Changeset - 0ae82df13719
[Not reviewed]
default
9 0 15
drewp@bigasterisk.com - 22 months ago 2022-12-13 07:15:13
drewp@bigasterisk.com
renames and file splits, mostly
13 files changed:
0 comments (0 inline, 0 general)
00-defs/00-namespace.yaml
Show inline comments
 
file renamed from kube/00-namespace.yaml to 00-defs/00-namespace.yaml
00-defs/01-crd.yaml
Show inline comments
 
new file 100644
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  annotations:
 
    controller-gen.kubebuilder.io/version: v0.9.0
 
  creationTimestamp: null
 
  labels:
 
    app.kubernetes.io/name: pomerium
 
  name: pomerium.ingress.pomerium.io
 
spec:
 
  group: ingress.pomerium.io
 
  names:
 
    kind: Pomerium
 
    listKind: PomeriumList
 
    plural: pomerium
 
    singular: pomerium
 
  scope: Cluster
 
  versions:
 
  - name: v1
 
    schema:
 
      openAPIV3Schema:
 
        description: Pomerium define runtime-configurable Pomerium settings that do
 
          not fall into the category of deployment parameters
 
        properties:
 
          apiVersion:
 
            description: 'APIVersion defines the versioned schema of this representation
 
              of an object. Servers should convert recognized schemas to the latest
 
              internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
            type: string
 
          kind:
 
            description: 'Kind is a string value representing the REST resource this
 
              object represents. Servers may infer this from the endpoint the client
 
              submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
            type: string
 
          metadata:
 
            type: object
 
          spec:
 
            description: PomeriumSpec defines Pomerium-specific configuration parameters.
 
            properties:
 
              authenticate:
 
                description: Authenticate sets authenticate service parameters
 
                properties:
 
                  callbackPath:
 
                    description: "CallbackPath sets the path at which the authenticate
 
                      service receives callback responses from your identity provider.
 
                      The value must exactly match one of the authorized redirect
 
                      URIs for the OAuth 2.0 client. \n <p>This value is referred
 
                      to as the redirect_url in the OpenIDConnect and OAuth2 specs.</p>
 
                      <p>Defaults to <code>/oauth2/callback</code></p>"
 
                    type: string
 
                  url:
 
                    description: "AuthenticateURL is a dedicated domain URL the non-authenticated
 
                      persons would be referred to. \n <p><ul> <li>You do not need
 
                      to create a dedicated <code>Ingress</code> for this virtual
 
                      route, as it is handled by Pomerium internally. </li> <li>You
 
                      do need create a secret with corresponding TLS certificate for
 
                      this route and reference it via <a href=\"#prop-certificates\"><code>certificates</code></a>.
 
                      If you use <code>cert-manager</code> with <code>HTTP01</code>
 
                      challenge, you may use <code>pomerium</code> <code>ingressClass</code>
 
                      to solve it.</li> </ul></p>"
 
                    format: uri
 
                    pattern: ^https://
 
                    type: string
 
                required:
 
                - url
 
                type: object
 
              certificates:
 
                description: Certificates is a list of secrets of type TLS to use
 
                format: namespace/name
 
                items:
 
                  type: string
 
                type: array
 
              cookie:
 
                description: Cookie defines Pomerium session cookie options.
 
                properties:
 
                  domain:
 
                    description: Domain defaults to the same host that set the cookie.
 
                      If you specify the domain explicitly, then subdomains would
 
                      also be included.
 
                    type: string
 
                  expire:
 
                    description: Expire sets cookie and Pomerium session expiration
 
                      time. Once session expires, users would have to re-login. If
 
                      you change this parameter, existing sessions are not affected.
 
                      <p>See <a href="https://www.pomerium.com/docs/enterprise/about#session-management">Session
 
                      Management</a> (Enterprise) for a more fine-grained session
 
                      controls.</p> <p>Defaults to 14 hours.</p>
 
                    format: duration
 
                    type: string
 
                  httpOnly:
 
                    description: HTTPOnly if set to <code>false</code>, the cookie
 
                      would be accessible from within the JavaScript. Defaults to
 
                      <code>true</code>.
 
                    type: boolean
 
                  name:
 
                    description: Name sets the Pomerium session cookie name. Defaults
 
                      to <code>_pomerium</code>
 
                    type: string
 
                  secure:
 
                    description: Secure if set to false, would make a cookie accessible
 
                      over insecure protocols (HTTP). Defaults to <code>true</code>.
 
                    type: boolean
 
                type: object
 
              identityProvider:
 
                description: IdentityProvider configure single-sign-on authentication
 
                  and user identity details by integrating with your <a href="https://www.pomerium.com/docs/identity-providers/">Identity
 
                  Provider</a>
 
                properties:
 
                  provider:
 
                    description: Provider is the short-hand name of a built-in OpenID
 
                      Connect (oidc) identity provider to be used for authentication.
 
                      To use a generic provider, set to <code>oidc</code>.
 
                    enum:
 
                    - auth0
 
                    - azure
 
                    - google
 
                    - okta
 
                    - onelogin
 
                    - oidc
 
                    - ping
 
                    - github
 
                    type: string
 
                  refreshDirectory:
 
                    description: RefreshDirectory is no longer supported, please see
 
                      <a href="https://docs.pomerium.com/docs/overview/upgrading#idp-directory-sync">Upgrade
 
                      Guide</a>.
 
                    properties:
 
                      interval:
 
                        description: interval is the time that pomerium will sync
 
                          your IDP directory.
 
                        format: duration
 
                        type: string
 
                      timeout:
 
                        description: timeout is the maximum time allowed each run.
 
                        format: duration
 
                        type: string
 
                    required:
 
                    - interval
 
                    - timeout
 
                    type: object
 
                  requestParams:
 
                    additionalProperties:
 
                      type: string
 
                    description: RequestParams to be added as part of a signin request
 
                      using OAuth2 code flow.
 
                    format: namespace/name
 
                    type: object
 
                  requestParamsSecret:
 
                    description: RequestParamsSecret is a reference to a secret for
 
                      additional parameters you'd prefer not to provide in plaintext.
 
                    format: namespace/name
 
                    type: string
 
                  scopes:
 
                    description: Scopes Identity provider scopes correspond to access
 
                      privilege scopes as defined in Section 3.3 of OAuth 2.0 RFC6749.
 
                    items:
 
                      type: string
 
                    type: array
 
                  secret:
 
                    description: Secret containing IdP provider specific parameters.
 
                      and must contain at least <code>client_id</code> and <code>client_secret</code>
 
                      values.
 
                    format: namespace/name
 
                    minLength: 1
 
                    type: string
 
                  serviceAccountFromSecret:
 
                    description: ServiceAccountFromSecret is no longer supported,
 
                      see <a href="https://docs.pomerium.com/docs/overview/upgrading#idp-directory-sync">Upgrade
 
                      Guide</a>.
 
                    type: string
 
                  url:
 
                    description: URL is the base path to an identity provider's OpenID
 
                      connect discovery document. See <a href="https://pomerium.com/docs/identity-providers">Identity
 
                      Providers</a> guides for details.
 
                    format: uri
 
                    pattern: ^https://
 
                    type: string
 
                required:
 
                - provider
 
                - secret
 
                type: object
 
              jwtClaimHeaders:
 
                additionalProperties:
 
                  type: string
 
                description: JWTClaimHeaders convert claims from the assertion token
 
                  into HTTP headers and adds them into JWT assertion header. Please
 
                  make sure to read <a href="https://www.pomerium.com/docs/topics/getting-users-identity">
 
                  Getting User Identity</a> guide.
 
                type: object
 
              secrets:
 
                description: "Secrets references a Secret with Pomerium bootstrap
 
                  parameters. \n <p> <ul> <li><a href=\"https://pomerium.com/docs/reference/shared-secret\"><code>shared_secret</code></a>
 
                  - secures inter-Pomerium service communications. </li> <li><a href=\"https://pomerium.com/docs/reference/cookie-secret\"><code>cookie_secret</code></a>
 
                  - encrypts Pomerium session browser cookie. See also other <a href=\"#cookie\">Cookie</a>
 
                  parameters. </li> <li><a href=\"https://pomerium.com/docs/reference/signing-key\"><code>signing_key</code></a>
 
                  signs Pomerium JWT assertion header. See <a href=\"https://www.pomerium.com/docs/topics/getting-users-identity\">Getting
 
                  the user's identity</a> guide. </li> </ul> </p> <p> In a default
 
                  Pomerium installation manifest, they would be generated via a <a
 
                  href=\"https://github.com/pomerium/ingress-controller/blob/main/config/gen_secrets/job.yaml\">one-time
 
                  job</a> and stored in a <code>pomerium/bootstrap</code> Secret.
 
                  You may re-run the job to rotate the secrets, or update the Secret
 
                  values manually. </p>"
 
                format: namespace/name
 
                minLength: 1
 
                type: string
 
              storage:
 
                description: Storage defines persistent storage for sessions and other
 
                  data. See <a href="https://www.pomerium.com/docs/topics/data-storage">Storage</a>
 
                  for details. If no storage is specified, Pomerium would use a transient
 
                  in-memory storage (not recommended for production).
 
                properties:
 
                  postgres:
 
                    description: Postgres specifies PostgreSQL database connection
 
                      parameters
 
                    properties:
 
                      caSecret:
 
                        description: CASecret should refer to a k8s secret with key
 
                          <code>ca.crt</code> containing CA certificate that, if specified,
 
                          would be used to populate <code>sslrootcert</code> parameter
 
                          of the connection string.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      secret:
 
                        description: Secret specifies a name of a Secret that must
 
                          contain <code>connection</code> key. See <a href="https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-CONNSTRING">DSN
 
                          Format and Parameters</a>. Do not set <code>sslrootcert</code>,
 
                          <code>sslcert</code> and <code>sslkey</code> via connection
 
                          string, use <code>tlsCecret</code> and <code>caSecret</code>
 
                          CRD options instead.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      tlsSecret:
 
                        description: TLSSecret should refer to a k8s secret of type
 
                          <code>kubernetes.io/tls</code> and allows to specify an
 
                          optional client certificate and key, by constructing <code>sslcert</code>
 
                          and <code>sslkey</code> connection string <a href="https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-PARAMKEYWORDS">
 
                          parameter values</a>.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                    required:
 
                    - secret
 
                    type: object
 
                  redis:
 
                    description: Redis defines REDIS connection parameters
 
                    properties:
 
                      caSecret:
 
                        description: CASecret should refer to a k8s secret with key
 
                          <code>ca.crt</code> that must be a PEM-encoded certificate
 
                          authority to use when connecting to the databroker storage
 
                          engine.
 
                        format: namespace/name
 
                        type: string
 
                      secret:
 
                        description: Secret specifies a name of a Secret that must
 
                          contain <code>connection</code> key.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      tlsSecret:
 
                        description: TLSSecret should refer to a k8s secret of type
 
                          <code>kubernetes.io/tls</code> that would be used to perform
 
                          TLS connection to REDIS.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      tlsSkipVerify:
 
                        description: TLSSkipVerify disables TLS certificate chain
 
                          validation.
 
                        type: boolean
 
                    required:
 
                    - secret
 
                    type: object
 
                type: object
 
            required:
 
            - authenticate
 
            - identityProvider
 
            - secrets
 
            type: object
 
          status:
 
            description: PomeriumStatus represents configuration and Ingress status.
 
            properties:
 
              ingress:
 
                additionalProperties:
 
                  description: ResourceStatus represents the outcome of the latest
 
                    attempt to reconcile relevant Kubernetes resource with Pomerium.
 
                  properties:
 
                    error:
 
                      description: Error that prevented latest observedGeneration
 
                        to be synchronized with Pomerium.
 
                      type: string
 
                    observedAt:
 
                      description: ObservedAt is when last reconciliation attempt
 
                        was made.
 
                      format: date-time
 
                      type: string
 
                    observedGeneration:
 
                      description: ObservedGeneration represents the <code>.metadata.generation</code>
 
                        that was last presented to Pomerium.
 
                      format: int64
 
                      type: integer
 
                    reconciled:
 
                      description: Reconciled is whether this object generation was
 
                        successfully synced with pomerium.
 
                      type: boolean
 
                    warnings:
 
                      description: Warnings while parsing the resource.
 
                      items:
 
                        type: string
 
                      type: array
 
                  required:
 
                  - reconciled
 
                  type: object
 
                description: Routes provide per-Ingress status.
 
                type: object
 
              settingsStatus:
 
                description: SettingsStatus represent most recent main configuration
 
                  reconciliation status.
 
                properties:
 
                  error:
 
                    description: Error that prevented latest observedGeneration to
 
                      be synchronized with Pomerium.
 
                    type: string
 
                  observedAt:
 
                    description: ObservedAt is when last reconciliation attempt was
 
                      made.
 
                    format: date-time
 
                    type: string
 
                  observedGeneration:
 
                    description: ObservedGeneration represents the <code>.metadata.generation</code>
 
                      that was last presented to Pomerium.
 
                    format: int64
 
                    type: integer
 
                  reconciled:
 
                    description: Reconciled is whether this object generation was
 
                      successfully synced with pomerium.
 
                    type: boolean
 
                  warnings:
 
                    description: Warnings while parsing the resource.
 
                    items:
 
                      type: string
 
                    type: array
 
                required:
 
                - reconciled
 
                type: object
 
            type: object
 
        type: object
 
    served: true
 
    storage: true
 
    subresources:
 
      status: {}
00-defs/49-cert-manager-crd.yaml
Show inline comments
 
file renamed from kube/50-cert-manager.yaml to 00-defs/49-cert-manager-crd.yaml
 
# Copyright 2021 The cert-manager Authors.
 
#
 
# Licensed under the Apache License, Version 2.0 (the "License");
 
# you may not use this file except in compliance with the License.
 
# You may obtain a copy of the License at
 
#
 
#     http://www.apache.org/licenses/LICENSE-2.0
 
#
 
# Unless required by applicable law or agreed to in writing, software
 
# distributed under the License is distributed on an "AS IS" BASIS,
 
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 
# See the License for the specific language governing permissions and
 
# limitations under the License.
 

	
 
apiVersion: v1
 
kind: Namespace
 
metadata:
 
  name: cert-manager
 
---
 
# Source: cert-manager/templates/crd-templates.yaml
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  name: certificaterequests.cert-manager.io
 
  labels:
 
    app: 'cert-manager'
 
    app.kubernetes.io/name: 'cert-manager'
 
    app.kubernetes.io/instance: 'cert-manager'
 
    # Generated labels
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  group: cert-manager.io
 
  names:
 
    kind: CertificateRequest
 
    listKind: CertificateRequestList
 
    plural: certificaterequests
 
    shortNames:
 
      - cr
 
      - crs
 
    singular: certificaterequest
 
    categories:
 
      - cert-manager
 
  scope: Namespaced
 
  versions:
 
    - name: v1
 
      subresources:
 
        status: {}
 
      additionalPrinterColumns:
 
        - jsonPath: .status.conditions[?(@.type=="Approved")].status
 
          name: Approved
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Denied")].status
 
          name: Denied
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].status
 
          name: Ready
 
          type: string
 
        - jsonPath: .spec.issuerRef.name
 
          name: Issuer
 
          type: string
 
        - jsonPath: .spec.username
 
          name: Requestor
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].message
 
          name: Status
 
          priority: 1
 
          type: string
 
        - jsonPath: .metadata.creationTimestamp
 
          description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
 
          name: Age
 
          type: date
 
      schema:
 
        openAPIV3Schema:
 
          description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used."
 
          type: object
 
          required:
 
            - spec
 
          properties:
 
            apiVersion:
 
              description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
              type: string
 
            kind:
 
              description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
              type: string
 
            metadata:
 
              type: object
 
            spec:
 
              description: Desired state of the CertificateRequest resource.
 
              type: object
 
              required:
 
                - issuerRef
 
                - request
 
              properties:
 
                duration:
 
                  description: The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types.
 
                  type: string
 
                extra:
 
                  description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: object
 
                  additionalProperties:
 
                    type: array
 
                    items:
 
                      type: string
 
                groups:
 
                  description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: array
 
                  items:
 
                    type: string
 
                  x-kubernetes-list-type: atomic
 
                isCA:
 
                  description: IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`.
 
                  type: boolean
 
                issuerRef:
 
                  description: IssuerRef is a reference to the issuer for this CertificateRequest.  If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used.  If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty.
 
                  type: object
 
                  required:
 
                    - name
 
                  properties:
 
                    group:
 
                      description: Group of the resource being referred to.
 
                      type: string
 
                    kind:
 
                      description: Kind of the resource being referred to.
 
                      type: string
 
                    name:
 
                      description: Name of the resource being referred to.
 
                      type: string
 
                request:
 
                  description: The PEM-encoded x509 certificate signing request to be submitted to the CA for signing.
 
                  type: string
 
                  format: byte
 
                uid:
 
                  description: UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: string
 
                usages:
 
                  description: Usages is the set of x509 usages that are requested for the certificate. If usages are set they SHOULD be encoded inside the CSR spec Defaults to `digital signature` and `key encipherment` if not specified.
 
                  type: array
 
                  items:
 
                    description: 'KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: "signing", "digital signature", "content commitment", "key encipherment", "key agreement", "data encipherment", "cert sign", "crl sign", "encipher only", "decipher only", "any", "server auth", "client auth", "code signing", "email protection", "s/mime", "ipsec end system", "ipsec tunnel", "ipsec user", "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"'
 
                    type: string
 
                    enum:
 
                      - signing
 
                      - digital signature
 
                      - content commitment
 
                      - key encipherment
 
                      - key agreement
 
                      - data encipherment
 
                      - cert sign
 
                      - crl sign
 
                      - encipher only
 
                      - decipher only
 
                      - any
 
                      - server auth
 
                      - client auth
 
                      - code signing
 
                      - email protection
 
                      - s/mime
 
                      - ipsec end system
 
                      - ipsec tunnel
 
                      - ipsec user
 
                      - timestamping
 
                      - ocsp signing
 
                      - microsoft sgc
 
                      - netscape sgc
 
                username:
 
                  description: Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: string
 
            status:
 
              description: Status of the CertificateRequest. This is set and managed automatically.
 
              type: object
 
              properties:
 
                ca:
 
                  description: The PEM encoded x509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available.
 
                  type: string
 
                  format: byte
 
                certificate:
 
                  description: The PEM encoded x509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field.
 
                  type: string
 
                  format: byte
 
                conditions:
 
                  description: List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready` and `InvalidRequest`.
 
                  type: array
 
                  items:
 
                    description: CertificateRequestCondition contains condition information for a CertificateRequest.
 
                    type: object
 
                    required:
 
                      - status
 
                      - type
 
                    properties:
 
                      lastTransitionTime:
 
                        description: LastTransitionTime is the timestamp corresponding to the last status change of this condition.
 
                        type: string
 
                        format: date-time
 
                      message:
 
                        description: Message is a human readable description of the details of the last transition, complementing reason.
 
                        type: string
 
                      reason:
 
                        description: Reason is a brief machine readable explanation for the condition's last transition.
 
                        type: string
 
                      status:
 
                        description: Status of the condition, one of (`True`, `False`, `Unknown`).
 
                        type: string
 
                        enum:
 
                          - "True"
 
                          - "False"
 
                          - Unknown
 
                      type:
 
                        description: Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`).
 
                        type: string
 
                  x-kubernetes-list-map-keys:
 
                    - type
 
                  x-kubernetes-list-type: map
 
                failureTime:
 
                  description: FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off.
 
                  type: string
 
                  format: date-time
 
      served: true
 
      storage: true
 
---
 
# Source: cert-manager/templates/crd-templates.yaml
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  name: certificates.cert-manager.io
 
  labels:
 
    app: 'cert-manager'
 
    app.kubernetes.io/name: 'cert-manager'
 
    app.kubernetes.io/instance: 'cert-manager'
 
    # Generated labels
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  group: cert-manager.io
 
  names:
 
    kind: Certificate
 
    listKind: CertificateList
 
    plural: certificates
 
    shortNames:
 
      - cert
 
      - certs
 
    singular: certificate
 
    categories:
 
      - cert-manager
 
  scope: Namespaced
 
  versions:
 
    - name: v1
 
      subresources:
 
        status: {}
 
      additionalPrinterColumns:
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].status
 
          name: Ready
 
          type: string
 
        - jsonPath: .spec.secretName
 
          name: Secret
 
          type: string
 
        - jsonPath: .spec.issuerRef.name
 
          name: Issuer
 
          priority: 1
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].message
 
          name: Status
 
          priority: 1
 
          type: string
 
        - jsonPath: .metadata.creationTimestamp
 
          description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
 
          name: Age
 
          type: date
 
      schema:
 
        openAPIV3Schema:
 
          description: "A Certificate resource should be created to ensure an up to date and signed x509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`. \n The stored certificate will be renewed before it expires (as configured by `spec.renewBefore`)."
 
          type: object
 
          required:
 
            - spec
 
          properties:
 
            apiVersion:
 
              description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
              type: string
 
            kind:
 
              description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
              type: string
 
            metadata:
 
              type: object
 
            spec:
 
              description: Desired state of the Certificate resource.
 
              type: object
 
              required:
 
                - issuerRef
 
                - secretName
 
              properties:
 
                additionalOutputFormats:
 
                  description: AdditionalOutputFormats defines extra output formats of the private key and signed certificate chain to be written to this Certificate's target Secret. This is an Alpha Feature and is only enabled with the `--feature-gates=AdditionalCertificateOutputFormats=true` option on both the controller and webhook components.
 
                  type: array
 
                  items:
 
                    description: CertificateAdditionalOutputFormat defines an additional output format of a Certificate resource. These contain supplementary data formats of the signed certificate chain and paired private key.
 
                    type: object
 
                    required:
 
                      - type
 
                    properties:
 
                      type:
 
                        description: Type is the name of the format type that should be written to the Certificate's target Secret.
 
                        type: string
 
                        enum:
 
                          - DER
 
                          - CombinedPEM
 
                commonName:
 
                  description: 'CommonName is a common name to be used on the Certificate. The CommonName should have a length of 64 characters or fewer to avoid generating invalid CSRs. This value is ignored by TLS clients when any subject alt name is set. This is x509 behaviour: https://tools.ietf.org/html/rfc6125#section-6.4.4'
 
                  type: string
 
                dnsNames:
 
                  description: DNSNames is a list of DNS subjectAltNames to be set on the Certificate.
 
                  type: array
 
                  items:
 
                    type: string
 
                duration:
 
                  description: The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types. If unset this defaults to 90 days. Certificate will be renewed either 2/3 through its duration or `renewBefore` period before its expiry, whichever is later. Minimum accepted duration is 1 hour. Value must be in units accepted by Go time.ParseDuration https://golang.org/pkg/time/#ParseDuration
 
                  type: string
 
                emailAddresses:
 
                  description: EmailAddresses is a list of email subjectAltNames to be set on the Certificate.
 
                  type: array
 
                  items:
 
                    type: string
 
                encodeUsagesInRequest:
 
                  description: EncodeUsagesInRequest controls whether key usages should be present in the CertificateRequest
 
                  type: boolean
 
                ipAddresses:
 
                  description: IPAddresses is a list of IP address subjectAltNames to be set on the Certificate.
 
                  type: array
 
                  items:
 
                    type: string
 
                isCA:
 
                  description: IsCA will mark this Certificate as valid for certificate signing. This will automatically add the `cert sign` usage to the list of `usages`.
 
                  type: boolean
 
                issuerRef:
 
                  description: IssuerRef is a reference to the issuer for this certificate. If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the Certificate will be used. If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times.
 
                  type: object
 
                  required:
 
                    - name
 
                  properties:
 
                    group:
 
                      description: Group of the resource being referred to.
 
                      type: string
 
                    kind:
 
                      description: Kind of the resource being referred to.
 
                      type: string
 
                    name:
 
                      description: Name of the resource being referred to.
 
                      type: string
 
                keystores:
 
                  description: Keystores configures additional keystore output formats stored in the `secretName` Secret resource.
 
                  type: object
 
                  properties:
 
                    jks:
 
                      description: JKS configures options for storing a JKS keystore in the `spec.secretName` Secret resource.
 
                      type: object
 
                      required:
 
                        - create
 
                        - passwordSecretRef
 
                      properties:
 
                        create:
 
                          description: Create enables JKS keystore creation for the Certificate. If true, a file named `keystore.jks` will be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef`. The keystore file will only be updated upon re-issuance. A file named `truststore.jks` will also be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef` containing the issuing Certificate Authority
 
                          type: boolean
 
                        passwordSecretRef:
 
                          description: PasswordSecretRef is a reference to a key in a Secret resource containing the password used to encrypt the JKS keystore.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            key:
 
                              description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                              type: string
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                    pkcs12:
 
                      description: PKCS12 configures options for storing a PKCS12 keystore in the `spec.secretName` Secret resource.
 
                      type: object
 
                      required:
 
                        - create
 
                        - passwordSecretRef
 
                      properties:
 
                        create:
 
                          description: Create enables PKCS12 keystore creation for the Certificate. If true, a file named `keystore.p12` will be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef`. The keystore file will only be updated upon re-issuance. A file named `truststore.p12` will also be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef` containing the issuing Certificate Authority
 
                          type: boolean
 
                        passwordSecretRef:
 
                          description: PasswordSecretRef is a reference to a key in a Secret resource containing the password used to encrypt the PKCS12 keystore.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            key:
 
                              description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                              type: string
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                literalSubject:
 
                  description: LiteralSubject is an LDAP formatted string that represents the [X.509 Subject field](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6). Use this *instead* of the Subject field if you need to ensure the correct ordering of the RDN sequence, such as when issuing certs for LDAP authentication. See https://github.com/cert-manager/cert-manager/issues/3203, https://github.com/cert-manager/cert-manager/issues/4424. This field is alpha level and is only supported by cert-manager installations where LiteralCertificateSubject feature gate is enabled on both cert-manager controller and webhook.
 
                  type: string
 
                privateKey:
 
                  description: Options to control private keys used for the Certificate.
 
                  type: object
 
                  properties:
 
                    algorithm:
 
                      description: Algorithm is the private key algorithm of the corresponding private key for this certificate. If provided, allowed values are either `RSA`,`Ed25519` or `ECDSA` If `algorithm` is specified and `size` is not provided, key size of 256 will be used for `ECDSA` key algorithm and key size of 2048 will be used for `RSA` key algorithm. key size is ignored when using the `Ed25519` key algorithm.
 
                      type: string
 
                      enum:
 
                        - RSA
 
                        - ECDSA
 
                        - Ed25519
 
                    encoding:
 
                      description: The private key cryptography standards (PKCS) encoding for this certificate's private key to be encoded in. If provided, allowed values are `PKCS1` and `PKCS8` standing for PKCS#1 and PKCS#8, respectively. Defaults to `PKCS1` if not specified.
 
                      type: string
 
                      enum:
 
                        - PKCS1
 
                        - PKCS8
 
                    rotationPolicy:
 
                      description: RotationPolicy controls how private keys should be regenerated when a re-issuance is being processed. If set to Never, a private key will only be generated if one does not already exist in the target `spec.secretName`. If one does exists but it does not have the correct algorithm or size, a warning will be raised to await user intervention. If set to Always, a private key matching the specified requirements will be generated whenever a re-issuance occurs. Default is 'Never' for backward compatibility.
 
                      type: string
 
                      enum:
 
                        - Never
 
                        - Always
 
                    size:
 
                      description: Size is the key bit size of the corresponding private key for this certificate. If `algorithm` is set to `RSA`, valid values are `2048`, `4096` or `8192`, and will default to `2048` if not specified. If `algorithm` is set to `ECDSA`, valid values are `256`, `384` or `521`, and will default to `256` if not specified. If `algorithm` is set to `Ed25519`, Size is ignored. No other values are allowed.
 
                      type: integer
 
                renewBefore:
 
                  description: How long before the currently issued certificate's expiry cert-manager should renew the certificate. The default is 2/3 of the issued certificate's duration. Minimum accepted value is 5 minutes. Value must be in units accepted by Go time.ParseDuration https://golang.org/pkg/time/#ParseDuration
 
                  type: string
 
                revisionHistoryLimit:
 
                  description: revisionHistoryLimit is the maximum number of CertificateRequest revisions that are maintained in the Certificate's history. Each revision represents a single `CertificateRequest` created by this Certificate, either when it was created, renewed, or Spec was changed. Revisions will be removed by oldest first if the number of revisions exceeds this number. If set, revisionHistoryLimit must be a value of `1` or greater. If unset (`nil`), revisions will not be garbage collected. Default value is `nil`.
 
                  type: integer
 
                  format: int32
 
                secretName:
 
                  description: SecretName is the name of the secret resource that will be automatically created and managed by this Certificate resource. It will be populated with a private key and certificate, signed by the denoted issuer.
 
                  type: string
 
                secretTemplate:
 
                  description: SecretTemplate defines annotations and labels to be copied to the Certificate's Secret. Labels and annotations on the Secret will be changed as they appear on the SecretTemplate when added or removed. SecretTemplate annotations are added in conjunction with, and cannot overwrite, the base set of annotations cert-manager sets on the Certificate's Secret.
 
                  type: object
 
                  properties:
 
                    annotations:
 
                      description: Annotations is a key value map to be copied to the target Kubernetes Secret.
 
                      type: object
 
                      additionalProperties:
 
                        type: string
 
                    labels:
 
                      description: Labels is a key value map to be copied to the target Kubernetes Secret.
 
                      type: object
 
                      additionalProperties:
 
                        type: string
 
                subject:
 
                  description: Full X509 name specification (https://golang.org/pkg/crypto/x509/pkix/#Name).
 
                  type: object
 
                  properties:
 
                    countries:
 
                      description: Countries to be used on the Certificate.
 
                      type: array
 
                      items:
 
                        type: string
 
                    localities:
 
                      description: Cities to be used on the Certificate.
 
                      type: array
 
                      items:
 
                        type: string
 
                    organizationalUnits:
 
                      description: Organizational Units to be used on the Certificate.
 
                      type: array
 
                      items:
 
                        type: string
 
                    organizations:
 
                      description: Organizations to be used on the Certificate.
 
                      type: array
 
                      items:
 
                        type: string
 
                    postalCodes:
 
                      description: Postal codes to be used on the Certificate.
 
                      type: array
 
                      items:
 
                        type: string
 
                    provinces:
 
                      description: State/Provinces to be used on the Certificate.
 
                      type: array
 
                      items:
 
                        type: string
 
                    serialNumber:
 
                      description: Serial number to be used on the Certificate.
 
                      type: string
 
                    streetAddresses:
 
                      description: Street addresses to be used on the Certificate.
 
                      type: array
 
                      items:
 
                        type: string
 
                uris:
 
                  description: URIs is a list of URI subjectAltNames to be set on the Certificate.
 
                  type: array
 
                  items:
 
                    type: string
 
                usages:
 
                  description: Usages is the set of x509 usages that are requested for the certificate. Defaults to `digital signature` and `key encipherment` if not specified.
 
                  type: array
 
                  items:
 
                    description: 'KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: "signing", "digital signature", "content commitment", "key encipherment", "key agreement", "data encipherment", "cert sign", "crl sign", "encipher only", "decipher only", "any", "server auth", "client auth", "code signing", "email protection", "s/mime", "ipsec end system", "ipsec tunnel", "ipsec user", "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"'
 
                    type: string
 
                    enum:
 
                      - signing
 
                      - digital signature
 
                      - content commitment
 
                      - key encipherment
 
                      - key agreement
 
                      - data encipherment
 
                      - cert sign
 
                      - crl sign
 
                      - encipher only
 
                      - decipher only
 
                      - any
 
                      - server auth
 
                      - client auth
 
                      - code signing
 
                      - email protection
 
                      - s/mime
 
                      - ipsec end system
 
                      - ipsec tunnel
 
                      - ipsec user
 
                      - timestamping
 
                      - ocsp signing
 
                      - microsoft sgc
 
                      - netscape sgc
 
            status:
 
              description: Status of the Certificate. This is set and managed automatically.
 
              type: object
 
              properties:
 
                conditions:
 
                  description: List of status conditions to indicate the status of certificates. Known condition types are `Ready` and `Issuing`.
 
                  type: array
 
                  items:
 
                    description: CertificateCondition contains condition information for an Certificate.
 
                    type: object
 
                    required:
 
                      - status
 
                      - type
 
                    properties:
 
                      lastTransitionTime:
 
                        description: LastTransitionTime is the timestamp corresponding to the last status change of this condition.
 
                        type: string
 
                        format: date-time
 
                      message:
 
                        description: Message is a human readable description of the details of the last transition, complementing reason.
 
                        type: string
 
                      observedGeneration:
 
                        description: If set, this represents the .metadata.generation that the condition was set based upon. For instance, if .metadata.generation is currently 12, but the .status.condition[x].observedGeneration is 9, the condition is out of date with respect to the current state of the Certificate.
 
                        type: integer
 
                        format: int64
 
                      reason:
 
                        description: Reason is a brief machine readable explanation for the condition's last transition.
 
                        type: string
 
                      status:
 
                        description: Status of the condition, one of (`True`, `False`, `Unknown`).
 
                        type: string
 
                        enum:
 
                          - "True"
 
                          - "False"
 
                          - Unknown
 
                      type:
 
                        description: Type of the condition, known values are (`Ready`, `Issuing`).
 
                        type: string
 
                  x-kubernetes-list-map-keys:
 
                    - type
 
                  x-kubernetes-list-type: map
 
                failedIssuanceAttempts:
 
                  description: The number of continuous failed issuance attempts up till now. This field gets removed (if set) on a successful issuance and gets set to 1 if unset and an issuance has failed. If an issuance has failed, the delay till the next issuance will be calculated using formula time.Hour * 2 ^ (failedIssuanceAttempts - 1).
 
                  type: integer
 
                lastFailureTime:
 
                  description: LastFailureTime is the time as recorded by the Certificate controller of the most recent failure to complete a CertificateRequest for this Certificate resource. If set, cert-manager will not re-request another Certificate until 1 hour has elapsed from this time.
 
                  type: string
 
                  format: date-time
 
                nextPrivateKeySecretName:
 
                  description: The name of the Secret resource containing the private key to be used for the next certificate iteration. The keymanager controller will automatically set this field if the `Issuing` condition is set to `True`. It will automatically unset this field when the Issuing condition is not set or False.
 
                  type: string
 
                notAfter:
 
                  description: The expiration time of the certificate stored in the secret named by this resource in `spec.secretName`.
 
                  type: string
 
                  format: date-time
 
                notBefore:
 
                  description: The time after which the certificate stored in the secret named by this resource in spec.secretName is valid.
 
                  type: string
 
                  format: date-time
 
                renewalTime:
 
                  description: RenewalTime is the time at which the certificate will be next renewed. If not set, no upcoming renewal is scheduled.
 
                  type: string
 
                  format: date-time
 
                revision:
 
                  description: "The current 'revision' of the certificate as issued. \n When a CertificateRequest resource is created, it will have the `cert-manager.io/certificate-revision` set to one greater than the current value of this field. \n Upon issuance, this field will be set to the value of the annotation on the CertificateRequest resource used to issue the certificate. \n Persisting the value on the CertificateRequest resource allows the certificates controller to know whether a request is part of an old issuance or if it is part of the ongoing revision's issuance by checking if the revision value in the annotation is greater than this field."
 
                  type: integer
 
      served: true
 
      storage: true
 
---
 
# Source: cert-manager/templates/crd-templates.yaml
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  name: challenges.acme.cert-manager.io
 
  labels:
 
    app: 'cert-manager'
 
    app.kubernetes.io/name: 'cert-manager'
 
    app.kubernetes.io/instance: 'cert-manager'
 
    # Generated labels
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  group: acme.cert-manager.io
 
  names:
 
    kind: Challenge
 
    listKind: ChallengeList
 
    plural: challenges
 
    singular: challenge
 
    categories:
 
      - cert-manager
 
      - cert-manager-acme
 
  scope: Namespaced
 
  versions:
 
    - additionalPrinterColumns:
 
        - jsonPath: .status.state
 
          name: State
 
          type: string
 
        - jsonPath: .spec.dnsName
 
          name: Domain
 
          type: string
 
        - jsonPath: .status.reason
 
          name: Reason
 
          priority: 1
 
          type: string
 
        - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
 
          jsonPath: .metadata.creationTimestamp
 
          name: Age
 
          type: date
 
      name: v1
 
      schema:
 
        openAPIV3Schema:
 
          description: Challenge is a type to represent a Challenge request with an ACME server
 
          type: object
 
          required:
 
            - metadata
 
            - spec
 
          properties:
 
            apiVersion:
 
              description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
              type: string
 
            kind:
 
              description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
              type: string
 
            metadata:
 
              type: object
 
            spec:
 
              type: object
 
              required:
 
                - authorizationURL
 
                - dnsName
 
                - issuerRef
 
                - key
 
                - solver
 
                - token
 
                - type
 
                - url
 
              properties:
 
                authorizationURL:
 
                  description: The URL to the ACME Authorization resource that this challenge is a part of.
 
                  type: string
 
                dnsName:
 
                  description: dnsName is the identifier that this challenge is for, e.g. example.com. If the requested DNSName is a 'wildcard', this field MUST be set to the non-wildcard domain, e.g. for `*.example.com`, it must be `example.com`.
 
                  type: string
 
                issuerRef:
 
                  description: References a properly configured ACME-type Issuer which should be used to create this Challenge. If the Issuer does not exist, processing will be retried. If the Issuer is not an 'ACME' Issuer, an error will be returned and the Challenge will be marked as failed.
 
                  type: object
 
                  required:
 
                    - name
 
                  properties:
 
                    group:
 
                      description: Group of the resource being referred to.
 
                      type: string
 
                    kind:
 
                      description: Kind of the resource being referred to.
 
                      type: string
 
                    name:
 
                      description: Name of the resource being referred to.
 
                      type: string
 
                key:
 
                  description: 'The ACME challenge key for this challenge For HTTP01 challenges, this is the value that must be responded with to complete the HTTP01 challenge in the format: `<private key JWK thumbprint>.<key from acme server for challenge>`. For DNS01 challenges, this is the base64 encoded SHA256 sum of the `<private key JWK thumbprint>.<key from acme server for challenge>` text that must be set as the TXT record content.'
 
                  type: string
 
                solver:
 
                  description: Contains the domain solving configuration that should be used to solve this challenge resource.
 
                  type: object
 
                  properties:
 
                    dns01:
 
                      description: Configures cert-manager to attempt to complete authorizations by performing the DNS01 challenge flow.
 
                      type: object
 
                      properties:
 
                        acmeDNS:
 
                          description: Use the 'ACME DNS' (https://github.com/joohoi/acme-dns) API to manage DNS01 challenge records.
 
                          type: object
 
                          required:
 
                            - accountSecretRef
 
                            - host
 
                          properties:
 
                            accountSecretRef:
 
                              description: A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field.
 
                              type: object
 
                              required:
 
                                - name
 
                              properties:
 
                                key:
 
                                  description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                                  type: string
 
                                name:
 
                                  description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                                  type: string
 
                            host:
 
                              type: string
 
                        akamai:
 
                          description: Use the Akamai DNS zone management API to manage DNS01 challenge records.
 
                          type: object
 
                          required:
 
                            - accessTokenSecretRef
 
                            - clientSecretSecretRef
 
                            - clientTokenSecretRef
 
                            - serviceConsumerDomain
 
                          properties:
 
                            accessTokenSecretRef:
 
                              description: A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field.
 
                              type: object
 
                              required:
 
                                - name
 
                              properties:
 
                                key:
 
                                  description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                                  type: string
 
                                name:
 
                                  description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                                  type: string
 
                            clientSecretSecretRef:
 
                              description: A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field.
 
                              type: object
 
                              required:
 
                                - name
 
                              properties:
 
                                key:
 
                                  description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                                  type: string
 
                                name:
 
                                  description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                                  type: string
 
                            clientTokenSecretRef:
 
                              description: A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field.
 
                              type: object
 
                              required:
 
                                - name
 
                              properties:
 
                                key:
 
                                  description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                                  type: string
 
                                name:
 
                                  description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                                  type: string
 
                            serviceConsumerDomain:
 
                              type: string
 
                        azureDNS:
 
                          description: Use the Microsoft Azure DNS API to manage DNS01 challenge records.
 
                          type: object
 
                          required:
 
                            - resourceGroupName
 
                            - subscriptionID
 
                          properties:
 
                            clientID:
 
                              description: if both this and ClientSecret are left unset MSI will be used
 
                              type: string
 
                            clientSecretSecretRef:
 
                              description: if both this and ClientID are left unset MSI will be used
 
                              type: object
 
                              required:
 
                                - name
 
                              properties:
 
                                key:
 
                                  description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                                  type: string
 
                                name:
 
                                  description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                                  type: string
 
                            environment:
 
                              description: name of the Azure environment (default AzurePublicCloud)
 
                              type: string
 
                              enum:
 
                                - AzurePublicCloud
 
                                - AzureChinaCloud
 
@@ -3577,1846 +3558,768 @@ spec:
 
                                                                    required:
 
                                                                      - key
 
                                                                      - operator
 
                                                                    properties:
 
                                                                      key:
 
                                                                        description: key is the label key that the selector applies to.
 
                                                                        type: string
 
                                                                      operator:
 
                                                                        description: operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
 
                                                                        type: string
 
                                                                      values:
 
                                                                        description: values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
 
                                                                        type: array
 
                                                                        items:
 
                                                                          type: string
 
                                                                matchLabels:
 
                                                                  description: matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.
 
                                                                  type: object
 
                                                                  additionalProperties:
 
                                                                    type: string
 
                                                            namespaceSelector:
 
                                                              description: A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces.
 
                                                              type: object
 
                                                              properties:
 
                                                                matchExpressions:
 
                                                                  description: matchExpressions is a list of label selector requirements. The requirements are ANDed.
 
                                                                  type: array
 
                                                                  items:
 
                                                                    description: A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values.
 
                                                                    type: object
 
                                                                    required:
 
                                                                      - key
 
                                                                      - operator
 
                                                                    properties:
 
                                                                      key:
 
                                                                        description: key is the label key that the selector applies to.
 
                                                                        type: string
 
                                                                      operator:
 
                                                                        description: operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
 
                                                                        type: string
 
                                                                      values:
 
                                                                        description: values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
 
                                                                        type: array
 
                                                                        items:
 
                                                                          type: string
 
                                                                matchLabels:
 
                                                                  description: matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.
 
                                                                  type: object
 
                                                                  additionalProperties:
 
                                                                    type: string
 
                                                            namespaces:
 
                                                              description: namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace".
 
                                                              type: array
 
                                                              items:
 
                                                                type: string
 
                                                            topologyKey:
 
                                                              description: This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed.
 
                                                              type: string
 
                                                        weight:
 
                                                          description: weight associated with matching the corresponding podAffinityTerm, in the range 1-100.
 
                                                          type: integer
 
                                                          format: int32
 
                                                  requiredDuringSchedulingIgnoredDuringExecution:
 
                                                    description: If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied.
 
                                                    type: array
 
                                                    items:
 
                                                      description: Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key <topologyKey> matches that of any node on which a pod of the set of pods is running
 
                                                      type: object
 
                                                      required:
 
                                                        - topologyKey
 
                                                      properties:
 
                                                        labelSelector:
 
                                                          description: A label query over a set of resources, in this case pods.
 
                                                          type: object
 
                                                          properties:
 
                                                            matchExpressions:
 
                                                              description: matchExpressions is a list of label selector requirements. The requirements are ANDed.
 
                                                              type: array
 
                                                              items:
 
                                                                description: A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values.
 
                                                                type: object
 
                                                                required:
 
                                                                  - key
 
                                                                  - operator
 
                                                                properties:
 
                                                                  key:
 
                                                                    description: key is the label key that the selector applies to.
 
                                                                    type: string
 
                                                                  operator:
 
                                                                    description: operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
 
                                                                    type: string
 
                                                                  values:
 
                                                                    description: values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
 
                                                                    type: array
 
                                                                    items:
 
                                                                      type: string
 
                                                            matchLabels:
 
                                                              description: matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.
 
                                                              type: object
 
                                                              additionalProperties:
 
                                                                type: string
 
                                                        namespaceSelector:
 
                                                          description: A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces.
 
                                                          type: object
 
                                                          properties:
 
                                                            matchExpressions:
 
                                                              description: matchExpressions is a list of label selector requirements. The requirements are ANDed.
 
                                                              type: array
 
                                                              items:
 
                                                                description: A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values.
 
                                                                type: object
 
                                                                required:
 
                                                                  - key
 
                                                                  - operator
 
                                                                properties:
 
                                                                  key:
 
                                                                    description: key is the label key that the selector applies to.
 
                                                                    type: string
 
                                                                  operator:
 
                                                                    description: operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
 
                                                                    type: string
 
                                                                  values:
 
                                                                    description: values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
 
                                                                    type: array
 
                                                                    items:
 
                                                                      type: string
 
                                                            matchLabels:
 
                                                              description: matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.
 
                                                              type: object
 
                                                              additionalProperties:
 
                                                                type: string
 
                                                        namespaces:
 
                                                          description: namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace".
 
                                                          type: array
 
                                                          items:
 
                                                            type: string
 
                                                        topologyKey:
 
                                                          description: This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed.
 
                                                          type: string
 
                                              podAntiAffinity:
 
                                                description: Describes pod anti-affinity scheduling rules (e.g. avoid putting this pod in the same node, zone, etc. as some other pod(s)).
 
                                                type: object
 
                                                properties:
 
                                                  preferredDuringSchedulingIgnoredDuringExecution:
 
                                                    description: The scheduler will prefer to schedule pods to nodes that satisfy the anti-affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling anti-affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred.
 
                                                    type: array
 
                                                    items:
 
                                                      description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s)
 
                                                      type: object
 
                                                      required:
 
                                                        - podAffinityTerm
 
                                                        - weight
 
                                                      properties:
 
                                                        podAffinityTerm:
 
                                                          description: Required. A pod affinity term, associated with the corresponding weight.
 
                                                          type: object
 
                                                          required:
 
                                                            - topologyKey
 
                                                          properties:
 
                                                            labelSelector:
 
                                                              description: A label query over a set of resources, in this case pods.
 
                                                              type: object
 
                                                              properties:
 
                                                                matchExpressions:
 
                                                                  description: matchExpressions is a list of label selector requirements. The requirements are ANDed.
 
                                                                  type: array
 
                                                                  items:
 
                                                                    description: A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values.
 
                                                                    type: object
 
                                                                    required:
 
                                                                      - key
 
                                                                      - operator
 
                                                                    properties:
 
                                                                      key:
 
                                                                        description: key is the label key that the selector applies to.
 
                                                                        type: string
 
                                                                      operator:
 
                                                                        description: operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
 
                                                                        type: string
 
                                                                      values:
 
                                                                        description: values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
 
                                                                        type: array
 
                                                                        items:
 
                                                                          type: string
 
                                                                matchLabels:
 
                                                                  description: matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.
 
                                                                  type: object
 
                                                                  additionalProperties:
 
                                                                    type: string
 
                                                            namespaceSelector:
 
                                                              description: A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces.
 
                                                              type: object
 
                                                              properties:
 
                                                                matchExpressions:
 
                                                                  description: matchExpressions is a list of label selector requirements. The requirements are ANDed.
 
                                                                  type: array
 
                                                                  items:
 
                                                                    description: A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values.
 
                                                                    type: object
 
                                                                    required:
 
                                                                      - key
 
                                                                      - operator
 
                                                                    properties:
 
                                                                      key:
 
                                                                        description: key is the label key that the selector applies to.
 
                                                                        type: string
 
                                                                      operator:
 
                                                                        description: operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
 
                                                                        type: string
 
                                                                      values:
 
                                                                        description: values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
 
                                                                        type: array
 
                                                                        items:
 
                                                                          type: string
 
                                                                matchLabels:
 
                                                                  description: matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.
 
                                                                  type: object
 
                                                                  additionalProperties:
 
                                                                    type: string
 
                                                            namespaces:
 
                                                              description: namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace".
 
                                                              type: array
 
                                                              items:
 
                                                                type: string
 
                                                            topologyKey:
 
                                                              description: This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed.
 
                                                              type: string
 
                                                        weight:
 
                                                          description: weight associated with matching the corresponding podAffinityTerm, in the range 1-100.
 
                                                          type: integer
 
                                                          format: int32
 
                                                  requiredDuringSchedulingIgnoredDuringExecution:
 
                                                    description: If the anti-affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the anti-affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied.
 
                                                    type: array
 
                                                    items:
 
                                                      description: Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key <topologyKey> matches that of any node on which a pod of the set of pods is running
 
                                                      type: object
 
                                                      required:
 
                                                        - topologyKey
 
                                                      properties:
 
                                                        labelSelector:
 
                                                          description: A label query over a set of resources, in this case pods.
 
                                                          type: object
 
                                                          properties:
 
                                                            matchExpressions:
 
                                                              description: matchExpressions is a list of label selector requirements. The requirements are ANDed.
 
                                                              type: array
 
                                                              items:
 
                                                                description: A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values.
 
                                                                type: object
 
                                                                required:
 
                                                                  - key
 
                                                                  - operator
 
                                                                properties:
 
                                                                  key:
 
                                                                    description: key is the label key that the selector applies to.
 
                                                                    type: string
 
                                                                  operator:
 
                                                                    description: operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
 
                                                                    type: string
 
                                                                  values:
 
                                                                    description: values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
 
                                                                    type: array
 
                                                                    items:
 
                                                                      type: string
 
                                                            matchLabels:
 
                                                              description: matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.
 
                                                              type: object
 
                                                              additionalProperties:
 
                                                                type: string
 
                                                        namespaceSelector:
 
                                                          description: A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces.
 
                                                          type: object
 
                                                          properties:
 
                                                            matchExpressions:
 
                                                              description: matchExpressions is a list of label selector requirements. The requirements are ANDed.
 
                                                              type: array
 
                                                              items:
 
                                                                description: A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values.
 
                                                                type: object
 
                                                                required:
 
                                                                  - key
 
                                                                  - operator
 
                                                                properties:
 
                                                                  key:
 
                                                                    description: key is the label key that the selector applies to.
 
                                                                    type: string
 
                                                                  operator:
 
                                                                    description: operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist.
 
                                                                    type: string
 
                                                                  values:
 
                                                                    description: values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.
 
                                                                    type: array
 
                                                                    items:
 
                                                                      type: string
 
                                                            matchLabels:
 
                                                              description: matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.
 
                                                              type: object
 
                                                              additionalProperties:
 
                                                                type: string
 
                                                        namespaces:
 
                                                          description: namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace".
 
                                                          type: array
 
                                                          items:
 
                                                            type: string
 
                                                        topologyKey:
 
                                                          description: This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed.
 
                                                          type: string
 
                                          nodeSelector:
 
                                            description: 'NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node''s labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/'
 
                                            type: object
 
                                            additionalProperties:
 
                                              type: string
 
                                          priorityClassName:
 
                                            description: If specified, the pod's priorityClassName.
 
                                            type: string
 
                                          serviceAccountName:
 
                                            description: If specified, the pod's service account
 
                                            type: string
 
                                          tolerations:
 
                                            description: If specified, the pod's tolerations.
 
                                            type: array
 
                                            items:
 
                                              description: The pod this Toleration is attached to tolerates any taint that matches the triple <key,value,effect> using the matching operator <operator>.
 
                                              type: object
 
                                              properties:
 
                                                effect:
 
                                                  description: Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.
 
                                                  type: string
 
                                                key:
 
                                                  description: Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys.
 
                                                  type: string
 
                                                operator:
 
                                                  description: Operator represents a key's relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category.
 
                                                  type: string
 
                                                tolerationSeconds:
 
                                                  description: TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system.
 
                                                  type: integer
 
                                                  format: int64
 
                                                value:
 
                                                  description: Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string.
 
                                                  type: string
 
                                  serviceType:
 
                                    description: Optional service type for Kubernetes solver service. Supported values are NodePort or ClusterIP. If unset, defaults to NodePort.
 
                                    type: string
 
                          selector:
 
                            description: Selector selects a set of DNSNames on the Certificate resource that should be solved using this challenge solver. If not specified, the solver will be treated as the 'default' solver with the lowest priority, i.e. if any other solver has a more specific match, it will be used instead.
 
                            type: object
 
                            properties:
 
                              dnsNames:
 
                                description: List of DNSNames that this solver will be used to solve. If specified and a match is found, a dnsNames selector will take precedence over a dnsZones selector. If multiple solvers match with the same dnsNames value, the solver with the most matching labels in matchLabels will be selected. If neither has more matches, the solver defined earlier in the list will be selected.
 
                                type: array
 
                                items:
 
                                  type: string
 
                              dnsZones:
 
                                description: List of DNSZones that this solver will be used to solve. The most specific DNS zone match specified here will take precedence over other DNS zone matches, so a solver specifying sys.example.com will be selected over one specifying example.com for the domain www.sys.example.com. If multiple solvers match with the same dnsZones value, the solver with the most matching labels in matchLabels will be selected. If neither has more matches, the solver defined earlier in the list will be selected.
 
                                type: array
 
                                items:
 
                                  type: string
 
                              matchLabels:
 
                                description: A label selector that is used to refine the set of certificate's that this challenge solver will apply to.
 
                                type: object
 
                                additionalProperties:
 
                                  type: string
 
                ca:
 
                  description: CA configures this issuer to sign certificates using a signing CA keypair stored in a Secret resource. This is used to build internal PKIs that are managed by cert-manager.
 
                  type: object
 
                  required:
 
                    - secretName
 
                  properties:
 
                    crlDistributionPoints:
 
                      description: The CRL distribution points is an X.509 v3 certificate extension which identifies the location of the CRL from which the revocation of this certificate can be checked. If not set, certificates will be issued without distribution points set.
 
                      type: array
 
                      items:
 
                        type: string
 
                    ocspServers:
 
                      description: The OCSP server list is an X.509 v3 extension that defines a list of URLs of OCSP responders. The OCSP responders can be queried for the revocation status of an issued certificate. If not set, the certificate will be issued with no OCSP servers set. For example, an OCSP server URL could be "http://ocsp.int-x3.letsencrypt.org".
 
                      type: array
 
                      items:
 
                        type: string
 
                    secretName:
 
                      description: SecretName is the name of the secret used to sign Certificates issued by this Issuer.
 
                      type: string
 
                selfSigned:
 
                  description: SelfSigned configures this issuer to 'self sign' certificates using the private key used to create the CertificateRequest object.
 
                  type: object
 
                  properties:
 
                    crlDistributionPoints:
 
                      description: The CRL distribution points is an X.509 v3 certificate extension which identifies the location of the CRL from which the revocation of this certificate can be checked. If not set certificate will be issued without CDP. Values are strings.
 
                      type: array
 
                      items:
 
                        type: string
 
                vault:
 
                  description: Vault configures this issuer to sign certificates using a HashiCorp Vault PKI backend.
 
                  type: object
 
                  required:
 
                    - auth
 
                    - path
 
                    - server
 
                  properties:
 
                    auth:
 
                      description: Auth configures how cert-manager authenticates with the Vault server.
 
                      type: object
 
                      properties:
 
                        appRole:
 
                          description: AppRole authenticates with Vault using the App Role auth mechanism, with the role and secret stored in a Kubernetes Secret resource.
 
                          type: object
 
                          required:
 
                            - path
 
                            - roleId
 
                            - secretRef
 
                          properties:
 
                            path:
 
                              description: 'Path where the App Role authentication backend is mounted in Vault, e.g: "approle"'
 
                              type: string
 
                            roleId:
 
                              description: RoleID configured in the App Role authentication backend when setting up the authentication backend in Vault.
 
                              type: string
 
                            secretRef:
 
                              description: Reference to a key in a Secret that contains the App Role secret used to authenticate with Vault. The `key` field must be specified and denotes which entry within the Secret resource is used as the app role secret.
 
                              type: object
 
                              required:
 
                                - name
 
                              properties:
 
                                key:
 
                                  description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                                  type: string
 
                                name:
 
                                  description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                                  type: string
 
                        kubernetes:
 
                          description: Kubernetes authenticates with Vault by passing the ServiceAccount token stored in the named Secret resource to the Vault server.
 
                          type: object
 
                          required:
 
                            - role
 
                            - secretRef
 
                          properties:
 
                            mountPath:
 
                              description: The Vault mountPath here is the mount path to use when authenticating with Vault. For example, setting a value to `/v1/auth/foo`, will use the path `/v1/auth/foo/login` to authenticate with Vault. If unspecified, the default value "/v1/auth/kubernetes" will be used.
 
                              type: string
 
                            role:
 
                              description: A required field containing the Vault Role to assume. A Role binds a Kubernetes ServiceAccount with a set of Vault policies.
 
                              type: string
 
                            secretRef:
 
                              description: The required Secret field containing a Kubernetes ServiceAccount JWT used for authenticating with Vault. Use of 'ambient credentials' is not supported.
 
                              type: object
 
                              required:
 
                                - name
 
                              properties:
 
                                key:
 
                                  description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                                  type: string
 
                                name:
 
                                  description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                                  type: string
 
                        tokenSecretRef:
 
                          description: TokenSecretRef authenticates with Vault by presenting a token.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            key:
 
                              description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                              type: string
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                    caBundle:
 
                      description: PEM-encoded CA bundle (base64-encoded) used to validate Vault server certificate. Only used if the Server URL is using HTTPS protocol. This parameter is ignored for plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection.
 
                      type: string
 
                      format: byte
 
                    namespace:
 
                      description: 'Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows Vault environments to support Secure Multi-tenancy. e.g: "ns1" More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces'
 
                      type: string
 
                    path:
 
                      description: 'Path is the mount path of the Vault PKI backend''s `sign` endpoint, e.g: "my_pki_mount/sign/my-role-name".'
 
                      type: string
 
                    server:
 
                      description: 'Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".'
 
                      type: string
 
                venafi:
 
                  description: Venafi configures this issuer to sign certificates using a Venafi TPP or Venafi Cloud policy zone.
 
                  type: object
 
                  required:
 
                    - zone
 
                  properties:
 
                    cloud:
 
                      description: Cloud specifies the Venafi cloud configuration settings. Only one of TPP or Cloud may be specified.
 
                      type: object
 
                      required:
 
                        - apiTokenSecretRef
 
                      properties:
 
                        apiTokenSecretRef:
 
                          description: APITokenSecretRef is a secret key selector for the Venafi Cloud API token.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            key:
 
                              description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
 
                              type: string
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                        url:
 
                          description: URL is the base URL for Venafi Cloud. Defaults to "https://api.venafi.cloud/v1".
 
                          type: string
 
                    tpp:
 
                      description: TPP specifies Trust Protection Platform configuration settings. Only one of TPP or Cloud may be specified.
 
                      type: object
 
                      required:
 
                        - credentialsRef
 
                        - url
 
                      properties:
 
                        caBundle:
 
                          description: CABundle is a PEM encoded TLS certificate to use to verify connections to the TPP instance. If specified, system roots will not be used and the issuing CA for the TPP instance must be verifiable using the provided root. If not specified, the connection will be verified using the cert-manager system root certificates.
 
                          type: string
 
                          format: byte
 
                        credentialsRef:
 
                          description: CredentialsRef is a reference to a Secret containing the username and password for the TPP server. The secret must contain two keys, 'username' and 'password'.
 
                          type: object
 
                          required:
 
                            - name
 
                          properties:
 
                            name:
 
                              description: 'Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names'
 
                              type: string
 
                        url:
 
                          description: 'URL is the base URL for the vedsdk endpoint of the Venafi TPP instance, for example: "https://tpp.example.com/vedsdk".'
 
                          type: string
 
                    zone:
 
                      description: Zone is the Venafi Policy Zone to use for this issuer. All requests made to the Venafi platform will be restricted by the named zone policy. This field is required.
 
                      type: string
 
            status:
 
              description: Status of the Issuer. This is set and managed automatically.
 
              type: object
 
              properties:
 
                acme:
 
                  description: ACME specific status options. This field should only be set if the Issuer is configured to use an ACME server to issue certificates.
 
                  type: object
 
                  properties:
 
                    lastRegisteredEmail:
 
                      description: LastRegisteredEmail is the email associated with the latest registered ACME account, in order to track changes made to registered account associated with the  Issuer
 
                      type: string
 
                    uri:
 
                      description: URI is the unique account identifier, which can also be used to retrieve account details from the CA
 
                      type: string
 
                conditions:
 
                  description: List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready`.
 
                  type: array
 
                  items:
 
                    description: IssuerCondition contains condition information for an Issuer.
 
                    type: object
 
                    required:
 
                      - status
 
                      - type
 
                    properties:
 
                      lastTransitionTime:
 
                        description: LastTransitionTime is the timestamp corresponding to the last status change of this condition.
 
                        type: string
 
                        format: date-time
 
                      message:
 
                        description: Message is a human readable description of the details of the last transition, complementing reason.
 
                        type: string
 
                      observedGeneration:
 
                        description: If set, this represents the .metadata.generation that the condition was set based upon. For instance, if .metadata.generation is currently 12, but the .status.condition[x].observedGeneration is 9, the condition is out of date with respect to the current state of the Issuer.
 
                        type: integer
 
                        format: int64
 
                      reason:
 
                        description: Reason is a brief machine readable explanation for the condition's last transition.
 
                        type: string
 
                      status:
 
                        description: Status of the condition, one of (`True`, `False`, `Unknown`).
 
                        type: string
 
                        enum:
 
                          - "True"
 
                          - "False"
 
                          - Unknown
 
                      type:
 
                        description: Type of the condition, known values are (`Ready`).
 
                        type: string
 
                  x-kubernetes-list-map-keys:
 
                    - type
 
                  x-kubernetes-list-type: map
 
      served: true
 
      storage: true
 
---
 
# Source: cert-manager/templates/crd-templates.yaml
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  name: orders.acme.cert-manager.io
 
  labels:
 
    app: 'cert-manager'
 
    app.kubernetes.io/name: 'cert-manager'
 
    app.kubernetes.io/instance: 'cert-manager'
 
    # Generated labels
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  group: acme.cert-manager.io
 
  names:
 
    kind: Order
 
    listKind: OrderList
 
    plural: orders
 
    singular: order
 
    categories:
 
      - cert-manager
 
      - cert-manager-acme
 
  scope: Namespaced
 
  versions:
 
    - name: v1
 
      subresources:
 
        status: {}
 
      additionalPrinterColumns:
 
        - jsonPath: .status.state
 
          name: State
 
          type: string
 
        - jsonPath: .spec.issuerRef.name
 
          name: Issuer
 
          priority: 1
 
          type: string
 
        - jsonPath: .status.reason
 
          name: Reason
 
          priority: 1
 
          type: string
 
        - jsonPath: .metadata.creationTimestamp
 
          description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
 
          name: Age
 
          type: date
 
      schema:
 
        openAPIV3Schema:
 
          description: Order is a type to represent an Order with an ACME server
 
          type: object
 
          required:
 
            - metadata
 
            - spec
 
          properties:
 
            apiVersion:
 
              description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
              type: string
 
            kind:
 
              description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
              type: string
 
            metadata:
 
              type: object
 
            spec:
 
              type: object
 
              required:
 
                - issuerRef
 
                - request
 
              properties:
 
                commonName:
 
                  description: CommonName is the common name as specified on the DER encoded CSR. If specified, this value must also be present in `dnsNames` or `ipAddresses`. This field must match the corresponding field on the DER encoded CSR.
 
                  type: string
 
                dnsNames:
 
                  description: DNSNames is a list of DNS names that should be included as part of the Order validation process. This field must match the corresponding field on the DER encoded CSR.
 
                  type: array
 
                  items:
 
                    type: string
 
                duration:
 
                  description: Duration is the duration for the not after date for the requested certificate. this is set on order creation as pe the ACME spec.
 
                  type: string
 
                ipAddresses:
 
                  description: IPAddresses is a list of IP addresses that should be included as part of the Order validation process. This field must match the corresponding field on the DER encoded CSR.
 
                  type: array
 
                  items:
 
                    type: string
 
                issuerRef:
 
                  description: IssuerRef references a properly configured ACME-type Issuer which should be used to create this Order. If the Issuer does not exist, processing will be retried. If the Issuer is not an 'ACME' Issuer, an error will be returned and the Order will be marked as failed.
 
                  type: object
 
                  required:
 
                    - name
 
                  properties:
 
                    group:
 
                      description: Group of the resource being referred to.
 
                      type: string
 
                    kind:
 
                      description: Kind of the resource being referred to.
 
                      type: string
 
                    name:
 
                      description: Name of the resource being referred to.
 
                      type: string
 
                request:
 
                  description: Certificate signing request bytes in DER encoding. This will be used when finalizing the order. This field must be set on the order.
 
                  type: string
 
                  format: byte
 
            status:
 
              type: object
 
              properties:
 
                authorizations:
 
                  description: Authorizations contains data returned from the ACME server on what authorizations must be completed in order to validate the DNS names specified on the Order.
 
                  type: array
 
                  items:
 
                    description: ACMEAuthorization contains data returned from the ACME server on an authorization that must be completed in order validate a DNS name on an ACME Order resource.
 
                    type: object
 
                    required:
 
                      - url
 
                    properties:
 
                      challenges:
 
                        description: Challenges specifies the challenge types offered by the ACME server. One of these challenge types will be selected when validating the DNS name and an appropriate Challenge resource will be created to perform the ACME challenge process.
 
                        type: array
 
                        items:
 
                          description: Challenge specifies a challenge offered by the ACME server for an Order. An appropriate Challenge resource can be created to perform the ACME challenge process.
 
                          type: object
 
                          required:
 
                            - token
 
                            - type
 
                            - url
 
                          properties:
 
                            token:
 
                              description: Token is the token that must be presented for this challenge. This is used to compute the 'key' that must also be presented.
 
                              type: string
 
                            type:
 
                              description: Type is the type of challenge being offered, e.g. 'http-01', 'dns-01', 'tls-sni-01', etc. This is the raw value retrieved from the ACME server. Only 'http-01' and 'dns-01' are supported by cert-manager, other values will be ignored.
 
                              type: string
 
                            url:
 
                              description: URL is the URL of this challenge. It can be used to retrieve additional metadata about the Challenge from the ACME server.
 
                              type: string
 
                      identifier:
 
                        description: Identifier is the DNS name to be validated as part of this authorization
 
                        type: string
 
                      initialState:
 
                        description: InitialState is the initial state of the ACME authorization when first fetched from the ACME server. If an Authorization is already 'valid', the Order controller will not create a Challenge resource for the authorization. This will occur when working with an ACME server that enables 'authz reuse' (such as Let's Encrypt's production endpoint). If not set and 'identifier' is set, the state is assumed to be pending and a Challenge will be created.
 
                        type: string
 
                        enum:
 
                          - valid
 
                          - ready
 
                          - pending
 
                          - processing
 
                          - invalid
 
                          - expired
 
                          - errored
 
                      url:
 
                        description: URL is the URL of the Authorization that must be completed
 
                        type: string
 
                      wildcard:
 
                        description: Wildcard will be true if this authorization is for a wildcard DNS name. If this is true, the identifier will be the *non-wildcard* version of the DNS name. For example, if '*.example.com' is the DNS name being validated, this field will be 'true' and the 'identifier' field will be 'example.com'.
 
                        type: boolean
 
                certificate:
 
                  description: Certificate is a copy of the PEM encoded certificate for this Order. This field will be populated after the order has been successfully finalized with the ACME server, and the order has transitioned to the 'valid' state.
 
                  type: string
 
                  format: byte
 
                failureTime:
 
                  description: FailureTime stores the time that this order failed. This is used to influence garbage collection and back-off.
 
                  type: string
 
                  format: date-time
 
                finalizeURL:
 
                  description: FinalizeURL of the Order. This is used to obtain certificates for this order once it has been completed.
 
                  type: string
 
                reason:
 
                  description: Reason optionally provides more information about a why the order is in the current state.
 
                  type: string
 
                state:
 
                  description: State contains the current state of this Order resource. States 'success' and 'expired' are 'final'
 
                  type: string
 
                  enum:
 
                    - valid
 
                    - ready
 
                    - pending
 
                    - processing
 
                    - invalid
 
                    - expired
 
                    - errored
 
                url:
 
                  description: URL of the Order. This will initially be empty when the resource is first created. The Order controller will populate this field when the Order is first processed. This field will be immutable after it is initially set.
 
                  type: string
 
      served: true
 
      storage: true
 
---
 
# Source: cert-manager/templates/cainjector-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
---
 
# Source: cert-manager/templates/serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
---
 
# Source: cert-manager/templates/webhook-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
---
 
# Source: cert-manager/templates/webhook-config.yaml
 
apiVersion: v1
 
kind: ConfigMap
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
data:
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["get", "create", "update", "patch"]
 
  - apiGroups: ["admissionregistration.k8s.io"]
 
    resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiregistration.k8s.io"]
 
    resources: ["apiservices"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiextensions.k8s.io"]
 
    resources: ["customresourcedefinitions"]
 
    verbs: ["get", "list", "watch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Issuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "issuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ClusterIssuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "clusterissuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Certificates controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/finalizers", "certificaterequests/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders"]
 
    verbs: ["create", "delete", "get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete", "patch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Orders controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "orders/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "challenges"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["create", "delete"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Challenges controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  # Use to update challenge resource status
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "challenges/status"]
 
    verbs: ["update", "patch"]
 
  # Used to watch challenge resources
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to watch challenges, issuer and clusterissuer resources
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  # Need to be able to retrieve ACME account private key to complete challenges
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to create events
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
  # HTTP01 rules
 
  - apiGroups: [""]
 
    resources: ["pods", "services"]
 
    verbs: ["get", "list", "watch", "create", "delete"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  - apiGroups: [ "gateway.networking.k8s.io" ]
 
    resources: [ "httproutes" ]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  # We require the ability to specify a custom hostname when we are creating
 
  # new ingress resources.
 
  # See: https://github.com/openshift/origin/blob/21f191775636f9acadb44fa42beeb4f75b255532/pkg/route/apiserver/admission/ingress_admission.go#L84-L148
 
  - apiGroups: ["route.openshift.io"]
 
    resources: ["routes/custom-host"]
 
    verbs: ["create"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges/finalizers"]
 
    verbs: ["update"]
 
  # DNS01 rules (duplicated above)
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ingress-shim controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests"]
 
    verbs: ["create", "update", "delete"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways", "httproutes"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways/finalizers", "httproutes/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-view
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
    rbac.authorization.k8s.io/aggregate-to-view: "true"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-edit
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/status"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to approve CertificateRequests referencing cert-manager.io Issuers and ClusterIssuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["signers"]
 
    verbs: ["approve"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to:
 
# - Update and sign CertificatSigningeRequests referencing cert-manager.io Issuers and ClusterIssuers
 
# - Perform SubjectAccessReviews to test whether users are able to reference Namespaced Issuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["signers"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
    verbs: ["sign"]
 
  - apiGroups: ["authorization.k8s.io"]
 
    resources: ["subjectaccessreviews"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
- apiGroups: ["authorization.k8s.io"]
 
  resources: ["subjectaccessreviews"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-cainjector
 
subjects:
 
  - name: cert-manager-cainjector
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-issuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-clusterissuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificates
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-orders
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-challenges
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-ingress-shim
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-approve:cert-manager-io
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificatesigningrequests
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-webhook:subjectaccessreviews
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# leader election rules
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  # Used for leader election by the controller
 
  # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
 
  #   see cmd/cainjector/start.go#L113
 
  # cert-manager-cainjector-leader-election-core is used by the SecretBased injector controller
 
  #   see cmd/cainjector/start.go#L137
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-cainjector-leader-election", "cert-manager-cainjector-leader-election-core"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-controller"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  resourceNames:
 
  - 'cert-manager-webhook-ca'
 
  verbs: ["get", "list", "watch", "update"]
 
# It's not possible to grant CREATE permission on a single resourceName.
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-cainjector:leaderelection
 
subjects:
 
  - kind: ServiceAccount
 
    name: cert-manager-cainjector
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager:leaderelection
 
subjects:
 
  - apiGroup: ""
 
    kind: ServiceAccount
 
    name: cert-manager
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-webhook:dynamic-serving
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
 
# Source: cert-manager/templates/service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - protocol: TCP
 
    port: 9402
 
    name: tcp-prometheus-servicemonitor
 
    targetPort: 9402
 
  selector:
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
---
 
# Source: cert-manager/templates/webhook-service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - name: https
 
    port: 443
 
    protocol: TCP
 
    targetPort: "https"
 
  selector:
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
---
 
# Source: cert-manager/templates/cainjector-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cainjector
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "cainjector"
 
  template:
 
    metadata:
 
      labels:
 
        app: cainjector
 
        app.kubernetes.io/name: cainjector
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "cainjector"
 
        app.kubernetes.io/version: "v1.9.1"
 
    spec:
 
      serviceAccountName: cert-manager-cainjector
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-cainjector:v1.9.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --leader-election-namespace=kube-system
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cert-manager
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "controller"
 
  template:
 
    metadata:
 
      labels:
 
        app: cert-manager
 
        app.kubernetes.io/name: cert-manager
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "controller"
 
        app.kubernetes.io/version: "v1.9.1"
 
      annotations:
 
        prometheus.io/path: "/metrics"
 
        prometheus.io/scrape: 'true'
 
        prometheus.io/port: '9402'
 
    spec:
 
      serviceAccountName: cert-manager
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-controller:v1.9.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --cluster-resource-namespace=$(POD_NAMESPACE)
 
          - --leader-election-namespace=kube-system
 
          ports:
 
          - containerPort: 9402
 
            name: http-metrics
 
            protocol: TCP
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: webhook
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "webhook"
 
  template:
 
    metadata:
 
      labels:
 
        app: webhook
 
        app.kubernetes.io/name: webhook
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "webhook"
 
        app.kubernetes.io/version: "v1.9.1"
 
    spec:
 
      serviceAccountName: cert-manager-webhook
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-webhook:v1.9.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --secure-port=10250
 
          - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
 
          - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
 
          - --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
 
          ports:
 
          - name: https
 
            protocol: TCP
 
            containerPort: 10250
 
          livenessProbe:
 
            httpGet:
 
              path: /livez
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 60
 
            periodSeconds: 10
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          readinessProbe:
 
            httpGet:
 
              path: /healthz
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 5
 
            periodSeconds: 5
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-mutating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: MutatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    # Only include 'sideEffects' field in Kubernetes 1.12+
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /mutate
 
---
 
# Source: cert-manager/templates/webhook-validating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: ValidatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    namespaceSelector:
 
      matchExpressions:
 
      - key: "cert-manager.io/disable-validation"
 
        operator: "NotIn"
 
        values:
 
        - "true"
 
      - key: "name"
 
        operator: "NotIn"
 
        values:
 
        - cert-manager
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /validate
00-defs/49-cert-manager-roles.yaml
Show inline comments
 
new file 100644
 

	
 
apiVersion: v1
 
kind: Namespace
 
metadata:
 
  name: cert-manager
 
---
 
# Source: cert-manager/templates/cainjector-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
---
 
# Source: cert-manager/templates/serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
---
 
# Source: cert-manager/templates/webhook-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["get", "create", "update", "patch"]
 
  - apiGroups: ["admissionregistration.k8s.io"]
 
    resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiregistration.k8s.io"]
 
    resources: ["apiservices"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiextensions.k8s.io"]
 
    resources: ["customresourcedefinitions"]
 
    verbs: ["get", "list", "watch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Issuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "issuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ClusterIssuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "clusterissuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Certificates controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/finalizers", "certificaterequests/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders"]
 
    verbs: ["create", "delete", "get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete", "patch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Orders controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "orders/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "challenges"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["create", "delete"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Challenges controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  # Use to update challenge resource status
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "challenges/status"]
 
    verbs: ["update", "patch"]
 
  # Used to watch challenge resources
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to watch challenges, issuer and clusterissuer resources
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  # Need to be able to retrieve ACME account private key to complete challenges
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to create events
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
  # HTTP01 rules
 
  - apiGroups: [""]
 
    resources: ["pods", "services"]
 
    verbs: ["get", "list", "watch", "create", "delete"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  - apiGroups: [ "gateway.networking.k8s.io" ]
 
    resources: [ "httproutes" ]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  # We require the ability to specify a custom hostname when we are creating
 
  # new ingress resources.
 
  # See: https://github.com/openshift/origin/blob/21f191775636f9acadb44fa42beeb4f75b255532/pkg/route/apiserver/admission/ingress_admission.go#L84-L148
 
  - apiGroups: ["route.openshift.io"]
 
    resources: ["routes/custom-host"]
 
    verbs: ["create"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges/finalizers"]
 
    verbs: ["update"]
 
  # DNS01 rules (duplicated above)
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ingress-shim controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests"]
 
    verbs: ["create", "update", "delete"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways", "httproutes"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways/finalizers", "httproutes/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-view
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
    rbac.authorization.k8s.io/aggregate-to-view: "true"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-edit
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/status"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to approve CertificateRequests referencing cert-manager.io Issuers and ClusterIssuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["signers"]
 
    verbs: ["approve"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to:
 
# - Update and sign CertificatSigningeRequests referencing cert-manager.io Issuers and ClusterIssuers
 
# - Perform SubjectAccessReviews to test whether users are able to reference Namespaced Issuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["signers"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
    verbs: ["sign"]
 
  - apiGroups: ["authorization.k8s.io"]
 
    resources: ["subjectaccessreviews"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
- apiGroups: ["authorization.k8s.io"]
 
  resources: ["subjectaccessreviews"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-cainjector
 
subjects:
 
  - name: cert-manager-cainjector
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-issuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-clusterissuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificates
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-orders
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-challenges
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-ingress-shim
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-approve:cert-manager-io
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificatesigningrequests
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-webhook:subjectaccessreviews
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# leader election rules
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  # Used for leader election by the controller
 
  # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
 
  #   see cmd/cainjector/start.go#L113
 
  # cert-manager-cainjector-leader-election-core is used by the SecretBased injector controller
 
  #   see cmd/cainjector/start.go#L137
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-cainjector-leader-election", "cert-manager-cainjector-leader-election-core"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-controller"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  resourceNames:
 
  - 'cert-manager-webhook-ca'
 
  verbs: ["get", "list", "watch", "update"]
 
# It's not possible to grant CREATE permission on a single resourceName.
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-cainjector:leaderelection
 
subjects:
 
  - kind: ServiceAccount
 
    name: cert-manager-cainjector
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager:leaderelection
 
subjects:
 
  - apiGroup: ""
 
    kind: ServiceAccount
 
    name: cert-manager
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-webhook:dynamic-serving
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
10-vols/claims.yaml
Show inline comments
 
new file 100644
 
apiVersion: v1
 
kind: PersistentVolumeClaim
 
metadata:
 
  namespace: pomerium
 
  name: autocert-data
 
spec:
 
  storageClassName: ""
 
  volumeName: "autocert-data"
 
  accessModes:
 
    - ReadWriteOnce
 
  resources:
 
    requests:
 
      storage: 5Gi
 
      
 
\ No newline at end of file
10-vols/volumes.yaml
Show inline comments
 
file renamed from kube/03-volumes.yaml to 10-vols/volumes.yaml
20-kube/10-pom-pom.yaml
Show inline comments
 
file renamed from kube/10-pomerium.yaml to 20-kube/10-pom-pom.yaml
20-kube/20-pom-deploy.yaml
Show inline comments
 
file renamed from kube/20-deployment.yaml to 20-kube/20-pom-deploy.yaml
20-kube/21-pom-svc.yaml
Show inline comments
 
new file 100644
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  labels:
 
    app.kubernetes.io/name: pomerium
 
  name: pomerium-metrics
 
  namespace: pomerium
 
spec:
 
  ports:
 
    - { name: metrics, port: 9090, protocol: TCP, targetPort: metrics }
 
  selector: { app.kubernetes.io/name: pomerium }
 
  type: ClusterIP
 
---
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  labels:
 
    app.kubernetes.io/name: pomerium
 
  name: pomerium-proxy
 
  namespace: pomerium
 
spec:
 
  ports:
 
    - { name: https, port: 443, protocol: TCP, targetPort: https }
 
    - { name: http, port: 80, protocol: TCP, targetPort: http }
 
  selector: { app.kubernetes.io/name: pomerium }
 
  type: LoadBalancer
 
  externalIPs:
 
  # prime forwards to this
 
    - 10.5.0.1
 
  # local dns picks this
 
    - 10.2.0.1
 
\ No newline at end of file
30-cert-manager/50-cert-manager.yaml
Show inline comments
 
new file 100644
 
# Copyright 2021 The cert-manager Authors.
 
#
 
# Licensed under the Apache License, Version 2.0 (the "License");
 
# you may not use this file except in compliance with the License.
 
# You may obtain a copy of the License at
 
#
 
#     http://www.apache.org/licenses/LICENSE-2.0
 
#
 
# Unless required by applicable law or agreed to in writing, software
 
# distributed under the License is distributed on an "AS IS" BASIS,
 
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 
# See the License for the specific language governing permissions and
 
# limitations under the License.
 
# Source: cert-manager/templates/webhook-config.yaml
 
apiVersion: v1
 
kind: ConfigMap
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
data:
 
---
 
# Source: cert-manager/templates/service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - protocol: TCP
 
    port: 9402
 
    name: tcp-prometheus-servicemonitor
 
    targetPort: 9402
 
  selector:
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
---
 
# Source: cert-manager/templates/webhook-service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - name: https
 
    port: 443
 
    protocol: TCP
 
    targetPort: "https"
 
  selector:
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
---
 
# Source: cert-manager/templates/cainjector-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cainjector
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "cainjector"
 
  template:
 
    metadata:
 
      labels:
 
        app: cainjector
 
        app.kubernetes.io/name: cainjector
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "cainjector"
 
        app.kubernetes.io/version: "v1.10.1"
 
    spec:
 
      serviceAccountName: cert-manager-cainjector
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-cainjector:v1.10.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --leader-election-namespace=kube-system
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cert-manager
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "controller"
 
  template:
 
    metadata:
 
      labels:
 
        app: cert-manager
 
        app.kubernetes.io/name: cert-manager
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "controller"
 
        app.kubernetes.io/version: "v1.10.1"
 
      annotations:
 
        prometheus.io/path: "/metrics"
 
        prometheus.io/scrape: 'true'
 
        prometheus.io/port: '9402'
 
    spec:
 
      serviceAccountName: cert-manager
 
      securityContext:
 
        runAsNonRoot: true
 
      # https://github.com/cert-manager/cert-manager/issues/4941#issuecomment-1189160798
 
      dnsPolicy: None
 
      dnsConfig:
 
        nameservers:
 
          - 8.8.4.4
 
          - 8.8.8.8
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-controller:v1.10.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --cluster-resource-namespace=$(POD_NAMESPACE)
 
          - --leader-election-namespace=kube-system
 
          ports:
 
          - containerPort: 9402
 
            name: http-metrics
 
            protocol: TCP
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: webhook
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "webhook"
 
  template:
 
    metadata:
 
      labels:
 
        app: webhook
 
        app.kubernetes.io/name: webhook
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "webhook"
 
        app.kubernetes.io/version: "v1.10.1"
 
    spec:
 
      serviceAccountName: cert-manager-webhook
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-webhook:v1.10.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --secure-port=10250
 
          - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
 
          - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
 
          - --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
 
          ports:
 
          - name: https
 
            protocol: TCP
 
            containerPort: 10250
 
          livenessProbe:
 
            httpGet:
 
              path: /livez
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 60
 
            periodSeconds: 10
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          readinessProbe:
 
            httpGet:
 
              path: /healthz
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 5
 
            periodSeconds: 5
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-mutating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: MutatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    # Only include 'sideEffects' field in Kubernetes 1.12+
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /mutate
 
---
 
# Source: cert-manager/templates/webhook-validating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: ValidatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    namespaceSelector:
 
      matchExpressions:
 
      - key: "cert-manager.io/disable-validation"
 
        operator: "NotIn"
 
        values:
 
        - "true"
 
      - key: "name"
 
        operator: "NotIn"
 
        values:
 
        - cert-manager
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /validate
30-cert-manager/51-pomerium-production-issuer.yaml
Show inline comments
 
file renamed from kube/51-pomerium-production-issuer.yaml to 30-cert-manager/51-pomerium-production-issuer.yaml
30-cert-manager/51-pomerium-staging-issuer.yaml
Show inline comments
 
file renamed from kube/51-pomerium-staging-issuer.yaml to 30-cert-manager/51-pomerium-staging-issuer.yaml
30-cert-manager/60-auth-cert.yaml
Show inline comments
 
file renamed from auth-cert.yaml to 30-cert-manager/60-auth-cert.yaml

Changeset was too big and was cut off... Show full diff anyway

0 comments (0 inline, 0 general)