required:
 
                        - create
 
                        - passwordSecretRef
 
                      properties:
 
                        create:
 
                          description: Create enables PKCS12 keystore creation for the Certificate. If true, a file named `keystore.p12` will be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef`. The keystore file will only be updated upon re-issuance. A file named `truststore.p12` will also be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef` containing the issuing Certificate Authority
 
                          type: boolean
 
                        passwordSecretRef:
 
                          description: PasswordSecretRef is a reference to a key in a Secret resource containing the password used to encrypt the PKCS12 keystore.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            key:
 
                              description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                              type: string
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                literalSubject:
 
                  description: LiteralSubject is an LDAP formatted string that represents the [X.509 Subject field](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6). Use this *instead* of the Subject field if you need to ensure the correct ordering of the RDN sequence, such as when issuing certs for LDAP authentication. See https://github.com/cert-manager/cert-manager/issues/3203, https://github.com/cert-manager/cert-manager/issues/4424. This field is alpha level and is only supported by cert-manager installations where LiteralCertificateSubject feature gate is enabled on both cert-manager controller and webhook.
 
                  type: string
 
                privateKey:
 
                  description: Options to control private keys used for the Certificate.
 
                  type: object
 
                  properties:
 
                    algorithm:
 
                      description: Algorithm is the private key algorithm of the corresponding private key for this certificate. If provided, allowed values are either `RSA`,`Ed25519` or `ECDSA` If `algorithm` is specified and `size` is not provided, key size of 256 will be used for `ECDSA` key algorithm and key size of 2048 will be used for `RSA` key algorithm. key size is ignored when using the `Ed25519` key algorithm.
 
                      type: string
 
@@ -3961,1462 +3942,384 @@ spec:
 
                  description: SelfSigned configures this issuer to 'self sign' certificates using the private key used to create the CertificateRequest object.
 
                  type: object
 
                  properties:
 
                    crlDistributionPoints:
 
                      description: The CRL distribution points is an X.509 v3 certificate extension which identifies the location of the CRL from which the revocation of this certificate can be checked. If not set certificate will be issued without CDP. Values are strings.
 
                      type: array
 
                      items:
 
                        type: string
 
                vault:
 
                  description: Vault configures this issuer to sign certificates using a HashiCorp Vault PKI backend.
 
                  type: object
 
                  required:
 
                    - auth
 
                    - path
 
                    - server
 
                  properties:
 
                    auth:
 
                      description: Auth configures how cert-manager authenticates with the Vault server.
 
                      type: object
 
                      properties:
 
                        appRole:
 
                          description: AppRole authenticates with Vault using the App Role auth mechanism, with the role and secret stored in a Kubernetes Secret resource.
 
                          type: object
 
                          required:
 
                            - path
 
                            - roleId
 
                            - secretRef
 
                          properties:
 
                            path:
 
                              description: 'Path where the App Role authentication backend is mounted in Vault, e.g: "approle"'
 
                              type: string
 
                            roleId:
 
                              description: RoleID configured in the App Role authentication backend when setting up the authentication backend in Vault.
 
                              type: string
 
                            secretRef:
 
                              description: Reference to a key in a Secret that contains the App Role secret used to authenticate with Vault. The `key` field must be specified and denotes which entry within the Secret resource is used as the app role secret.
 
                              type: object
 
                              required:
 
                                - name
 
                              properties:
 
                                key:
 
                                  description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                                  type: string
 
                                name:
 
                                  description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                                  type: string
 
                        kubernetes:
 
                          description: Kubernetes authenticates with Vault by passing the ServiceAccount token stored in the named Secret resource to the Vault server.
 
                          type: object
 
                          required:
 
                            - role
 
                            - secretRef
 
                          properties:
 
                            mountPath:
 
                              description: The Vault mountPath here is the mount path to use when authenticating with Vault. For example, setting a value to `/v1/auth/foo`, will use the path `/v1/auth/foo/login` to authenticate with Vault. If unspecified, the default value "/v1/auth/kubernetes" will be used.
 
                              type: string
 
                            role:
 
                              description: A required field containing the Vault Role to assume. A Role binds a Kubernetes ServiceAccount with a set of Vault policies.
 
                              type: string
 
                            secretRef:
 
                              description: The required Secret field containing a Kubernetes ServiceAccount JWT used for authenticating with Vault. Use of 'ambient credentials' is not supported.
 
                              type: object
 
                              required:
 
                                - name
 
                              properties:
 
                                key:
 
                                  description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                                  type: string
 
                                name:
 
                                  description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                                  type: string
 
                        tokenSecretRef:
 
                          description: TokenSecretRef authenticates with Vault by presenting a token.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            key:
 
                              description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                              type: string
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                    caBundle:
 
                      description: PEM-encoded CA bundle (base64-encoded) used to validate Vault server certificate. Only used if the Server URL is using HTTPS protocol. This parameter is ignored for plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection.
 
                      type: string
 
                      format: byte
 
                    namespace:
 
                      description: 'Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows Vault environments to support Secure Multi-tenancy. e.g: "ns1" More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces'
 
                      type: string
 
                    path:
 
                      description: 'Path is the mount path of the Vault PKI backend''s `sign` endpoint, e.g: "my_pki_mount/sign/my-role-name".'
 
                      type: string
 
                    server:
 
                      description: 'Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".'
 
                      type: string
 
                venafi:
 
                  description: Venafi configures this issuer to sign certificates using a Venafi TPP or Venafi Cloud policy zone.
 
                  type: object
 
                  required:
 
                    - zone
 
                  properties:
 
                    cloud:
 
                      description: Cloud specifies the Venafi cloud configuration settings. Only one of TPP or Cloud may be specified.
 
                      type: object
 
                      required:
 
                        - apiTokenSecretRef
 
                      properties:
 
                        apiTokenSecretRef:
 
                          description: APITokenSecretRef is a secret key selector for the Venafi Cloud API token.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            key:
 
                              description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                              type: string
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                        url:
 
                          description: URL is the base URL for Venafi Cloud. Defaults to "https://api.venafi.cloud/v1".
 
                          type: string
 
                    tpp:
 
                      description: TPP specifies Trust Protection Platform configuration settings. Only one of TPP or Cloud may be specified.
 
                      type: object
 
                      required:
 
                        - credentialsRef
 
                        - url
 
                      properties:
 
                        caBundle:
 
                          description: CABundle is a PEM encoded TLS certificate to use to verify connections to the TPP instance. If specified, system roots will not be used and the issuing CA for the TPP instance must be verifiable using the provided root. If not specified, the connection will be verified using the cert-manager system root certificates.
 
                          type: string
 
                          format: byte
 
                        credentialsRef:
 
                          description: CredentialsRef is a reference to a Secret containing the username and password for the TPP server. The secret must contain two keys, 'username' and 'password'.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                        url:
 
                          description: 'URL is the base URL for the vedsdk endpoint of the Venafi TPP instance, for example: "https://tpp.example.com/vedsdk".'
 
                          type: string
 
                    zone:
 
                      description: Zone is the Venafi Policy Zone to use for this issuer. All requests made to the Venafi platform will be restricted by the named zone policy. This field is required.
 
                      type: string
 
            status:
 
              description: Status of the Issuer. This is set and managed automatically.
 
              type: object
 
              properties:
 
                acme:
 
                  description: ACME specific status options. This field should only be set if the Issuer is configured to use an ACME server to issue certificates.
 
                  type: object
 
                  properties:
 
                    lastRegisteredEmail:
 
                      description: LastRegisteredEmail is the email associated with the latest registered ACME account, in order to track changes made to registered account associated with the  Issuer
 
                      type: string
 
                    uri:
 
                      description: URI is the unique account identifier, which can also be used to retrieve account details from the CA
 
                      type: string
 
                conditions:
 
                  description: List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready`.
 
                  type: array
 
                  items:
 
                    description: IssuerCondition contains condition information for an Issuer.
 
                    type: object
 
                    required:
 
                      - status
 
                      - type
 
                    properties:
 
                      lastTransitionTime:
 
                        description: LastTransitionTime is the timestamp corresponding to the last status change of this condition.
 
                        type: string
 
                        format: date-time
 
                      message:
 
                        description: Message is a human readable description of the details of the last transition, complementing reason.
 
                        type: string
 
                      observedGeneration:
 
                        description: If set, this represents the .metadata.generation that the condition was set based upon. For instance, if .metadata.generation is currently 12, but the .status.condition[x].observedGeneration is 9, the condition is out of date with respect to the current state of the Issuer.
 
                        type: integer
 
                        format: int64
 
                      reason:
 
                        description: Reason is a brief machine readable explanation for the condition's last transition.
 
                        type: string
 
                      status:
 
                        description: Status of the condition, one of (`True`, `False`, `Unknown`).
 
                        type: string
 
                        enum:
 
                          - "True"
 
                          - "False"
 
                          - Unknown
 
                      type:
 
                        description: Type of the condition, known values are (`Ready`).
 
                        type: string
 
                  x-kubernetes-list-map-keys:
 
                    - type
 
                  x-kubernetes-list-type: map
 
      served: true
 
      storage: true
 
---
 
# Source: cert-manager/templates/crd-templates.yaml
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  name: orders.acme.cert-manager.io
 
  labels:
 
    app: 'cert-manager'
 
    app.kubernetes.io/name: 'cert-manager'
 
    app.kubernetes.io/instance: 'cert-manager'
 
    # Generated labels
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  group: acme.cert-manager.io
 
  names:
 
    kind: Order
 
    listKind: OrderList
 
    plural: orders
 
    singular: order
 
    categories:
 
      - cert-manager
 
      - cert-manager-acme
 
  scope: Namespaced
 
  versions:
 
    - name: v1
 
      subresources:
 
        status: {}
 
      additionalPrinterColumns:
 
        - jsonPath: .status.state
 
          name: State
 
          type: string
 
        - jsonPath: .spec.issuerRef.name
 
          name: Issuer
 
          priority: 1
 
          type: string
 
        - jsonPath: .status.reason
 
          name: Reason
 
          priority: 1
 
          type: string
 
        - jsonPath: .metadata.creationTimestamp
 
          description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
 
          name: Age
 
          type: date
 
      schema:
 
        openAPIV3Schema:
 
          description: Order is a type to represent an Order with an ACME server
 
          type: object
 
          required:
 
            - metadata
 
            - spec
 
          properties:
 
            apiVersion:
 
              description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
              type: string
 
            kind:
 
              description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
              type: string
 
            metadata:
 
              type: object
 
            spec:
 
              type: object
 
              required:
 
                - issuerRef
 
                - request
 
              properties:
 
                commonName:
 
                  description: CommonName is the common name as specified on the DER encoded CSR. If specified, this value must also be present in `dnsNames` or `ipAddresses`. This field must match the corresponding field on the DER encoded CSR.
 
                  type: string
 
                dnsNames:
 
                  description: DNSNames is a list of DNS names that should be included as part of the Order validation process. This field must match the corresponding field on the DER encoded CSR.
 
                  type: array
 
                  items:
 
                    type: string
 
                duration:
 
                  description: Duration is the duration for the not after date for the requested certificate. this is set on order creation as pe the ACME spec.
 
                  type: string
 
                ipAddresses:
 
                  description: IPAddresses is a list of IP addresses that should be included as part of the Order validation process. This field must match the corresponding field on the DER encoded CSR.
 
                  type: array
 
                  items:
 
                    type: string
 
                issuerRef:
 
                  description: IssuerRef references a properly configured ACME-type Issuer which should be used to create this Order. If the Issuer does not exist, processing will be retried. If the Issuer is not an 'ACME' Issuer, an error will be returned and the Order will be marked as failed.
 
                  type: object
 
                  required:
 
                    - name
 
                  properties:
 
                    group:
 
                      description: Group of the resource being referred to.
 
                      type: string
 
                    kind:
 
                      description: Kind of the resource being referred to.
 
                      type: string
 
                    name:
 
                      description: Name of the resource being referred to.
 
                      type: string
 
                request:
 
                  description: Certificate signing request bytes in DER encoding. This will be used when finalizing the order. This field must be set on the order.
 
                  type: string
 
                  format: byte
 
            status:
 
              type: object
 
              properties:
 
                authorizations:
 
                  description: Authorizations contains data returned from the ACME server on what authorizations must be completed in order to validate the DNS names specified on the Order.
 
                  type: array
 
                  items:
 
                    description: ACMEAuthorization contains data returned from the ACME server on an authorization that must be completed in order validate a DNS name on an ACME Order resource.
 
                    type: object
 
                    required:
 
                      - url
 
                    properties:
 
                      challenges:
 
                        description: Challenges specifies the challenge types offered by the ACME server. One of these challenge types will be selected when validating the DNS name and an appropriate Challenge resource will be created to perform the ACME challenge process.
 
                        type: array
 
                        items:
 
                          description: Challenge specifies a challenge offered by the ACME server for an Order. An appropriate Challenge resource can be created to perform the ACME challenge process.
 
                          type: object
 
                          required:
 
                            - token
 
                            - type
 
                            - url
 
                          properties:
 
                            token:
 
                              description: Token is the token that must be presented for this challenge. This is used to compute the 'key' that must also be presented.
 
                              type: string
 
                            type:
 
                              description: Type is the type of challenge being offered, e.g. 'http-01', 'dns-01', 'tls-sni-01', etc. This is the raw value retrieved from the ACME server. Only 'http-01' and 'dns-01' are supported by cert-manager, other values will be ignored.
 
                              type: string
 
                            url:
 
                              description: URL is the URL of this challenge. It can be used to retrieve additional metadata about the Challenge from the ACME server.
 
                              type: string
 
                      identifier:
 
                        description: Identifier is the DNS name to be validated as part of this authorization
 
                        type: string
 
                      initialState:
 
                        description: InitialState is the initial state of the ACME authorization when first fetched from the ACME server. If an Authorization is already 'valid', the Order controller will not create a Challenge resource for the authorization. This will occur when working with an ACME server that enables 'authz reuse' (such as Let's Encrypt's production endpoint). If not set and 'identifier' is set, the state is assumed to be pending and a Challenge will be created.
 
                        type: string
 
                        enum:
 
                          - valid
 
                          - ready
 
                          - pending
 
                          - processing
 
                          - invalid
 
                          - expired
 
                          - errored
 
                      url:
 
                        description: URL is the URL of the Authorization that must be completed
 
                        type: string
 
                      wildcard:
 
                        description: Wildcard will be true if this authorization is for a wildcard DNS name. If this is true, the identifier will be the *non-wildcard* version of the DNS name. For example, if '*.example.com' is the DNS name being validated, this field will be 'true' and the 'identifier' field will be 'example.com'.
 
                        type: boolean
 
                certificate:
 
                  description: Certificate is a copy of the PEM encoded certificate for this Order. This field will be populated after the order has been successfully finalized with the ACME server, and the order has transitioned to the 'valid' state.
 
                  type: string
 
                  format: byte
 
                failureTime:
 
                  description: FailureTime stores the time that this order failed. This is used to influence garbage collection and back-off.
 
                  type: string
 
                  format: date-time
 
                finalizeURL:
 
                  description: FinalizeURL of the Order. This is used to obtain certificates for this order once it has been completed.
 
                  type: string
 
                reason:
 
                  description: Reason optionally provides more information about a why the order is in the current state.
 
                  type: string
 
                state:
 
                  description: State contains the current state of this Order resource. States 'success' and 'expired' are 'final'
 
                  type: string
 
                  enum:
 
                    - valid
 
                    - ready
 
                    - pending
 
                    - processing
 
                    - invalid
 
                    - expired
 
                    - errored
 
                url:
 
                  description: URL of the Order. This will initially be empty when the resource is first created. The Order controller will populate this field when the Order is first processed. This field will be immutable after it is initially set.
 
                  type: string
 
      served: true
 
      storage: true
 
---
 
# Source: cert-manager/templates/cainjector-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
---
 
# Source: cert-manager/templates/serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
---
 
# Source: cert-manager/templates/webhook-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
---
 
# Source: cert-manager/templates/webhook-config.yaml
 
apiVersion: v1
 
kind: ConfigMap
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
data:
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["get", "create", "update", "patch"]
 
  - apiGroups: ["admissionregistration.k8s.io"]
 
    resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiregistration.k8s.io"]
 
    resources: ["apiservices"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiextensions.k8s.io"]
 
    resources: ["customresourcedefinitions"]
 
    verbs: ["get", "list", "watch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Issuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "issuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ClusterIssuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "clusterissuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Certificates controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/finalizers", "certificaterequests/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders"]
 
    verbs: ["create", "delete", "get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete", "patch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Orders controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "orders/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "challenges"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["create", "delete"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Challenges controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  # Use to update challenge resource status
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "challenges/status"]
 
    verbs: ["update", "patch"]
 
  # Used to watch challenge resources
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to watch challenges, issuer and clusterissuer resources
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  # Need to be able to retrieve ACME account private key to complete challenges
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to create events
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
  # HTTP01 rules
 
  - apiGroups: [""]
 
    resources: ["pods", "services"]
 
    verbs: ["get", "list", "watch", "create", "delete"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  - apiGroups: [ "gateway.networking.k8s.io" ]
 
    resources: [ "httproutes" ]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  # We require the ability to specify a custom hostname when we are creating
 
  # new ingress resources.
 
  # See: https://github.com/openshift/origin/blob/21f191775636f9acadb44fa42beeb4f75b255532/pkg/route/apiserver/admission/ingress_admission.go#L84-L148
 
  - apiGroups: ["route.openshift.io"]
 
    resources: ["routes/custom-host"]
 
    verbs: ["create"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges/finalizers"]
 
    verbs: ["update"]
 
  # DNS01 rules (duplicated above)
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ingress-shim controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests"]
 
    verbs: ["create", "update", "delete"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways", "httproutes"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways/finalizers", "httproutes/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-view
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
    rbac.authorization.k8s.io/aggregate-to-view: "true"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-edit
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/status"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to approve CertificateRequests referencing cert-manager.io Issuers and ClusterIssuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["signers"]
 
    verbs: ["approve"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to:
 
# - Update and sign CertificatSigningeRequests referencing cert-manager.io Issuers and ClusterIssuers
 
# - Perform SubjectAccessReviews to test whether users are able to reference Namespaced Issuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["signers"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
    verbs: ["sign"]
 
  - apiGroups: ["authorization.k8s.io"]
 
    resources: ["subjectaccessreviews"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
- apiGroups: ["authorization.k8s.io"]
 
  resources: ["subjectaccessreviews"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-cainjector
 
subjects:
 
  - name: cert-manager-cainjector
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-issuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-clusterissuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificates
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-orders
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-challenges
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-ingress-shim
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-approve:cert-manager-io
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificatesigningrequests
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-webhook:subjectaccessreviews
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# leader election rules
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  # Used for leader election by the controller
 
  # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
 
  #   see cmd/cainjector/start.go#L113
 
  # cert-manager-cainjector-leader-election-core is used by the SecretBased injector controller
 
  #   see cmd/cainjector/start.go#L137
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-cainjector-leader-election", "cert-manager-cainjector-leader-election-core"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-controller"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  resourceNames:
 
  - 'cert-manager-webhook-ca'
 
  verbs: ["get", "list", "watch", "update"]
 
# It's not possible to grant CREATE permission on a single resourceName.
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-cainjector:leaderelection
 
subjects:
 
  - kind: ServiceAccount
 
    name: cert-manager-cainjector
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager:leaderelection
 
subjects:
 
  - apiGroup: ""
 
    kind: ServiceAccount
 
    name: cert-manager
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-webhook:dynamic-serving
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
 
# Source: cert-manager/templates/service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - protocol: TCP
 
    port: 9402
 
    name: tcp-prometheus-servicemonitor
 
    targetPort: 9402
 
  selector:
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
---
 
# Source: cert-manager/templates/webhook-service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - name: https
 
    port: 443
 
    protocol: TCP
 
    targetPort: "https"
 
  selector:
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
---
 
# Source: cert-manager/templates/cainjector-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cainjector
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "cainjector"
 
  template:
 
    metadata:
 
      labels:
 
        app: cainjector
 
        app.kubernetes.io/name: cainjector
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "cainjector"
 
        app.kubernetes.io/version: "v1.9.1"
 
    spec:
 
      serviceAccountName: cert-manager-cainjector
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-cainjector:v1.9.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --leader-election-namespace=kube-system
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cert-manager
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "controller"
 
  template:
 
    metadata:
 
      labels:
 
        app: cert-manager
 
        app.kubernetes.io/name: cert-manager
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "controller"
 
        app.kubernetes.io/version: "v1.9.1"
 
      annotations:
 
        prometheus.io/path: "/metrics"
 
        prometheus.io/scrape: 'true'
 
        prometheus.io/port: '9402'
 
    spec:
 
      serviceAccountName: cert-manager
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-controller:v1.9.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --cluster-resource-namespace=$(POD_NAMESPACE)
 
          - --leader-election-namespace=kube-system
 
          ports:
 
          - containerPort: 9402
 
            name: http-metrics
 
            protocol: TCP
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: webhook
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "webhook"
 
  template:
 
    metadata:
 
      labels:
 
        app: webhook
 
        app.kubernetes.io/name: webhook
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "webhook"
 
        app.kubernetes.io/version: "v1.9.1"
 
    spec:
 
      serviceAccountName: cert-manager-webhook
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-webhook:v1.9.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --secure-port=10250
 
          - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
 
          - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
 
          - --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
 
          ports:
 
          - name: https
 
            protocol: TCP
 
            containerPort: 10250
 
          livenessProbe:
 
            httpGet:
 
              path: /livez
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 60
 
            periodSeconds: 10
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          readinessProbe:
 
            httpGet:
 
              path: /healthz
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 5
 
            periodSeconds: 5
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-mutating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: MutatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    # Only include 'sideEffects' field in Kubernetes 1.12+
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /mutate
 
---
 
# Source: cert-manager/templates/webhook-validating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: ValidatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    namespaceSelector:
 
      matchExpressions:
 
      - key: "cert-manager.io/disable-validation"
 
        operator: "NotIn"
 
        values:
 
        - "true"
 
      - key: "name"
 
        operator: "NotIn"
 
        values:
 
        - cert-manager
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /validate
00-defs/49-cert-manager-roles.yaml
Show inline comments
 
new file 100644
 

	
 
apiVersion: v1
 
kind: Namespace
 
metadata:
 
  name: cert-manager
 
---
 
# Source: cert-manager/templates/cainjector-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
---
 
# Source: cert-manager/templates/serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
---
 
# Source: cert-manager/templates/webhook-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["get", "create", "update", "patch"]
 
  - apiGroups: ["admissionregistration.k8s.io"]
 
    resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiregistration.k8s.io"]
 
    resources: ["apiservices"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiextensions.k8s.io"]
 
    resources: ["customresourcedefinitions"]
 
    verbs: ["get", "list", "watch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Issuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "issuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ClusterIssuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "clusterissuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Certificates controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/finalizers", "certificaterequests/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders"]
 
    verbs: ["create", "delete", "get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete", "patch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Orders controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "orders/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "challenges"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["create", "delete"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Challenges controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  # Use to update challenge resource status
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "challenges/status"]
 
    verbs: ["update", "patch"]
 
  # Used to watch challenge resources
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to watch challenges, issuer and clusterissuer resources
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  # Need to be able to retrieve ACME account private key to complete challenges
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to create events
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
  # HTTP01 rules
 
  - apiGroups: [""]
 
    resources: ["pods", "services"]
 
    verbs: ["get", "list", "watch", "create", "delete"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  - apiGroups: [ "gateway.networking.k8s.io" ]
 
    resources: [ "httproutes" ]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  # We require the ability to specify a custom hostname when we are creating
 
  # new ingress resources.
 
  # See: https://github.com/openshift/origin/blob/21f191775636f9acadb44fa42beeb4f75b255532/pkg/route/apiserver/admission/ingress_admission.go#L84-L148
 
  - apiGroups: ["route.openshift.io"]
 
    resources: ["routes/custom-host"]
 
    verbs: ["create"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges/finalizers"]
 
    verbs: ["update"]
 
  # DNS01 rules (duplicated above)
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ingress-shim controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests"]
 
    verbs: ["create", "update", "delete"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways", "httproutes"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways/finalizers", "httproutes/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-view
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
    rbac.authorization.k8s.io/aggregate-to-view: "true"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-edit
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/status"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to approve CertificateRequests referencing cert-manager.io Issuers and ClusterIssuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["signers"]
 
    verbs: ["approve"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to:
 
# - Update and sign CertificatSigningeRequests referencing cert-manager.io Issuers and ClusterIssuers
 
# - Perform SubjectAccessReviews to test whether users are able to reference Namespaced Issuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["signers"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
    verbs: ["sign"]
 
  - apiGroups: ["authorization.k8s.io"]
 
    resources: ["subjectaccessreviews"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
- apiGroups: ["authorization.k8s.io"]
 
  resources: ["subjectaccessreviews"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-cainjector
 
subjects:
 
  - name: cert-manager-cainjector
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-issuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-clusterissuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificates
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-orders
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-challenges
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-ingress-shim
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-approve:cert-manager-io
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificatesigningrequests
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-webhook:subjectaccessreviews
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# leader election rules
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  # Used for leader election by the controller
 
  # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
 
  #   see cmd/cainjector/start.go#L113
 
  # cert-manager-cainjector-leader-election-core is used by the SecretBased injector controller
 
  #   see cmd/cainjector/start.go#L137
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-cainjector-leader-election", "cert-manager-cainjector-leader-election-core"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-controller"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  resourceNames:
 
  - 'cert-manager-webhook-ca'
 
  verbs: ["get", "list", "watch", "update"]
 
# It's not possible to grant CREATE permission on a single resourceName.
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-cainjector:leaderelection
 
subjects:
 
  - kind: ServiceAccount
 
    name: cert-manager-cainjector
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager:leaderelection
 
subjects:
 
  - apiGroup: ""
 
    kind: ServiceAccount
 
    name: cert-manager
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-webhook:dynamic-serving
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
10-vols/claims.yaml
Show inline comments
 
new file 100644
 
apiVersion: v1
 
kind: PersistentVolumeClaim
 
metadata:
 
  namespace: pomerium
 
  name: autocert-data
 
spec:
 
  storageClassName: ""
 
  volumeName: "autocert-data"
 
  accessModes:
 
    - ReadWriteOnce
 
  resources:
 
    requests:
 
      storage: 5Gi
 
      
 
\ No newline at end of file
10-vols/volumes.yaml
Show inline comments
 
file renamed from kube/03-volumes.yaml to 10-vols/volumes.yaml
20-kube/10-pom-pom.yaml
Show inline comments
 
file renamed from kube/10-pomerium.yaml to 20-kube/10-pom-pom.yaml
20-kube/20-pom-deploy.yaml
Show inline comments
 
file renamed from kube/20-deployment.yaml to 20-kube/20-pom-deploy.yaml
20-kube/21-pom-svc.yaml
Show inline comments
 
new file 100644
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  labels:
 
    app.kubernetes.io/name: pomerium
 
  name: pomerium-metrics
 
  namespace: pomerium
 
spec:
 
  ports:
 
    - { name: metrics, port: 9090, protocol: TCP, targetPort: metrics }
 
  selector: { app.kubernetes.io/name: pomerium }
 
  type: ClusterIP
 
---
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  labels:
 
    app.kubernetes.io/name: pomerium
 
  name: pomerium-proxy
 
  namespace: pomerium
 
spec:
 
  ports:
 
    - { name: https, port: 443, protocol: TCP, targetPort: https }
 
    - { name: http, port: 80, protocol: TCP, targetPort: http }
 
  selector: { app.kubernetes.io/name: pomerium }
 
  type: LoadBalancer
 
  externalIPs:
 
  # prime forwards to this
 
    - 10.5.0.1
 
  # local dns picks this
 
    - 10.2.0.1
 
\ No newline at end of file
30-cert-manager/50-cert-manager.yaml
Show inline comments
 
new file 100644
 
# Copyright 2021 The cert-manager Authors.
 
#
 
# Licensed under the Apache License, Version 2.0 (the "License");
 
# you may not use this file except in compliance with the License.
 
# You may obtain a copy of the License at
 
#
 
#     http://www.apache.org/licenses/LICENSE-2.0
 
#
 
# Unless required by applicable law or agreed to in writing, software
 
# distributed under the License is distributed on an "AS IS" BASIS,
 
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 
# See the License for the specific language governing permissions and
 
# limitations under the License.
 
# Source: cert-manager/templates/webhook-config.yaml
 
apiVersion: v1
 
kind: ConfigMap
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
data:
 
---
 
# Source: cert-manager/templates/service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - protocol: TCP
 
    port: 9402
 
    name: tcp-prometheus-servicemonitor
 
    targetPort: 9402
 
  selector:
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
---
 
# Source: cert-manager/templates/webhook-service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - name: https
 
    port: 443
 
    protocol: TCP
 
    targetPort: "https"
 
  selector:
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
---
 
# Source: cert-manager/templates/cainjector-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cainjector
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "cainjector"
 
  template:
 
    metadata:
 
      labels:
 
        app: cainjector
 
        app.kubernetes.io/name: cainjector
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "cainjector"
 
        app.kubernetes.io/version: "v1.10.1"
 
    spec:
 
      serviceAccountName: cert-manager-cainjector
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-cainjector:v1.10.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --leader-election-namespace=kube-system
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cert-manager
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "controller"
 
  template:
 
    metadata:
 
      labels:
 
        app: cert-manager
 
        app.kubernetes.io/name: cert-manager
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "controller"
 
        app.kubernetes.io/version: "v1.10.1"
 
      annotations:
 
        prometheus.io/path: "/metrics"
 
        prometheus.io/scrape: 'true'
 
        prometheus.io/port: '9402'
 
    spec:
 
      serviceAccountName: cert-manager
 
      securityContext:
 
        runAsNonRoot: true
 
      # https://github.com/cert-manager/cert-manager/issues/4941#issuecomment-1189160798
 
      dnsPolicy: None
 
      dnsConfig:
 
        nameservers:
 
          - 8.8.4.4
 
          - 8.8.8.8
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-controller:v1.10.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --cluster-resource-namespace=$(POD_NAMESPACE)
 
          - --leader-election-namespace=kube-system
 
          ports:
 
          - containerPort: 9402
 
            name: http-metrics
 
            protocol: TCP
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: webhook
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "webhook"
 
  template:
 
    metadata:
 
      labels:
 
        app: webhook
 
        app.kubernetes.io/name: webhook
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "webhook"
 
        app.kubernetes.io/version: "v1.10.1"
 
    spec:
 
      serviceAccountName: cert-manager-webhook
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-webhook:v1.10.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --secure-port=10250
 
          - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
 
          - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
 
          - --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
 
          ports:
 
          - name: https
 
            protocol: TCP
 
            containerPort: 10250
 
          livenessProbe:
 
            httpGet:
 
              path: /livez
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 60
 
            periodSeconds: 10
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          readinessProbe:
 
            httpGet:
 
              path: /healthz
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 5
 
            periodSeconds: 5
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-mutating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: MutatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    # Only include 'sideEffects' field in Kubernetes 1.12+
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /mutate
 
---
 
# Source: cert-manager/templates/webhook-validating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: ValidatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    namespaceSelector:
 
      matchExpressions:
 
      - key: "cert-manager.io/disable-validation"
 
        operator: "NotIn"
 
        values:
 
        - "true"
 
      - key: "name"
 
        operator: "NotIn"
 
        values:
 
        - cert-manager
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /validate
30-cert-manager/51-pomerium-production-issuer.yaml
Show inline comments
 
file renamed from kube/51-pomerium-production-issuer.yaml to 30-cert-manager/51-pomerium-production-issuer.yaml
30-cert-manager/51-pomerium-staging-issuer.yaml
Show inline comments
 
file renamed from kube/51-pomerium-staging-issuer.yaml to 30-cert-manager/51-pomerium-staging-issuer.yaml
30-cert-manager/60-auth-cert.yaml
Show inline comments
 
file renamed from auth-cert.yaml to 30-cert-manager/60-auth-cert.yaml

Changeset was too big and was cut off... Show full diff anyway

0 comments (0 inline, 0 general)