Changeset - 0ae82df13719
[Not reviewed]
default
9 0 15
drewp@bigasterisk.com - 2 years ago 2022-12-13 07:15:13
drewp@bigasterisk.com
renames and file splits, mostly
13 files changed:
0 comments (0 inline, 0 general)
00-defs/00-namespace.yaml
Show inline comments
 
file renamed from kube/00-namespace.yaml to 00-defs/00-namespace.yaml
00-defs/01-crd.yaml
Show inline comments
 
new file 100644
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  annotations:
 
    controller-gen.kubebuilder.io/version: v0.9.0
 
  creationTimestamp: null
 
  labels:
 
    app.kubernetes.io/name: pomerium
 
  name: pomerium.ingress.pomerium.io
 
spec:
 
  group: ingress.pomerium.io
 
  names:
 
    kind: Pomerium
 
    listKind: PomeriumList
 
    plural: pomerium
 
    singular: pomerium
 
  scope: Cluster
 
  versions:
 
  - name: v1
 
    schema:
 
      openAPIV3Schema:
 
        description: Pomerium define runtime-configurable Pomerium settings that do
 
          not fall into the category of deployment parameters
 
        properties:
 
          apiVersion:
 
            description: 'APIVersion defines the versioned schema of this representation
 
              of an object. Servers should convert recognized schemas to the latest
 
              internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
            type: string
 
          kind:
 
            description: 'Kind is a string value representing the REST resource this
 
              object represents. Servers may infer this from the endpoint the client
 
              submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
            type: string
 
          metadata:
 
            type: object
 
          spec:
 
            description: PomeriumSpec defines Pomerium-specific configuration parameters.
 
            properties:
 
              authenticate:
 
                description: Authenticate sets authenticate service parameters
 
                properties:
 
                  callbackPath:
 
                    description: "CallbackPath sets the path at which the authenticate
 
                      service receives callback responses from your identity provider.
 
                      The value must exactly match one of the authorized redirect
 
                      URIs for the OAuth 2.0 client. \n <p>This value is referred
 
                      to as the redirect_url in the OpenIDConnect and OAuth2 specs.</p>
 
                      <p>Defaults to <code>/oauth2/callback</code></p>"
 
                    type: string
 
                  url:
 
                    description: "AuthenticateURL is a dedicated domain URL the non-authenticated
 
                      persons would be referred to. \n <p><ul> <li>You do not need
 
                      to create a dedicated <code>Ingress</code> for this virtual
 
                      route, as it is handled by Pomerium internally. </li> <li>You
 
                      do need create a secret with corresponding TLS certificate for
 
                      this route and reference it via <a href=\"#prop-certificates\"><code>certificates</code></a>.
 
                      If you use <code>cert-manager</code> with <code>HTTP01</code>
 
                      challenge, you may use <code>pomerium</code> <code>ingressClass</code>
 
                      to solve it.</li> </ul></p>"
 
                    format: uri
 
                    pattern: ^https://
 
                    type: string
 
                required:
 
                - url
 
                type: object
 
              certificates:
 
                description: Certificates is a list of secrets of type TLS to use
 
                format: namespace/name
 
                items:
 
                  type: string
 
                type: array
 
              cookie:
 
                description: Cookie defines Pomerium session cookie options.
 
                properties:
 
                  domain:
 
                    description: Domain defaults to the same host that set the cookie.
 
                      If you specify the domain explicitly, then subdomains would
 
                      also be included.
 
                    type: string
 
                  expire:
 
                    description: Expire sets cookie and Pomerium session expiration
 
                      time. Once session expires, users would have to re-login. If
 
                      you change this parameter, existing sessions are not affected.
 
                      <p>See <a href="https://www.pomerium.com/docs/enterprise/about#session-management">Session
 
                      Management</a> (Enterprise) for a more fine-grained session
 
                      controls.</p> <p>Defaults to 14 hours.</p>
 
                    format: duration
 
                    type: string
 
                  httpOnly:
 
                    description: HTTPOnly if set to <code>false</code>, the cookie
 
                      would be accessible from within the JavaScript. Defaults to
 
                      <code>true</code>.
 
                    type: boolean
 
                  name:
 
                    description: Name sets the Pomerium session cookie name. Defaults
 
                      to <code>_pomerium</code>
 
                    type: string
 
                  secure:
 
                    description: Secure if set to false, would make a cookie accessible
 
                      over insecure protocols (HTTP). Defaults to <code>true</code>.
 
                    type: boolean
 
                type: object
 
              identityProvider:
 
                description: IdentityProvider configure single-sign-on authentication
 
                  and user identity details by integrating with your <a href="https://www.pomerium.com/docs/identity-providers/">Identity
 
                  Provider</a>
 
                properties:
 
                  provider:
 
                    description: Provider is the short-hand name of a built-in OpenID
 
                      Connect (oidc) identity provider to be used for authentication.
 
                      To use a generic provider, set to <code>oidc</code>.
 
                    enum:
 
                    - auth0
 
                    - azure
 
                    - google
 
                    - okta
 
                    - onelogin
 
                    - oidc
 
                    - ping
 
                    - github
 
                    type: string
 
                  refreshDirectory:
 
                    description: RefreshDirectory is no longer supported, please see
 
                      <a href="https://docs.pomerium.com/docs/overview/upgrading#idp-directory-sync">Upgrade
 
                      Guide</a>.
 
                    properties:
 
                      interval:
 
                        description: interval is the time that pomerium will sync
 
                          your IDP directory.
 
                        format: duration
 
                        type: string
 
                      timeout:
 
                        description: timeout is the maximum time allowed each run.
 
                        format: duration
 
                        type: string
 
                    required:
 
                    - interval
 
                    - timeout
 
                    type: object
 
                  requestParams:
 
                    additionalProperties:
 
                      type: string
 
                    description: RequestParams to be added as part of a signin request
 
                      using OAuth2 code flow.
 
                    format: namespace/name
 
                    type: object
 
                  requestParamsSecret:
 
                    description: RequestParamsSecret is a reference to a secret for
 
                      additional parameters you'd prefer not to provide in plaintext.
 
                    format: namespace/name
 
                    type: string
 
                  scopes:
 
                    description: Scopes Identity provider scopes correspond to access
 
                      privilege scopes as defined in Section 3.3 of OAuth 2.0 RFC6749.
 
                    items:
 
                      type: string
 
                    type: array
 
                  secret:
 
                    description: Secret containing IdP provider specific parameters.
 
                      and must contain at least <code>client_id</code> and <code>client_secret</code>
 
                      values.
 
                    format: namespace/name
 
                    minLength: 1
 
                    type: string
 
                  serviceAccountFromSecret:
 
                    description: ServiceAccountFromSecret is no longer supported,
 
                      see <a href="https://docs.pomerium.com/docs/overview/upgrading#idp-directory-sync">Upgrade
 
                      Guide</a>.
 
                    type: string
 
                  url:
 
                    description: URL is the base path to an identity provider's OpenID
 
                      connect discovery document. See <a href="https://pomerium.com/docs/identity-providers">Identity
 
                      Providers</a> guides for details.
 
                    format: uri
 
                    pattern: ^https://
 
                    type: string
 
                required:
 
                - provider
 
                - secret
 
                type: object
 
              jwtClaimHeaders:
 
                additionalProperties:
 
                  type: string
 
                description: JWTClaimHeaders convert claims from the assertion token
 
                  into HTTP headers and adds them into JWT assertion header. Please
 
                  make sure to read <a href="https://www.pomerium.com/docs/topics/getting-users-identity">
 
                  Getting User Identity</a> guide.
 
                type: object
 
              secrets:
 
                description: "Secrets references a Secret with Pomerium bootstrap
 
                  parameters. \n <p> <ul> <li><a href=\"https://pomerium.com/docs/reference/shared-secret\"><code>shared_secret</code></a>
 
                  - secures inter-Pomerium service communications. </li> <li><a href=\"https://pomerium.com/docs/reference/cookie-secret\"><code>cookie_secret</code></a>
 
                  - encrypts Pomerium session browser cookie. See also other <a href=\"#cookie\">Cookie</a>
 
                  parameters. </li> <li><a href=\"https://pomerium.com/docs/reference/signing-key\"><code>signing_key</code></a>
 
                  signs Pomerium JWT assertion header. See <a href=\"https://www.pomerium.com/docs/topics/getting-users-identity\">Getting
 
                  the user's identity</a> guide. </li> </ul> </p> <p> In a default
 
                  Pomerium installation manifest, they would be generated via a <a
 
                  href=\"https://github.com/pomerium/ingress-controller/blob/main/config/gen_secrets/job.yaml\">one-time
 
                  job</a> and stored in a <code>pomerium/bootstrap</code> Secret.
 
                  You may re-run the job to rotate the secrets, or update the Secret
 
                  values manually. </p>"
 
                format: namespace/name
 
                minLength: 1
 
                type: string
 
              storage:
 
                description: Storage defines persistent storage for sessions and other
 
                  data. See <a href="https://www.pomerium.com/docs/topics/data-storage">Storage</a>
 
                  for details. If no storage is specified, Pomerium would use a transient
 
                  in-memory storage (not recommended for production).
 
                properties:
 
                  postgres:
 
                    description: Postgres specifies PostgreSQL database connection
 
                      parameters
 
                    properties:
 
                      caSecret:
 
                        description: CASecret should refer to a k8s secret with key
 
                          <code>ca.crt</code> containing CA certificate that, if specified,
 
                          would be used to populate <code>sslrootcert</code> parameter
 
                          of the connection string.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      secret:
 
                        description: Secret specifies a name of a Secret that must
 
                          contain <code>connection</code> key. See <a href="https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-CONNSTRING">DSN
 
                          Format and Parameters</a>. Do not set <code>sslrootcert</code>,
 
                          <code>sslcert</code> and <code>sslkey</code> via connection
 
                          string, use <code>tlsCecret</code> and <code>caSecret</code>
 
                          CRD options instead.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      tlsSecret:
 
                        description: TLSSecret should refer to a k8s secret of type
 
                          <code>kubernetes.io/tls</code> and allows to specify an
 
                          optional client certificate and key, by constructing <code>sslcert</code>
 
                          and <code>sslkey</code> connection string <a href="https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-PARAMKEYWORDS">
 
                          parameter values</a>.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                    required:
 
                    - secret
 
                    type: object
 
                  redis:
 
                    description: Redis defines REDIS connection parameters
 
                    properties:
 
                      caSecret:
 
                        description: CASecret should refer to a k8s secret with key
 
                          <code>ca.crt</code> that must be a PEM-encoded certificate
 
                          authority to use when connecting to the databroker storage
 
                          engine.
 
                        format: namespace/name
 
                        type: string
 
                      secret:
 
                        description: Secret specifies a name of a Secret that must
 
                          contain <code>connection</code> key.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      tlsSecret:
 
                        description: TLSSecret should refer to a k8s secret of type
 
                          <code>kubernetes.io/tls</code> that would be used to perform
 
                          TLS connection to REDIS.
 
                        format: namespace/name
 
                        minLength: 1
 
                        type: string
 
                      tlsSkipVerify:
 
                        description: TLSSkipVerify disables TLS certificate chain
 
                          validation.
 
                        type: boolean
 
                    required:
 
                    - secret
 
                    type: object
 
                type: object
 
            required:
 
            - authenticate
 
            - identityProvider
 
            - secrets
 
            type: object
 
          status:
 
            description: PomeriumStatus represents configuration and Ingress status.
 
            properties:
 
              ingress:
 
                additionalProperties:
 
                  description: ResourceStatus represents the outcome of the latest
 
                    attempt to reconcile relevant Kubernetes resource with Pomerium.
 
                  properties:
 
                    error:
 
                      description: Error that prevented latest observedGeneration
 
                        to be synchronized with Pomerium.
 
                      type: string
 
                    observedAt:
 
                      description: ObservedAt is when last reconciliation attempt
 
                        was made.
 
                      format: date-time
 
                      type: string
 
                    observedGeneration:
 
                      description: ObservedGeneration represents the <code>.metadata.generation</code>
 
                        that was last presented to Pomerium.
 
                      format: int64
 
                      type: integer
 
                    reconciled:
 
                      description: Reconciled is whether this object generation was
 
                        successfully synced with pomerium.
 
                      type: boolean
 
                    warnings:
 
                      description: Warnings while parsing the resource.
 
                      items:
 
                        type: string
 
                      type: array
 
                  required:
 
                  - reconciled
 
                  type: object
 
                description: Routes provide per-Ingress status.
 
                type: object
 
              settingsStatus:
 
                description: SettingsStatus represent most recent main configuration
 
                  reconciliation status.
 
                properties:
 
                  error:
 
                    description: Error that prevented latest observedGeneration to
 
                      be synchronized with Pomerium.
 
                    type: string
 
                  observedAt:
 
                    description: ObservedAt is when last reconciliation attempt was
 
                      made.
 
                    format: date-time
 
                    type: string
 
                  observedGeneration:
 
                    description: ObservedGeneration represents the <code>.metadata.generation</code>
 
                      that was last presented to Pomerium.
 
                    format: int64
 
                    type: integer
 
                  reconciled:
 
                    description: Reconciled is whether this object generation was
 
                      successfully synced with pomerium.
 
                    type: boolean
 
                  warnings:
 
                    description: Warnings while parsing the resource.
 
                    items:
 
                      type: string
 
                    type: array
 
                required:
 
                - reconciled
 
                type: object
 
            type: object
 
        type: object
 
    served: true
 
    storage: true
 
    subresources:
 
      status: {}
00-defs/49-cert-manager-crd.yaml
Show inline comments
 
file renamed from kube/50-cert-manager.yaml to 00-defs/49-cert-manager-crd.yaml
 
# Copyright 2021 The cert-manager Authors.
 
#
 
# Licensed under the Apache License, Version 2.0 (the "License");
 
# you may not use this file except in compliance with the License.
 
# You may obtain a copy of the License at
 
#
 
#     http://www.apache.org/licenses/LICENSE-2.0
 
#
 
# Unless required by applicable law or agreed to in writing, software
 
# distributed under the License is distributed on an "AS IS" BASIS,
 
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 
# See the License for the specific language governing permissions and
 
# limitations under the License.
 

	
 
apiVersion: v1
 
kind: Namespace
 
metadata:
 
  name: cert-manager
 
---
 
# Source: cert-manager/templates/crd-templates.yaml
 
apiVersion: apiextensions.k8s.io/v1
 
kind: CustomResourceDefinition
 
metadata:
 
  name: certificaterequests.cert-manager.io
 
  labels:
 
    app: 'cert-manager'
 
    app.kubernetes.io/name: 'cert-manager'
 
    app.kubernetes.io/instance: 'cert-manager'
 
    # Generated labels
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  group: cert-manager.io
 
  names:
 
    kind: CertificateRequest
 
    listKind: CertificateRequestList
 
    plural: certificaterequests
 
    shortNames:
 
      - cr
 
      - crs
 
    singular: certificaterequest
 
    categories:
 
      - cert-manager
 
  scope: Namespaced
 
  versions:
 
    - name: v1
 
      subresources:
 
        status: {}
 
      additionalPrinterColumns:
 
        - jsonPath: .status.conditions[?(@.type=="Approved")].status
 
          name: Approved
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Denied")].status
 
          name: Denied
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].status
 
          name: Ready
 
          type: string
 
        - jsonPath: .spec.issuerRef.name
 
          name: Issuer
 
          type: string
 
        - jsonPath: .spec.username
 
          name: Requestor
 
          type: string
 
        - jsonPath: .status.conditions[?(@.type=="Ready")].message
 
          name: Status
 
          priority: 1
 
          type: string
 
        - jsonPath: .metadata.creationTimestamp
 
          description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
 
          name: Age
 
          type: date
 
      schema:
 
        openAPIV3Schema:
 
          description: "A CertificateRequest is used to request a signed certificate from one of the configured issuers. \n All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `status.state` field. \n A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used."
 
          type: object
 
          required:
 
            - spec
 
          properties:
 
            apiVersion:
 
              description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
 
              type: string
 
            kind:
 
              description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
 
              type: string
 
            metadata:
 
              type: object
 
            spec:
 
              description: Desired state of the CertificateRequest resource.
 
              type: object
 
              required:
 
                - issuerRef
 
                - request
 
              properties:
 
                duration:
 
                  description: The requested 'duration' (i.e. lifetime) of the Certificate. This option may be ignored/overridden by some issuer types.
 
                  type: string
 
                extra:
 
                  description: Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: object
 
                  additionalProperties:
 
                    type: array
 
                    items:
 
                      type: string
 
                groups:
 
                  description: Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable.
 
                  type: array
 
                  items:
 
                    type: string
 
                  x-kubernetes-list-type: atomic
 
                isCA:
 
                  description: IsCA will request to mark the certificate as valid for certificate signing when submitting to the issuer. This will automatically add the `cert sign` usage to the list of `usages`.
 
                  type: boolean
 
                issuerRef:
 
                  description: IssuerRef is a reference to the issuer for this CertificateRequest.  If the `kind` field is not set, or set to `Issuer`, an Issuer resource with the given name in the same namespace as the CertificateRequest will be used.  If the `kind` field is set to `ClusterIssuer`, a ClusterIssuer with the provided name will be used. The `name` field in this stanza is required at all times. The group field refers to the API group of the issuer which defaults to `cert-manager.io` if empty.
 
                  type: object
 
@@ -4249,1174 +4230,96 @@ spec:
 
                  properties:
 
                    group:
 
                      description: Group of the resource being referred to.
 
                      type: string
 
                    kind:
 
                      description: Kind of the resource being referred to.
 
                      type: string
 
                    name:
 
                      description: Name of the resource being referred to.
 
                      type: string
 
                request:
 
                  description: Certificate signing request bytes in DER encoding. This will be used when finalizing the order. This field must be set on the order.
 
                  type: string
 
                  format: byte
 
            status:
 
              type: object
 
              properties:
 
                authorizations:
 
                  description: Authorizations contains data returned from the ACME server on what authorizations must be completed in order to validate the DNS names specified on the Order.
 
                  type: array
 
                  items:
 
                    description: ACMEAuthorization contains data returned from the ACME server on an authorization that must be completed in order validate a DNS name on an ACME Order resource.
 
                    type: object
 
                    required:
 
                      - url
 
                    properties:
 
                      challenges:
 
                        description: Challenges specifies the challenge types offered by the ACME server. One of these challenge types will be selected when validating the DNS name and an appropriate Challenge resource will be created to perform the ACME challenge process.
 
                        type: array
 
                        items:
 
                          description: Challenge specifies a challenge offered by the ACME server for an Order. An appropriate Challenge resource can be created to perform the ACME challenge process.
 
                          type: object
 
                          required:
 
                            - token
 
                            - type
 
                            - url
 
                          properties:
 
                            token:
 
                              description: Token is the token that must be presented for this challenge. This is used to compute the 'key' that must also be presented.
 
                              type: string
 
                            type:
 
                              description: Type is the type of challenge being offered, e.g. 'http-01', 'dns-01', 'tls-sni-01', etc. This is the raw value retrieved from the ACME server. Only 'http-01' and 'dns-01' are supported by cert-manager, other values will be ignored.
 
                              type: string
 
                            url:
 
                              description: URL is the URL of this challenge. It can be used to retrieve additional metadata about the Challenge from the ACME server.
 
                              type: string
 
                      identifier:
 
                        description: Identifier is the DNS name to be validated as part of this authorization
 
                        type: string
 
                      initialState:
 
                        description: InitialState is the initial state of the ACME authorization when first fetched from the ACME server. If an Authorization is already 'valid', the Order controller will not create a Challenge resource for the authorization. This will occur when working with an ACME server that enables 'authz reuse' (such as Let's Encrypt's production endpoint). If not set and 'identifier' is set, the state is assumed to be pending and a Challenge will be created.
 
                        type: string
 
                        enum:
 
                          - valid
 
                          - ready
 
                          - pending
 
                          - processing
 
                          - invalid
 
                          - expired
 
                          - errored
 
                      url:
 
                        description: URL is the URL of the Authorization that must be completed
 
                        type: string
 
                      wildcard:
 
                        description: Wildcard will be true if this authorization is for a wildcard DNS name. If this is true, the identifier will be the *non-wildcard* version of the DNS name. For example, if '*.example.com' is the DNS name being validated, this field will be 'true' and the 'identifier' field will be 'example.com'.
 
                        type: boolean
 
                certificate:
 
                  description: Certificate is a copy of the PEM encoded certificate for this Order. This field will be populated after the order has been successfully finalized with the ACME server, and the order has transitioned to the 'valid' state.
 
                  type: string
 
                  format: byte
 
                failureTime:
 
                  description: FailureTime stores the time that this order failed. This is used to influence garbage collection and back-off.
 
                  type: string
 
                  format: date-time
 
                finalizeURL:
 
                  description: FinalizeURL of the Order. This is used to obtain certificates for this order once it has been completed.
 
                  type: string
 
                reason:
 
                  description: Reason optionally provides more information about a why the order is in the current state.
 
                  type: string
 
                state:
 
                  description: State contains the current state of this Order resource. States 'success' and 'expired' are 'final'
 
                  type: string
 
                  enum:
 
                    - valid
 
                    - ready
 
                    - pending
 
                    - processing
 
                    - invalid
 
                    - expired
 
                    - errored
 
                url:
 
                  description: URL of the Order. This will initially be empty when the resource is first created. The Order controller will populate this field when the Order is first processed. This field will be immutable after it is initially set.
 
                  type: string
 
      served: true
 
      storage: true
 
---
 
# Source: cert-manager/templates/cainjector-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
---
 
# Source: cert-manager/templates/serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
---
 
# Source: cert-manager/templates/webhook-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
---
 
# Source: cert-manager/templates/webhook-config.yaml
 
apiVersion: v1
 
kind: ConfigMap
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
data:
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["get", "create", "update", "patch"]
 
  - apiGroups: ["admissionregistration.k8s.io"]
 
    resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiregistration.k8s.io"]
 
    resources: ["apiservices"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiextensions.k8s.io"]
 
    resources: ["customresourcedefinitions"]
 
    verbs: ["get", "list", "watch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Issuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "issuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ClusterIssuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "clusterissuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Certificates controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/finalizers", "certificaterequests/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders"]
 
    verbs: ["create", "delete", "get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete", "patch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Orders controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "orders/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "challenges"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["create", "delete"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Challenges controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  # Use to update challenge resource status
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "challenges/status"]
 
    verbs: ["update", "patch"]
 
  # Used to watch challenge resources
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to watch challenges, issuer and clusterissuer resources
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  # Need to be able to retrieve ACME account private key to complete challenges
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to create events
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
  # HTTP01 rules
 
  - apiGroups: [""]
 
    resources: ["pods", "services"]
 
    verbs: ["get", "list", "watch", "create", "delete"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  - apiGroups: [ "gateway.networking.k8s.io" ]
 
    resources: [ "httproutes" ]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  # We require the ability to specify a custom hostname when we are creating
 
  # new ingress resources.
 
  # See: https://github.com/openshift/origin/blob/21f191775636f9acadb44fa42beeb4f75b255532/pkg/route/apiserver/admission/ingress_admission.go#L84-L148
 
  - apiGroups: ["route.openshift.io"]
 
    resources: ["routes/custom-host"]
 
    verbs: ["create"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges/finalizers"]
 
    verbs: ["update"]
 
  # DNS01 rules (duplicated above)
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ingress-shim controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests"]
 
    verbs: ["create", "update", "delete"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways", "httproutes"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways/finalizers", "httproutes/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-view
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
    rbac.authorization.k8s.io/aggregate-to-view: "true"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-edit
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/status"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to approve CertificateRequests referencing cert-manager.io Issuers and ClusterIssuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["signers"]
 
    verbs: ["approve"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to:
 
# - Update and sign CertificatSigningeRequests referencing cert-manager.io Issuers and ClusterIssuers
 
# - Perform SubjectAccessReviews to test whether users are able to reference Namespaced Issuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["signers"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
    verbs: ["sign"]
 
  - apiGroups: ["authorization.k8s.io"]
 
    resources: ["subjectaccessreviews"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
- apiGroups: ["authorization.k8s.io"]
 
  resources: ["subjectaccessreviews"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-cainjector
 
subjects:
 
  - name: cert-manager-cainjector
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-issuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-clusterissuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificates
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-orders
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-challenges
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-ingress-shim
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-approve:cert-manager-io
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificatesigningrequests
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-webhook:subjectaccessreviews
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# leader election rules
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  # Used for leader election by the controller
 
  # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
 
  #   see cmd/cainjector/start.go#L113
 
  # cert-manager-cainjector-leader-election-core is used by the SecretBased injector controller
 
  #   see cmd/cainjector/start.go#L137
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-cainjector-leader-election", "cert-manager-cainjector-leader-election-core"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-controller"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
rules:
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  resourceNames:
 
  - 'cert-manager-webhook-ca'
 
  verbs: ["get", "list", "watch", "update"]
 
# It's not possible to grant CREATE permission on a single resourceName.
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-cainjector:leaderelection
 
subjects:
 
  - kind: ServiceAccount
 
    name: cert-manager-cainjector
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager:leaderelection
 
subjects:
 
  - apiGroup: ""
 
    kind: ServiceAccount
 
    name: cert-manager
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-webhook:dynamic-serving
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
 
# Source: cert-manager/templates/service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - protocol: TCP
 
    port: 9402
 
    name: tcp-prometheus-servicemonitor
 
    targetPort: 9402
 
  selector:
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
---
 
# Source: cert-manager/templates/webhook-service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - name: https
 
    port: 443
 
    protocol: TCP
 
    targetPort: "https"
 
  selector:
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
---
 
# Source: cert-manager/templates/cainjector-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cainjector
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "cainjector"
 
  template:
 
    metadata:
 
      labels:
 
        app: cainjector
 
        app.kubernetes.io/name: cainjector
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "cainjector"
 
        app.kubernetes.io/version: "v1.9.1"
 
    spec:
 
      serviceAccountName: cert-manager-cainjector
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-cainjector:v1.9.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --leader-election-namespace=kube-system
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cert-manager
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "controller"
 
  template:
 
    metadata:
 
      labels:
 
        app: cert-manager
 
        app.kubernetes.io/name: cert-manager
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "controller"
 
        app.kubernetes.io/version: "v1.9.1"
 
      annotations:
 
        prometheus.io/path: "/metrics"
 
        prometheus.io/scrape: 'true'
 
        prometheus.io/port: '9402'
 
    spec:
 
      serviceAccountName: cert-manager
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-controller:v1.9.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --cluster-resource-namespace=$(POD_NAMESPACE)
 
          - --leader-election-namespace=kube-system
 
          ports:
 
          - containerPort: 9402
 
            name: http-metrics
 
            protocol: TCP
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: webhook
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "webhook"
 
  template:
 
    metadata:
 
      labels:
 
        app: webhook
 
        app.kubernetes.io/name: webhook
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "webhook"
 
        app.kubernetes.io/version: "v1.9.1"
 
    spec:
 
      serviceAccountName: cert-manager-webhook
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-webhook:v1.9.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --secure-port=10250
 
          - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
 
          - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
 
          - --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
 
          ports:
 
          - name: https
 
            protocol: TCP
 
            containerPort: 10250
 
          livenessProbe:
 
            httpGet:
 
              path: /livez
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 60
 
            periodSeconds: 10
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          readinessProbe:
 
            httpGet:
 
              path: /healthz
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 5
 
            periodSeconds: 5
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-mutating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: MutatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    # Only include 'sideEffects' field in Kubernetes 1.12+
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /mutate
 
---
 
# Source: cert-manager/templates/webhook-validating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: ValidatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.9.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    namespaceSelector:
 
      matchExpressions:
 
      - key: "cert-manager.io/disable-validation"
 
        operator: "NotIn"
 
        values:
 
        - "true"
 
      - key: "name"
 
        operator: "NotIn"
 
        values:
 
        - cert-manager
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /validate
00-defs/49-cert-manager-roles.yaml
Show inline comments
 
new file 100644
 

	
 
apiVersion: v1
 
kind: Namespace
 
metadata:
 
  name: cert-manager
 
---
 
# Source: cert-manager/templates/cainjector-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
---
 
# Source: cert-manager/templates/serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
---
 
# Source: cert-manager/templates/webhook-serviceaccount.yaml
 
apiVersion: v1
 
kind: ServiceAccount
 
automountServiceAccountToken: true
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["get", "create", "update", "patch"]
 
  - apiGroups: ["admissionregistration.k8s.io"]
 
    resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiregistration.k8s.io"]
 
    resources: ["apiservices"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["apiextensions.k8s.io"]
 
    resources: ["customresourcedefinitions"]
 
    verbs: ["get", "list", "watch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Issuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "issuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ClusterIssuer controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "clusterissuers/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Certificates controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/finalizers", "certificaterequests/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders"]
 
    verbs: ["create", "delete", "get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch", "create", "update", "delete", "patch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Orders controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "orders/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders", "challenges"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["clusterissuers", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["create", "delete"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["orders/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Challenges controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  # Use to update challenge resource status
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "challenges/status"]
 
    verbs: ["update", "patch"]
 
  # Used to watch challenge resources
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to watch challenges, issuer and clusterissuer resources
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  # Need to be able to retrieve ACME account private key to complete challenges
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
  # Used to create events
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
  # HTTP01 rules
 
  - apiGroups: [""]
 
    resources: ["pods", "services"]
 
    verbs: ["get", "list", "watch", "create", "delete"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  - apiGroups: [ "gateway.networking.k8s.io" ]
 
    resources: [ "httproutes" ]
 
    verbs: ["get", "list", "watch", "create", "delete", "update"]
 
  # We require the ability to specify a custom hostname when we are creating
 
  # new ingress resources.
 
  # See: https://github.com/openshift/origin/blob/21f191775636f9acadb44fa42beeb4f75b255532/pkg/route/apiserver/admission/ingress_admission.go#L84-L148
 
  - apiGroups: ["route.openshift.io"]
 
    resources: ["routes/custom-host"]
 
    verbs: ["create"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges/finalizers"]
 
    verbs: ["update"]
 
  # DNS01 rules (duplicated above)
 
  - apiGroups: [""]
 
    resources: ["secrets"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# ingress-shim controller role
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests"]
 
    verbs: ["create", "update", "delete"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses"]
 
    verbs: ["get", "list", "watch"]
 
  # We require these rules to support users with the OwnerReferencesPermissionEnforcement
 
  # admission controller enabled:
 
  # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
 
  - apiGroups: ["networking.k8s.io"]
 
    resources: ["ingresses/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways", "httproutes"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["gateway.networking.k8s.io"]
 
    resources: ["gateways/finalizers", "httproutes/finalizers"]
 
    verbs: ["update"]
 
  - apiGroups: [""]
 
    resources: ["events"]
 
    verbs: ["create", "patch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-view
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
    rbac.authorization.k8s.io/aggregate-to-view: "true"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["get", "list", "watch"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["get", "list", "watch"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-edit
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
    rbac.authorization.k8s.io/aggregate-to-edit: "true"
 
    rbac.authorization.k8s.io/aggregate-to-admin: "true"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates", "certificaterequests", "issuers"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["certificates/status"]
 
    verbs: ["update"]
 
  - apiGroups: ["acme.cert-manager.io"]
 
    resources: ["challenges", "orders"]
 
    verbs: ["create", "delete", "deletecollection", "patch", "update"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to approve CertificateRequests referencing cert-manager.io Issuers and ClusterIssuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["cert-manager.io"]
 
    resources: ["signers"]
 
    verbs: ["approve"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# Permission to:
 
# - Update and sign CertificatSigningeRequests referencing cert-manager.io Issuers and ClusterIssuers
 
# - Perform SubjectAccessReviews to test whether users are able to reference Namespaced Issuers
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests"]
 
    verbs: ["get", "list", "watch", "update"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["certificatesigningrequests/status"]
 
    verbs: ["update", "patch"]
 
  - apiGroups: ["certificates.k8s.io"]
 
    resources: ["signers"]
 
    resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
 
    verbs: ["sign"]
 
  - apiGroups: ["authorization.k8s.io"]
 
    resources: ["subjectaccessreviews"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRole
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
- apiGroups: ["authorization.k8s.io"]
 
  resources: ["subjectaccessreviews"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-cainjector
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-cainjector
 
subjects:
 
  - name: cert-manager-cainjector
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-issuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-issuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-clusterissuers
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-clusterissuers
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificates
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificates
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-orders
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-orders
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-challenges
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-challenges
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-ingress-shim
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-ingress-shim
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-approve:cert-manager-io
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-approve:cert-manager-io
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-controller-certificatesigningrequests
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cert-manager"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-controller-certificatesigningrequests
 
subjects:
 
  - name: cert-manager
 
    namespace: cert-manager
 
    kind: ServiceAccount
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: ClusterRoleBinding
 
metadata:
 
  name: cert-manager-webhook:subjectaccessreviews
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: ClusterRole
 
  name: cert-manager-webhook:subjectaccessreviews
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# leader election rules
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  # Used for leader election by the controller
 
  # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
 
  #   see cmd/cainjector/start.go#L113
 
  # cert-manager-cainjector-leader-election-core is used by the SecretBased injector controller
 
  #   see cmd/cainjector/start.go#L137
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-cainjector-leader-election", "cert-manager-cainjector-leader-election-core"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    resourceNames: ["cert-manager-controller"]
 
    verbs: ["get", "update", "patch"]
 
  - apiGroups: ["coordination.k8s.io"]
 
    resources: ["leases"]
 
    verbs: ["create"]
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: Role
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
rules:
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  resourceNames:
 
  - 'cert-manager-webhook-ca'
 
  verbs: ["get", "list", "watch", "update"]
 
# It's not possible to grant CREATE permission on a single resourceName.
 
- apiGroups: [""]
 
  resources: ["secrets"]
 
  verbs: ["create"]
 
---
 
# Source: cert-manager/templates/cainjector-rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-cainjector:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-cainjector:leaderelection
 
subjects:
 
  - kind: ServiceAccount
 
    name: cert-manager-cainjector
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/rbac.yaml
 
# grant cert-manager permission to manage the leaderelection configmap in the
 
# leader election namespace
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager:leaderelection
 
  namespace: kube-system
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager:leaderelection
 
subjects:
 
  - apiGroup: ""
 
    kind: ServiceAccount
 
    name: cert-manager
 
    namespace: cert-manager
 
---
 
# Source: cert-manager/templates/webhook-rbac.yaml
 
apiVersion: rbac.authorization.k8s.io/v1
 
kind: RoleBinding
 
metadata:
 
  name: cert-manager-webhook:dynamic-serving
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
roleRef:
 
  apiGroup: rbac.authorization.k8s.io
 
  kind: Role
 
  name: cert-manager-webhook:dynamic-serving
 
subjects:
 
- apiGroup: ""
 
  kind: ServiceAccount
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
---
10-vols/claims.yaml
Show inline comments
 
new file 100644
 
apiVersion: v1
 
kind: PersistentVolumeClaim
 
metadata:
 
  namespace: pomerium
 
  name: autocert-data
 
spec:
 
  storageClassName: ""
 
  volumeName: "autocert-data"
 
  accessModes:
 
    - ReadWriteOnce
 
  resources:
 
    requests:
 
      storage: 5Gi
 
      
 
\ No newline at end of file
10-vols/volumes.yaml
Show inline comments
 
file renamed from kube/03-volumes.yaml to 10-vols/volumes.yaml
20-kube/10-pom-pom.yaml
Show inline comments
 
file renamed from kube/10-pomerium.yaml to 20-kube/10-pom-pom.yaml
20-kube/20-pom-deploy.yaml
Show inline comments
 
file renamed from kube/20-deployment.yaml to 20-kube/20-pom-deploy.yaml
20-kube/21-pom-svc.yaml
Show inline comments
 
new file 100644
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  labels:
 
    app.kubernetes.io/name: pomerium
 
  name: pomerium-metrics
 
  namespace: pomerium
 
spec:
 
  ports:
 
    - { name: metrics, port: 9090, protocol: TCP, targetPort: metrics }
 
  selector: { app.kubernetes.io/name: pomerium }
 
  type: ClusterIP
 
---
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  labels:
 
    app.kubernetes.io/name: pomerium
 
  name: pomerium-proxy
 
  namespace: pomerium
 
spec:
 
  ports:
 
    - { name: https, port: 443, protocol: TCP, targetPort: https }
 
    - { name: http, port: 80, protocol: TCP, targetPort: http }
 
  selector: { app.kubernetes.io/name: pomerium }
 
  type: LoadBalancer
 
  externalIPs:
 
  # prime forwards to this
 
    - 10.5.0.1
 
  # local dns picks this
 
    - 10.2.0.1
 
\ No newline at end of file
30-cert-manager/50-cert-manager.yaml
Show inline comments
 
new file 100644
 
# Copyright 2021 The cert-manager Authors.
 
#
 
# Licensed under the Apache License, Version 2.0 (the "License");
 
# you may not use this file except in compliance with the License.
 
# You may obtain a copy of the License at
 
#
 
#     http://www.apache.org/licenses/LICENSE-2.0
 
#
 
# Unless required by applicable law or agreed to in writing, software
 
# distributed under the License is distributed on an "AS IS" BASIS,
 
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 
# See the License for the specific language governing permissions and
 
# limitations under the License.
 
# Source: cert-manager/templates/webhook-config.yaml
 
apiVersion: v1
 
kind: ConfigMap
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
data:
 
---
 
# Source: cert-manager/templates/service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - protocol: TCP
 
    port: 9402
 
    name: tcp-prometheus-servicemonitor
 
    targetPort: 9402
 
  selector:
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
---
 
# Source: cert-manager/templates/webhook-service.yaml
 
apiVersion: v1
 
kind: Service
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  type: ClusterIP
 
  ports:
 
  - name: https
 
    port: 443
 
    protocol: TCP
 
    targetPort: "https"
 
  selector:
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
---
 
# Source: cert-manager/templates/cainjector-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-cainjector
 
  namespace: cert-manager
 
  labels:
 
    app: cainjector
 
    app.kubernetes.io/name: cainjector
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "cainjector"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cainjector
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "cainjector"
 
  template:
 
    metadata:
 
      labels:
 
        app: cainjector
 
        app.kubernetes.io/name: cainjector
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "cainjector"
 
        app.kubernetes.io/version: "v1.10.1"
 
    spec:
 
      serviceAccountName: cert-manager-cainjector
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-cainjector:v1.10.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --leader-election-namespace=kube-system
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager
 
  namespace: cert-manager
 
  labels:
 
    app: cert-manager
 
    app.kubernetes.io/name: cert-manager
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "controller"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: cert-manager
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "controller"
 
  template:
 
    metadata:
 
      labels:
 
        app: cert-manager
 
        app.kubernetes.io/name: cert-manager
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "controller"
 
        app.kubernetes.io/version: "v1.10.1"
 
      annotations:
 
        prometheus.io/path: "/metrics"
 
        prometheus.io/scrape: 'true'
 
        prometheus.io/port: '9402'
 
    spec:
 
      serviceAccountName: cert-manager
 
      securityContext:
 
        runAsNonRoot: true
 
      # https://github.com/cert-manager/cert-manager/issues/4941#issuecomment-1189160798
 
      dnsPolicy: None
 
      dnsConfig:
 
        nameservers:
 
          - 8.8.4.4
 
          - 8.8.8.8
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-controller:v1.10.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --cluster-resource-namespace=$(POD_NAMESPACE)
 
          - --leader-election-namespace=kube-system
 
          ports:
 
          - containerPort: 9402
 
            name: http-metrics
 
            protocol: TCP
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-deployment.yaml
 
apiVersion: apps/v1
 
kind: Deployment
 
metadata:
 
  name: cert-manager-webhook
 
  namespace: cert-manager
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
spec:
 
  replicas: 1
 
  selector:
 
    matchLabels:
 
      app.kubernetes.io/name: webhook
 
      app.kubernetes.io/instance: cert-manager
 
      app.kubernetes.io/component: "webhook"
 
  template:
 
    metadata:
 
      labels:
 
        app: webhook
 
        app.kubernetes.io/name: webhook
 
        app.kubernetes.io/instance: cert-manager
 
        app.kubernetes.io/component: "webhook"
 
        app.kubernetes.io/version: "v1.10.1"
 
    spec:
 
      serviceAccountName: cert-manager-webhook
 
      securityContext:
 
        runAsNonRoot: true
 
      containers:
 
        - name: cert-manager
 
          image: "quay.io/jetstack/cert-manager-webhook:v1.10.1"
 
          imagePullPolicy: IfNotPresent
 
          args:
 
          - --v=2
 
          - --secure-port=10250
 
          - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
 
          - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
 
          - --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
 
          ports:
 
          - name: https
 
            protocol: TCP
 
            containerPort: 10250
 
          livenessProbe:
 
            httpGet:
 
              path: /livez
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 60
 
            periodSeconds: 10
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          readinessProbe:
 
            httpGet:
 
              path: /healthz
 
              port: 6080
 
              scheme: HTTP
 
            initialDelaySeconds: 5
 
            periodSeconds: 5
 
            timeoutSeconds: 1
 
            successThreshold: 1
 
            failureThreshold: 3
 
          securityContext:
 
            allowPrivilegeEscalation: false
 
          env:
 
          - name: POD_NAMESPACE
 
            valueFrom:
 
              fieldRef:
 
                fieldPath: metadata.namespace
 
      nodeSelector:
 
        kubernetes.io/os: linux
 
---
 
# Source: cert-manager/templates/webhook-mutating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: MutatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    # Only include 'sideEffects' field in Kubernetes 1.12+
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /mutate
 
---
 
# Source: cert-manager/templates/webhook-validating-webhook.yaml
 
apiVersion: admissionregistration.k8s.io/v1
 
kind: ValidatingWebhookConfiguration
 
metadata:
 
  name: cert-manager-webhook
 
  labels:
 
    app: webhook
 
    app.kubernetes.io/name: webhook
 
    app.kubernetes.io/instance: cert-manager
 
    app.kubernetes.io/component: "webhook"
 
    app.kubernetes.io/version: "v1.10.1"
 
  annotations:
 
    cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
 
webhooks:
 
  - name: webhook.cert-manager.io
 
    namespaceSelector:
 
      matchExpressions:
 
      - key: "cert-manager.io/disable-validation"
 
        operator: "NotIn"
 
        values:
 
        - "true"
 
      - key: "name"
 
        operator: "NotIn"
 
        values:
 
        - cert-manager
 
    rules:
 
      - apiGroups:
 
          - "cert-manager.io"
 
          - "acme.cert-manager.io"
 
        apiVersions:
 
          - "v1"
 
        operations:
 
          - CREATE
 
          - UPDATE
 
        resources:
 
          - "*/*"
 
    admissionReviewVersions: ["v1"]
 
    # This webhook only accepts v1 cert-manager resources.
 
    # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
 
    # this webhook (after the resources have been converted to v1).
 
    matchPolicy: Equivalent
 
    timeoutSeconds: 10
 
    failurePolicy: Fail
 
    sideEffects: None
 
    clientConfig:
 
      service:
 
        name: cert-manager-webhook
 
        namespace: cert-manager
 
        path: /validate
30-cert-manager/51-pomerium-production-issuer.yaml
Show inline comments
 
file renamed from kube/51-pomerium-production-issuer.yaml to 30-cert-manager/51-pomerium-production-issuer.yaml
30-cert-manager/51-pomerium-staging-issuer.yaml
Show inline comments
 
file renamed from kube/51-pomerium-staging-issuer.yaml to 30-cert-manager/51-pomerium-staging-issuer.yaml
30-cert-manager/60-auth-cert.yaml
Show inline comments
 
file renamed from auth-cert.yaml to 30-cert-manager/60-auth-cert.yaml

Changeset was too big and was cut off... Show full diff anyway

0 comments (0 inline, 0 general)