Skip to content

Commit a07acbb

Browse files
committed
sync from k8s
1 parent 3407f6d commit a07acbb

File tree

4 files changed

+4424
-26
lines changed

4 files changed

+4424
-26
lines changed
+18-16
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,24 @@
1+
annotations:
2+
artifacthub.io/prerelease: "false"
3+
artifacthub.io/signKey: |
4+
fingerprint: 1020CF3C033D4F35BAE1C19E1226061C665DF13E
5+
url: https://cert-manager.io/public-keys/cert-manager-keyring-2021-09-20-1020CF3C033D4F35BAE1C19E1226061C665DF13E.gpg
16
apiVersion: v1
2-
name: cert-manager
3-
# The version and appVersion fields are set automatically by the release tool
4-
version: v0.1.0
5-
appVersion: v0.1.0
6-
kubeVersion: ">= 1.21.0-0"
7+
appVersion: v1.11.5
78
description: A Helm chart for cert-manager
89
home: https://github.com/cert-manager/cert-manager
910
icon: https://raw.githubusercontent.com/cert-manager/cert-manager/d53c0b9270f8cd90d908460d69502694e1838f5f/logo/logo-small.png
1011
keywords:
11-
- cert-manager
12-
- kube-lego
13-
- letsencrypt
14-
- tls
15-
sources:
16-
- https://github.com/cert-manager/cert-manager
12+
- cert-manager
13+
- kube-lego
14+
- letsencrypt
15+
- tls
16+
kubeVersion: '>= 1.21.0-0'
1717
maintainers:
18-
- name: cert-manager-maintainers
19-
20-
url: https://cert-manager.io
21-
annotations:
22-
artifacthub.io/prerelease: "{{IS_PRERELEASE}}"
18+
19+
name: cert-manager-maintainers
20+
url: https://cert-manager.io
21+
name: cert-manager
22+
sources:
23+
- https://github.com/cert-manager/cert-manager
24+
version: v1.11.5

roles/cert_manager/files/chart/README.template.md roles/cert_manager/files/chart/README.md

+8-8
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Before installing the chart, you must first install the cert-manager CustomResou
1919
This is performed in a separate step to allow you to easily uninstall and reinstall cert-manager without deleting your installed custom resources.
2020

2121
```bash
22-
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/{{RELEASE_VERSION}}/cert-manager.crds.yaml
22+
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.11.5/cert-manager.crds.yaml
2323
```
2424

2525
To install the chart with the release name `my-release`:
@@ -29,7 +29,7 @@ To install the chart with the release name `my-release`:
2929
$ helm repo add jetstack https://charts.jetstack.io
3030

3131
## Install the cert-manager helm chart
32-
$ helm install my-release --namespace cert-manager --version {{RELEASE_VERSION}} jetstack/cert-manager
32+
$ helm install my-release --namespace cert-manager --version v1.11.5 jetstack/cert-manager
3333
```
3434

3535
In order to begin issuing certificates, you will need to set up a ClusterIssuer
@@ -65,7 +65,7 @@ If you want to completely uninstall cert-manager from your cluster, you will als
6565
delete the previously installed CustomResourceDefinition resources:
6666

6767
```console
68-
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/{{RELEASE_VERSION}}/cert-manager.crds.yaml
68+
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.11.5/cert-manager.crds.yaml
6969
```
7070

7171
## Configuration
@@ -86,7 +86,7 @@ The following table lists the configurable parameters of the cert-manager chart
8686
| `global.leaderElection.retryPeriod` | The duration the clients should wait between attempting acquisition and renewal of a leadership | |
8787
| `installCRDs` | If true, CRD resources will be installed as part of the Helm chart. If enabled, when uninstalling CRD resources will be deleted causing all installed custom resources to be DELETED | `false` |
8888
| `image.repository` | Image repository | `quay.io/jetstack/cert-manager-controller` |
89-
| `image.tag` | Image tag | `{{RELEASE_VERSION}}` |
89+
| `image.tag` | Image tag | `v1.11.5` |
9090
| `image.pullPolicy` | Image pull policy | `IfNotPresent` |
9191
| `replicaCount` | Number of cert-manager replicas | `1` |
9292
| `clusterResourceNamespace` | Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources | Same namespace as cert-manager pod |
@@ -153,7 +153,7 @@ The following table lists the configurable parameters of the cert-manager chart
153153
| `webhook.tolerations` | Node tolerations for webhook pod assignment | `[]` |
154154
| `webhook.topologySpreadConstraints` | Topology spread constraints for webhook pod assignment | `[]` |
155155
| `webhook.image.repository` | Webhook image repository | `quay.io/jetstack/cert-manager-webhook` |
156-
| `webhook.image.tag` | Webhook image tag | `{{RELEASE_VERSION}}` |
156+
| `webhook.image.tag` | Webhook image tag | `v1.11.5` |
157157
| `webhook.image.pullPolicy` | Webhook image pull policy | `IfNotPresent` |
158158
| `webhook.securePort` | The port that the webhook should listen on for requests. | `10250` |
159159
| `webhook.securityContext` | Security context for webhook pod assignment | refer to [Default Security Contexts](#default-security-contexts) |
@@ -188,12 +188,12 @@ The following table lists the configurable parameters of the cert-manager chart
188188
| `cainjector.tolerations` | Node tolerations for cainjector pod assignment | `[]` |
189189
| `cainjector.topologySpreadConstraints` | Topology spread constraints for cainjector pod assignment | `[]` |
190190
| `cainjector.image.repository` | cainjector image repository | `quay.io/jetstack/cert-manager-cainjector` |
191-
| `cainjector.image.tag` | cainjector image tag | `{{RELEASE_VERSION}}` |
191+
| `cainjector.image.tag` | cainjector image tag | `v1.11.5` |
192192
| `cainjector.image.pullPolicy` | cainjector image pull policy | `IfNotPresent` |
193193
| `cainjector.securityContext` | Security context for cainjector pod assignment | refer to [Default Security Contexts](#default-security-contexts) |
194194
| `cainjector.containerSecurityContext` | Security context to be set on cainjector component container | refer to [Default Security Contexts](#default-security-contexts) |
195195
| `acmesolver.image.repository` | acmesolver image repository | `quay.io/jetstack/cert-manager-acmesolver` |
196-
| `acmesolver.image.tag` | acmesolver image tag | `{{RELEASE_VERSION}}` |
196+
| `acmesolver.image.tag` | acmesolver image tag | `v1.11.5` |
197197
| `acmesolver.image.pullPolicy` | acmesolver image pull policy | `IfNotPresent` |
198198
| `startupapicheck.enabled` | Toggles whether the startupapicheck Job should be installed | `true` |
199199
| `startupapicheck.securityContext` | Security context for startupapicheck pod assignment | refer to [Default Security Contexts](#default-security-contexts) |
@@ -209,7 +209,7 @@ The following table lists the configurable parameters of the cert-manager chart
209209
| `startupapicheck.tolerations` | Node tolerations for startupapicheck pod assignment | `[]` |
210210
| `startupapicheck.podLabels` | Optional additional labels to add to the startupapicheck Pods | `{}` |
211211
| `startupapicheck.image.repository` | startupapicheck image repository | `quay.io/jetstack/cert-manager-ctl` |
212-
| `startupapicheck.image.tag` | startupapicheck image tag | `{{RELEASE_VERSION}}` |
212+
| `startupapicheck.image.tag` | startupapicheck image tag | `v1.11.5` |
213213
| `startupapicheck.image.pullPolicy` | startupapicheck image pull policy | `IfNotPresent` |
214214
| `startupapicheck.serviceAccount.create` | If `true`, create a new service account for the startupapicheck component | `true` |
215215
| `startupapicheck.serviceAccount.name` | Service account for the startupapicheck component to be used. If not set and `startupapicheck.serviceAccount.create` is `true`, a name is generated using the fullname template | |

roles/cert_manager/files/chart/signkey_annotation.txt

-2
This file was deleted.

0 commit comments

Comments
 (0)