Skip to content

Commit 9dbb053

Browse files
Add Cert Manager operator (#8)
Revisions: - openshift/cert-manager-operator@4e8c722
1 parent c2a61f4 commit 9dbb053

File tree

2 files changed

+366
-0
lines changed

2 files changed

+366
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,356 @@
1+
---
2+
image: quay.io/okderators/cert-manager-operator-bundle:1.14.0-2024-08-09-204321
3+
name: cert-manager-operator.v1.14.0-2024-08-09-204321
4+
package: cert-manager-operator
5+
properties:
6+
- type: olm.gvk
7+
value:
8+
group: acme.cert-manager.io
9+
kind: Challenge
10+
version: v1
11+
- type: olm.gvk
12+
value:
13+
group: acme.cert-manager.io
14+
kind: Order
15+
version: v1
16+
- type: olm.gvk
17+
value:
18+
group: cert-manager.io
19+
kind: Certificate
20+
version: v1
21+
- type: olm.gvk
22+
value:
23+
group: cert-manager.io
24+
kind: CertificateRequest
25+
version: v1
26+
- type: olm.gvk
27+
value:
28+
group: cert-manager.io
29+
kind: ClusterIssuer
30+
version: v1
31+
- type: olm.gvk
32+
value:
33+
group: cert-manager.io
34+
kind: Issuer
35+
version: v1
36+
- type: olm.gvk
37+
value:
38+
group: operator.openshift.io
39+
kind: CertManager
40+
version: v1alpha1
41+
- type: olm.package
42+
value:
43+
packageName: cert-manager-operator
44+
version: 1.14.0-2024-08-09-204321
45+
- type: olm.csv.metadata
46+
value:
47+
annotations:
48+
alm-examples: |-
49+
[
50+
{
51+
"apiVersion": "acme.cert-manager.io/v1",
52+
"kind": "Challenge",
53+
"metadata": {
54+
"name": "tls-cert-sample",
55+
"namespace": "default"
56+
},
57+
"spec": {
58+
"authorizationURL": "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX",
59+
"dnsName": "sample.dns.name",
60+
"issuerRef": {
61+
"kind": "Issuer",
62+
"name": "letsencrypt-staging"
63+
},
64+
"key": "XXX",
65+
"solver": {
66+
"dns01": {
67+
"route53": {
68+
"accessKeyID": "XXX",
69+
"hostedZoneID": "XXX",
70+
"region": "us-east-1",
71+
"secretAccessKeySecretRef": {
72+
"key": "awsSecretAccessKey",
73+
"name": "aws-secret"
74+
}
75+
}
76+
},
77+
"selector": {
78+
"dnsNames": [
79+
"sample.dns.name"
80+
]
81+
}
82+
},
83+
"token": "XXX",
84+
"type": "DNS-01",
85+
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX",
86+
"wildcard": false
87+
}
88+
},
89+
{
90+
"apiVersion": "acme.cert-manager.io/v1",
91+
"kind": "Order",
92+
"metadata": {
93+
"annotations": {
94+
"cert-manager.io/certificate-name": "tls-cert",
95+
"cert-manager.io/certificate-revision": "1",
96+
"cert-manager.io/private-key-secret-name": "tls-cert-sample"
97+
},
98+
"name": "tls-cert-sample",
99+
"namespace": "default"
100+
},
101+
"spec": {
102+
"commonName": "sample.dns.name",
103+
"dnsNames": [
104+
"sample.dns.name"
105+
],
106+
"issuerRef": {
107+
"kind": "Issuer",
108+
"name": "letsencrypt-staging"
109+
},
110+
"request": "XXX"
111+
}
112+
},
113+
{
114+
"apiVersion": "cert-manager.io/v1",
115+
"kind": "Certificate",
116+
"metadata": {
117+
"name": "selfsigned-ca",
118+
"namespace": "default"
119+
},
120+
"spec": {
121+
"commonName": "selfsigned-ca.dns.name",
122+
"isCA": true,
123+
"issuerRef": {
124+
"group": "cert-manager.io",
125+
"kind": "ClusterIssuer",
126+
"name": "selfsigned-issuer"
127+
},
128+
"privateKey": {
129+
"algorithm": "ECDSA",
130+
"size": 256
131+
},
132+
"secretName": "ca-root-secret"
133+
}
134+
},
135+
{
136+
"apiVersion": "cert-manager.io/v1",
137+
"kind": "Certificate",
138+
"metadata": {
139+
"name": "tls-cert",
140+
"namespace": "default"
141+
},
142+
"spec": {
143+
"commonName": "sample.dns.name",
144+
"dnsNames": [
145+
"sample.dns.name"
146+
],
147+
"isCA": false,
148+
"issuerRef": {
149+
"kind": "Issuer",
150+
"name": "letsencrypt-staging"
151+
},
152+
"secretName": "tls-cert"
153+
}
154+
},
155+
{
156+
"apiVersion": "cert-manager.io/v1",
157+
"kind": "CertificateRequest",
158+
"metadata": {
159+
"annotations": {
160+
"cert-manager.io/certificate-name": "tls-cert",
161+
"cert-manager.io/certificate-revision": "1",
162+
"cert-manager.io/private-key-secret-name": "tls-cert-sample"
163+
},
164+
"name": "tls-cert-sample",
165+
"namespace": "default"
166+
},
167+
"spec": {
168+
"groups": [
169+
"system:serviceaccounts",
170+
"system:serviceaccounts:cert-manager",
171+
"system:authenticated"
172+
],
173+
"issuerRef": {
174+
"kind": "Issuer",
175+
"name": "letsencrypt-staging"
176+
},
177+
"request": "XXX",
178+
"username": "system:serviceaccount:cert-manager:cert-manager"
179+
}
180+
},
181+
{
182+
"apiVersion": "cert-manager.io/v1",
183+
"kind": "ClusterIssuer",
184+
"metadata": {
185+
"name": "selfsigned-issuer"
186+
},
187+
"spec": {
188+
"selfSigned": {}
189+
}
190+
},
191+
{
192+
"apiVersion": "cert-manager.io/v1",
193+
"kind": "Issuer",
194+
"metadata": {
195+
"name": "ca-issuer",
196+
"namespace": "default"
197+
},
198+
"spec": {
199+
"ca": {
200+
"secretName": "ca-root-secret"
201+
}
202+
}
203+
},
204+
{
205+
"apiVersion": "cert-manager.io/v1",
206+
"kind": "Issuer",
207+
"metadata": {
208+
"name": "letsencrypt-staging",
209+
"namespace": "default"
210+
},
211+
"spec": {
212+
"acme": {
213+
"email": "[email protected]",
214+
"privateKeySecretRef": {
215+
"name": "letsencrypt-staging"
216+
},
217+
"server": "https://acme-staging-v02.api.letsencrypt.org/directory",
218+
"solvers": [
219+
{
220+
"dns01": {
221+
"route53": {
222+
"accessKeyID": "\u003cACCESS_KEY_ID\u003e",
223+
"hostedZoneID": "\u003cHOSTED_ZONE_ID\u003e",
224+
"region": "\u003cAWS_REGION\u003e",
225+
"secretAccessKeySecretRef": {
226+
"key": "access-key",
227+
"name": "sample-aws-secret"
228+
}
229+
}
230+
},
231+
"selector": {
232+
"dnsNames": [
233+
"sample.dns.name"
234+
]
235+
}
236+
}
237+
]
238+
}
239+
}
240+
},
241+
{
242+
"apiVersion": "operator.openshift.io/v1alpha1",
243+
"kind": "CertManager",
244+
"metadata": {
245+
"name": "cluster"
246+
},
247+
"spec": {
248+
"logLevel": "Normal",
249+
"managementState": "Managed"
250+
}
251+
}
252+
]
253+
capabilities: Seamless Upgrades
254+
categories: Security
255+
console.openshift.io/disable-operand-delete: "true"
256+
containerImage: quay.io/okderators/cert-manager-operator:1.14.0-2024-08-09-204321
257+
createdAt: 2023-03-03T00:00:00
258+
features.operators.openshift.io/disconnected: "false"
259+
features.operators.openshift.io/fips-compliant: "true"
260+
features.operators.openshift.io/proxy-aware: "true"
261+
features.operators.openshift.io/tls-profiles: "false"
262+
features.operators.openshift.io/token-auth-aws: "true"
263+
features.operators.openshift.io/token-auth-azure: "true"
264+
features.operators.openshift.io/token-auth-gcp: "true"
265+
olm.skipRange: '>=1.13.1 <1.14.0'
266+
operator.openshift.io/uninstall-message: The cert-manager Operator OKD will
267+
be removed from cert-manager-operator namespace. If your Operator configured
268+
any off-cluster resources, these will continue to run and require manual cleanup.
269+
All operands created by the operator will need to be manually cleaned up.
270+
Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html
271+
for additional steps.
272+
operatorframework.io/cluster-monitoring: "true"
273+
operatorframework.io/suggested-namespace: cert-manager-operator
274+
operators.openshift.io/infrastructure-features: '["proxy-aware"]'
275+
operators.operatorframework.io/builder: operator-sdk-v1.25.1
276+
operators.operatorframework.io/project_layout: go.kubebuilder.io/v3
277+
repository: https://github.com/openshift/cert-manager-operator
278+
support: OKD Community
279+
apiServiceDefinitions: {}
280+
crdDescriptions:
281+
owned:
282+
- kind: CertificateRequest
283+
name: certificaterequests.cert-manager.io
284+
version: v1
285+
- kind: Certificate
286+
name: certificates.cert-manager.io
287+
version: v1
288+
- description: CertManager is the Schema for the certmanagers API
289+
displayName: CertManager
290+
kind: CertManager
291+
name: certmanagers.operator.openshift.io
292+
version: v1alpha1
293+
- kind: Challenge
294+
name: challenges.acme.cert-manager.io
295+
version: v1
296+
- kind: ClusterIssuer
297+
name: clusterissuers.cert-manager.io
298+
version: v1
299+
- kind: Issuer
300+
name: issuers.cert-manager.io
301+
version: v1
302+
- kind: Order
303+
name: orders.acme.cert-manager.io
304+
version: v1
305+
description: |
306+
The cert-manager Operator for OKD provides seamless support for [cert-manager v1.14.5](https://github.com/cert-manager/cert-manager/tree/v1.14.5), which automates certificate management.
307+
For more information, see the [cert-manager Operator for OKD documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).
308+
displayName: cert-manager Operator for OKD
309+
installModes:
310+
- supported: true
311+
type: OwnNamespace
312+
- supported: true
313+
type: SingleNamespace
314+
- supported: false
315+
type: MultiNamespace
316+
- supported: false
317+
type: AllNamespaces
318+
keywords:
319+
- cert-manager
320+
- cert-manager-operator
321+
- cert
322+
- certificates
323+
- security
324+
- TLS
325+
labels:
326+
operatorframework.io/arch.amd64: supported
327+
operatorframework.io/arch.arm64: supported
328+
operatorframework.io/arch.ppc64le: supported
329+
operatorframework.io/arch.s390x: supported
330+
operatorframework.io/os.linux: supported
331+
links:
332+
- name: Documentation
333+
url: https://github.com/openshift/cert-manager-operator/blob/master/README.md
334+
maintainers:
335+
336+
name: Red Hat Support
337+
maturity: stable
338+
minKubeVersion: 1.25.0
339+
provider:
340+
name: OKD Community
341+
relatedImages:
342+
- image: gcr.io/kubebuilder/kube-rbac-proxy:v0.16.0
343+
name: ""
344+
- image: quay.io/jetstack/cert-manager-acmesolver:v1.14.5
345+
name: cert-manager-acmesolver
346+
- image: quay.io/jetstack/cert-manager-cainjector:v1.14.5
347+
name: cert-manager-ca-injector
348+
- image: quay.io/jetstack/cert-manager-controller:v1.14.5
349+
name: cert-manager-controller
350+
- image: quay.io/jetstack/cert-manager-webhook:v1.14.5
351+
name: cert-manager-webhook
352+
- image: quay.io/okderators/cert-manager-operator-bundle:1.14.0-2024-08-09-204321
353+
name: ""
354+
- image: quay.io/okderators/cert-manager-operator:1.14.0-2024-08-09-204321
355+
name: ""
356+
schema: olm.bundle
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
schema: olm.package
3+
name: cert-manager-operator
4+
defaultChannel: alpha
5+
---
6+
schema: olm.channel
7+
package: cert-manager-operator
8+
name: alpha
9+
entries:
10+
- name: cert-manager-operator.v1.14.0-2024-08-09-204321

0 commit comments

Comments
 (0)