349 lines
9.9 KiB
YAML
349 lines
9.9 KiB
YAML
# Copyright 2021 The cert-manager Authors.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: cert-manager
|
|
|
|
---
|
|
|
|
apiVersion: cert-manager.io/v1
|
|
kind: ClusterIssuer
|
|
metadata:
|
|
name: bhasherca-k3s-issuer
|
|
spec:
|
|
ca:
|
|
secretName: bhasherca-k3s-key-pair
|
|
|
|
---
|
|
|
|
# Source: cert-manager/templates/service.yaml
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: cert-manager
|
|
namespace: "cert-manager"
|
|
labels:
|
|
app: cert-manager
|
|
app.kubernetes.io/name: cert-manager
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "controller"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
spec:
|
|
type: ClusterIP
|
|
ports:
|
|
- protocol: TCP
|
|
port: 9402
|
|
name: tcp-prometheus-servicemonitor
|
|
targetPort: 9402
|
|
selector:
|
|
app.kubernetes.io/name: cert-manager
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "controller"
|
|
---
|
|
# Source: cert-manager/templates/webhook-service.yaml
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: cert-manager-webhook
|
|
namespace: "cert-manager"
|
|
labels:
|
|
app: webhook
|
|
app.kubernetes.io/name: webhook
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "webhook"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
spec:
|
|
type: ClusterIP
|
|
ports:
|
|
- name: https
|
|
port: 443
|
|
protocol: TCP
|
|
targetPort: "https"
|
|
selector:
|
|
app.kubernetes.io/name: webhook
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "webhook"
|
|
---
|
|
# Source: cert-manager/templates/cainjector-deployment.yaml
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: cert-manager-cainjector
|
|
namespace: "cert-manager"
|
|
labels:
|
|
app: cainjector
|
|
app.kubernetes.io/name: cainjector
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "cainjector"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: cainjector
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "cainjector"
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: cainjector
|
|
app.kubernetes.io/name: cainjector
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "cainjector"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
spec:
|
|
serviceAccountName: cert-manager-cainjector
|
|
securityContext:
|
|
runAsNonRoot: true
|
|
containers:
|
|
- name: cert-manager
|
|
image: "quay.io/jetstack/cert-manager-cainjector:v1.8.2"
|
|
imagePullPolicy: IfNotPresent
|
|
args:
|
|
- --v=2
|
|
- --leader-election-namespace=kube-system
|
|
env:
|
|
- name: POD_NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
nodeSelector:
|
|
kubernetes.io/os: linux
|
|
---
|
|
# Source: cert-manager/templates/deployment.yaml
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: cert-manager
|
|
namespace: "cert-manager"
|
|
labels:
|
|
app: cert-manager
|
|
app.kubernetes.io/name: cert-manager
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "controller"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: cert-manager
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "controller"
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: cert-manager
|
|
app.kubernetes.io/name: cert-manager
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "controller"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
annotations:
|
|
prometheus.io/path: "/metrics"
|
|
prometheus.io/scrape: 'true'
|
|
prometheus.io/port: '9402'
|
|
spec:
|
|
serviceAccountName: cert-manager
|
|
securityContext:
|
|
runAsNonRoot: true
|
|
containers:
|
|
- name: cert-manager
|
|
image: "quay.io/jetstack/cert-manager-controller:v1.8.2"
|
|
imagePullPolicy: IfNotPresent
|
|
args:
|
|
- --v=2
|
|
- --cluster-resource-namespace=$(POD_NAMESPACE)
|
|
- --leader-election-namespace=kube-system
|
|
ports:
|
|
- containerPort: 9402
|
|
name: http-metrics
|
|
protocol: TCP
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
env:
|
|
- name: POD_NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
nodeSelector:
|
|
kubernetes.io/os: linux
|
|
---
|
|
# Source: cert-manager/templates/webhook-deployment.yaml
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: cert-manager-webhook
|
|
namespace: "cert-manager"
|
|
labels:
|
|
app: webhook
|
|
app.kubernetes.io/name: webhook
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "webhook"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: webhook
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "webhook"
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: webhook
|
|
app.kubernetes.io/name: webhook
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "webhook"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
spec:
|
|
serviceAccountName: cert-manager-webhook
|
|
securityContext:
|
|
runAsNonRoot: true
|
|
containers:
|
|
- name: cert-manager
|
|
image: "quay.io/jetstack/cert-manager-webhook:v1.8.2"
|
|
imagePullPolicy: IfNotPresent
|
|
args:
|
|
- --v=2
|
|
- --secure-port=10250
|
|
- --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
|
|
- --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
|
|
- --dynamic-serving-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc
|
|
ports:
|
|
- name: https
|
|
protocol: TCP
|
|
containerPort: 10250
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /livez
|
|
port: 6080
|
|
scheme: HTTP
|
|
initialDelaySeconds: 60
|
|
periodSeconds: 10
|
|
timeoutSeconds: 1
|
|
successThreshold: 1
|
|
failureThreshold: 3
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /healthz
|
|
port: 6080
|
|
scheme: HTTP
|
|
initialDelaySeconds: 5
|
|
periodSeconds: 5
|
|
timeoutSeconds: 1
|
|
successThreshold: 1
|
|
failureThreshold: 3
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
env:
|
|
- name: POD_NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
nodeSelector:
|
|
kubernetes.io/os: linux
|
|
---
|
|
# Source: cert-manager/templates/webhook-mutating-webhook.yaml
|
|
apiVersion: admissionregistration.k8s.io/v1
|
|
kind: MutatingWebhookConfiguration
|
|
metadata:
|
|
name: cert-manager-webhook
|
|
labels:
|
|
app: webhook
|
|
app.kubernetes.io/name: webhook
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "webhook"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
annotations:
|
|
cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
|
|
webhooks:
|
|
- name: webhook.cert-manager.io
|
|
rules:
|
|
- apiGroups:
|
|
- "cert-manager.io"
|
|
- "acme.cert-manager.io"
|
|
apiVersions:
|
|
- "v1"
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- "*/*"
|
|
admissionReviewVersions: ["v1"]
|
|
# This webhook only accepts v1 cert-manager resources.
|
|
# Equivalent matchPolicy ensures that non-v1 resource requests are sent to
|
|
# this webhook (after the resources have been converted to v1).
|
|
matchPolicy: Equivalent
|
|
timeoutSeconds: 10
|
|
failurePolicy: Fail
|
|
# Only include 'sideEffects' field in Kubernetes 1.12+
|
|
sideEffects: None
|
|
clientConfig:
|
|
service:
|
|
name: cert-manager-webhook
|
|
namespace: "cert-manager"
|
|
path: /mutate
|
|
---
|
|
# Source: cert-manager/templates/webhook-validating-webhook.yaml
|
|
apiVersion: admissionregistration.k8s.io/v1
|
|
kind: ValidatingWebhookConfiguration
|
|
metadata:
|
|
name: cert-manager-webhook
|
|
labels:
|
|
app: webhook
|
|
app.kubernetes.io/name: webhook
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "webhook"
|
|
app.kubernetes.io/version: "v1.8.2"
|
|
annotations:
|
|
cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
|
|
webhooks:
|
|
- name: webhook.cert-manager.io
|
|
namespaceSelector:
|
|
matchExpressions:
|
|
- key: "cert-manager.io/disable-validation"
|
|
operator: "NotIn"
|
|
values:
|
|
- "true"
|
|
- key: "name"
|
|
operator: "NotIn"
|
|
values:
|
|
- cert-manager
|
|
rules:
|
|
- apiGroups:
|
|
- "cert-manager.io"
|
|
- "acme.cert-manager.io"
|
|
apiVersions:
|
|
- "v1"
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- "*/*"
|
|
admissionReviewVersions: ["v1"]
|
|
# This webhook only accepts v1 cert-manager resources.
|
|
# Equivalent matchPolicy ensures that non-v1 resource requests are sent to
|
|
# this webhook (after the resources have been converted to v1).
|
|
matchPolicy: Equivalent
|
|
timeoutSeconds: 10
|
|
failurePolicy: Fail
|
|
sideEffects: None
|
|
clientConfig:
|
|
service:
|
|
name: cert-manager-webhook
|
|
namespace: "cert-manager"
|
|
path: /validate |