Skip to content

Commit 71eda5a

Browse files
committedMay 1, 2019
Bump manifests and docs for v0.8
Signed-off-by: James Munnelly <[email protected]>
1 parent 331df1b commit 71eda5a

File tree

17 files changed

+84
-84
lines changed

17 files changed

+84
-84
lines changed
 

‎deploy/charts/cert-manager/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: cert-manager
2-
version: v0.7.2
3-
appVersion: v0.7.0
2+
version: v0.8.0-alpha.0
3+
appVersion: v0.8.0-alpha.0
44
description: A Helm chart for cert-manager
55
home: https://github.com/jetstack/cert-manager
66
keywords:

‎deploy/charts/cert-manager/README.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ To install the chart with the release name `my-release`:
2121
## IMPORTANT: you MUST install the cert-manager CRDs **before** installing the
2222
## cert-manager Helm chart
2323
$ kubectl apply \
24-
-f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml
24+
-f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml
2525

2626
## IMPORTANT: if the cert-manager namespace **already exists**, you MUST ensure
2727
## it has an additional label on it in order for the deployment to succeed
@@ -75,7 +75,7 @@ The following table lists the configurable parameters of the cert-manager chart
7575
| `global.imagePullSecrets` | Reference to one or more secrets to be used when pulling images | `[]` |
7676
| `global.rbac.create` | If `true`, create and use RBAC resources (includes sub-charts) | `true` |
7777
| `image.repository` | Image repository | `quay.io/jetstack/cert-manager-controller` |
78-
| `image.tag` | Image tag | `v0.7.0` |
78+
| `image.tag` | Image tag | `v0.8.0-alpha.0` |
7979
| `image.pullPolicy` | Image pull policy | `IfNotPresent` |
8080
| `replicaCount` | Number of cert-manager replicas | `1` |
8181
| `clusterResourceNamespace` | Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources | Same namespace as cert-manager pod
@@ -109,7 +109,7 @@ The following table lists the configurable parameters of the cert-manager chart
109109
| `webhook.extraArgs` | Optional flags for cert-manager webhook component | `[]` |
110110
| `webhook.resources` | CPU/memory resource requests/limits for the webhook pods | |
111111
| `webhook.image.repository` | Webhook image repository | `quay.io/jetstack/cert-manager-webhook` |
112-
| `webhook.image.tag` | Webhook image tag | `v0.7.0` |
112+
| `webhook.image.tag` | Webhook image tag | `v0.8.0-alpha.0` |
113113
| `webhook.image.pullPolicy` | Webhook image pull policy | `IfNotPresent` |
114114
| `webhook.injectAPIServerCA` | if true, the apiserver's CABundle will be automatically injected into the ValidatingWebhookConfiguration resource | `true` |
115115
| `cainjector.enabled` | Toggles whether the cainjector component should be installed (required for the webhook component to work) | `true` |
@@ -118,7 +118,7 @@ The following table lists the configurable parameters of the cert-manager chart
118118
| `cainjector.extraArgs` | Optional flags for cert-manager cainjector component | `[]` |
119119
| `cainjector.resources` | CPU/memory resource requests/limits for the cainjector pods | |
120120
| `cainjector.image.repository` | cainjector image repository | `quay.io/jetstack/cert-manager-cainjector` |
121-
| `cainjector.image.tag` | cainjector image tag | `v0.7.0` |
121+
| `cainjector.image.tag` | cainjector image tag | `v0.8.0-alpha.0` |
122122
| `cainjector.image.pullPolicy` | cainjector image pull policy | `IfNotPresent` |
123123

124124
Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`.

‎deploy/charts/cert-manager/cainjector/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: cainjector
22
apiVersion: v1
3-
version: "v0.7.0"
4-
appVersion: "v0.7.0"
3+
version: "v0.8.0-alpha.0"
4+
appVersion: "v0.8.0-alpha.0"
55
description: A Helm chart for deploying the cert-manager cainjector component
66
home: https://github.com/jetstack/cert-manager
77
sources:

‎deploy/charts/cert-manager/cainjector/values.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,5 +34,5 @@ resources: {}
3434

3535
image:
3636
repository: quay.io/jetstack/cert-manager-cainjector
37-
tag: v0.7.0
37+
tag: v0.8.0-alpha.0
3838
pullPolicy: IfNotPresent
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
dependencies:
22
- name: webhook
33
repository: file://webhook
4-
version: v0.7.0
4+
version: v0.8.0-alpha.0
55
- name: cainjector
66
repository: file://cainjector
7-
version: v0.7.0
8-
digest: sha256:7042a8ac7a0499463fc2c780575a9e8b964fa0edc3b194ecd34a7b3cf6ec225d
9-
generated: 2019-04-17T13:19:29.906200484+02:00
7+
version: v0.8.0-alpha.0
8+
digest: sha256:7068b0db40ed5111f1db451e89a4d78af477c8220f881f30fdd87118f71f8cc5
9+
generated: 2019-05-01T16:50:17.726241574+01:00
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
# requirements.yaml
22
dependencies:
33
- name: webhook
4-
version: "v0.7.0"
4+
version: "v0.8.0-alpha.0"
55
repository: "file://webhook"
66
condition: webhook.enabled
77
- name: cainjector
8-
version: "v0.7.0"
8+
version: "v0.8.0-alpha.0"
99
repository: "file://cainjector"
1010
condition: cainjector.enabled

‎deploy/charts/cert-manager/values.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ strategy: {}
3030

3131
image:
3232
repository: quay.io/jetstack/cert-manager-controller
33-
tag: v0.7.0
33+
tag: v0.8.0-alpha.0
3434
pullPolicy: IfNotPresent
3535

3636
# Override the namespace used to store DNS provider credentials etc. for ClusterIssuer

‎deploy/charts/cert-manager/webhook/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: webhook
22
apiVersion: v1
3-
version: "v0.7.0"
4-
appVersion: "v0.7.0"
3+
version: "v0.8.0-alpha.0"
4+
appVersion: "v0.8.0-alpha.0"
55
description: A Helm chart for deploying the cert-manager webhook component
66
home: https://github.com/jetstack/cert-manager
77
sources:

‎deploy/charts/cert-manager/webhook/values.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ resources: {}
3030

3131
image:
3232
repository: quay.io/jetstack/cert-manager-webhook
33-
tag: v0.7.0
33+
tag: v0.8.0-alpha.0
3434
pullPolicy: IfNotPresent
3535

3636
# if true, the apiserver's cabundle will be automatically injected into the

‎deploy/manifests/cert-manager-no-webhook.yaml

+12-12
Original file line numberDiff line numberDiff line change
@@ -1102,7 +1102,7 @@ metadata:
11021102
namespace: "cert-manager"
11031103
labels:
11041104
app: cainjector
1105-
chart: cainjector-v0.7.0
1105+
chart: cainjector-v0.8.0-alpha.0
11061106
release: cert-manager
11071107
heritage: Tiller
11081108

@@ -1115,7 +1115,7 @@ metadata:
11151115
namespace: "cert-manager"
11161116
labels:
11171117
app: cert-manager
1118-
chart: cert-manager-v0.7.2
1118+
chart: cert-manager-v0.8.0-alpha.0
11191119
release: cert-manager
11201120
heritage: Tiller
11211121
---
@@ -1126,7 +1126,7 @@ metadata:
11261126
name: cert-manager-cainjector
11271127
labels:
11281128
app: cainjector
1129-
chart: cainjector-v0.7.0
1129+
chart: cainjector-v0.8.0-alpha.0
11301130
release: cert-manager
11311131
heritage: Tiller
11321132
rules:
@@ -1152,7 +1152,7 @@ metadata:
11521152
name: cert-manager-cainjector
11531153
labels:
11541154
app: cainjector
1155-
chart: cainjector-v0.7.0
1155+
chart: cainjector-v0.8.0-alpha.0
11561156
release: cert-manager
11571157
heritage: Tiller
11581158
roleRef:
@@ -1171,7 +1171,7 @@ metadata:
11711171
name: cert-manager
11721172
labels:
11731173
app: cert-manager
1174-
chart: cert-manager-v0.7.2
1174+
chart: cert-manager-v0.8.0-alpha.0
11751175
release: cert-manager
11761176
heritage: Tiller
11771177
rules:
@@ -1191,7 +1191,7 @@ metadata:
11911191
name: cert-manager
11921192
labels:
11931193
app: cert-manager
1194-
chart: cert-manager-v0.7.2
1194+
chart: cert-manager-v0.8.0-alpha.0
11951195
release: cert-manager
11961196
heritage: Tiller
11971197
roleRef:
@@ -1209,7 +1209,7 @@ metadata:
12091209
name: cert-manager-view
12101210
labels:
12111211
app: cert-manager
1212-
chart: cert-manager-v0.7.2
1212+
chart: cert-manager-v0.8.0-alpha.0
12131213
release: cert-manager
12141214
heritage: Tiller
12151215
rbac.authorization.k8s.io/aggregate-to-view: "true"
@@ -1226,7 +1226,7 @@ metadata:
12261226
name: cert-manager-edit
12271227
labels:
12281228
app: cert-manager
1229-
chart: cert-manager-v0.7.2
1229+
chart: cert-manager-v0.8.0-alpha.0
12301230
release: cert-manager
12311231
heritage: Tiller
12321232
rbac.authorization.k8s.io/aggregate-to-edit: "true"
@@ -1244,7 +1244,7 @@ metadata:
12441244
namespace: "cert-manager"
12451245
labels:
12461246
app: cainjector
1247-
chart: cainjector-v0.7.0
1247+
chart: cainjector-v0.8.0-alpha.0
12481248
release: cert-manager
12491249
heritage: Tiller
12501250
spec:
@@ -1263,7 +1263,7 @@ spec:
12631263
serviceAccountName: cert-manager-cainjector
12641264
containers:
12651265
- name: cainjector
1266-
image: "quay.io/jetstack/cert-manager-cainjector:v0.7.0"
1266+
image: "quay.io/jetstack/cert-manager-cainjector:v0.8.0-alpha.0"
12671267
imagePullPolicy: IfNotPresent
12681268
args:
12691269
- --v=2
@@ -1286,7 +1286,7 @@ metadata:
12861286
namespace: "cert-manager"
12871287
labels:
12881288
app: cert-manager
1289-
chart: cert-manager-v0.7.2
1289+
chart: cert-manager-v0.8.0-alpha.0
12901290
release: cert-manager
12911291
heritage: Tiller
12921292
spec:
@@ -1308,7 +1308,7 @@ spec:
13081308
serviceAccountName: cert-manager
13091309
containers:
13101310
- name: cert-manager
1311-
image: "quay.io/jetstack/cert-manager-controller:v0.7.0"
1311+
image: "quay.io/jetstack/cert-manager-controller:v0.8.0-alpha.0"
13121312
imagePullPolicy: IfNotPresent
13131313
args:
13141314
- --v=2

‎deploy/manifests/cert-manager.yaml

+25-25
Original file line numberDiff line numberDiff line change
@@ -1102,7 +1102,7 @@ metadata:
11021102
namespace: "cert-manager"
11031103
labels:
11041104
app: cainjector
1105-
chart: cainjector-v0.7.0
1105+
chart: cainjector-v0.8.0-alpha.0
11061106
release: cert-manager
11071107
heritage: Tiller
11081108

@@ -1115,7 +1115,7 @@ metadata:
11151115
namespace: "cert-manager"
11161116
labels:
11171117
app: webhook
1118-
chart: webhook-v0.7.0
1118+
chart: webhook-v0.8.0-alpha.0
11191119
release: cert-manager
11201120
heritage: Tiller
11211121

@@ -1128,7 +1128,7 @@ metadata:
11281128
namespace: "cert-manager"
11291129
labels:
11301130
app: cert-manager
1131-
chart: cert-manager-v0.7.2
1131+
chart: cert-manager-v0.8.0-alpha.0
11321132
release: cert-manager
11331133
heritage: Tiller
11341134
---
@@ -1139,7 +1139,7 @@ metadata:
11391139
name: cert-manager-cainjector
11401140
labels:
11411141
app: cainjector
1142-
chart: cainjector-v0.7.0
1142+
chart: cainjector-v0.8.0-alpha.0
11431143
release: cert-manager
11441144
heritage: Tiller
11451145
rules:
@@ -1165,7 +1165,7 @@ metadata:
11651165
name: cert-manager-cainjector
11661166
labels:
11671167
app: cainjector
1168-
chart: cainjector-v0.7.0
1168+
chart: cainjector-v0.8.0-alpha.0
11691169
release: cert-manager
11701170
heritage: Tiller
11711171
roleRef:
@@ -1184,7 +1184,7 @@ metadata:
11841184
name: cert-manager
11851185
labels:
11861186
app: cert-manager
1187-
chart: cert-manager-v0.7.2
1187+
chart: cert-manager-v0.8.0-alpha.0
11881188
release: cert-manager
11891189
heritage: Tiller
11901190
rules:
@@ -1204,7 +1204,7 @@ metadata:
12041204
name: cert-manager
12051205
labels:
12061206
app: cert-manager
1207-
chart: cert-manager-v0.7.2
1207+
chart: cert-manager-v0.8.0-alpha.0
12081208
release: cert-manager
12091209
heritage: Tiller
12101210
roleRef:
@@ -1222,7 +1222,7 @@ metadata:
12221222
name: cert-manager-view
12231223
labels:
12241224
app: cert-manager
1225-
chart: cert-manager-v0.7.2
1225+
chart: cert-manager-v0.8.0-alpha.0
12261226
release: cert-manager
12271227
heritage: Tiller
12281228
rbac.authorization.k8s.io/aggregate-to-view: "true"
@@ -1239,7 +1239,7 @@ metadata:
12391239
name: cert-manager-edit
12401240
labels:
12411241
app: cert-manager
1242-
chart: cert-manager-v0.7.2
1242+
chart: cert-manager-v0.8.0-alpha.0
12431243
release: cert-manager
12441244
heritage: Tiller
12451245
rbac.authorization.k8s.io/aggregate-to-edit: "true"
@@ -1260,7 +1260,7 @@ metadata:
12601260
name: cert-manager-webhook:auth-delegator
12611261
labels:
12621262
app: webhook
1263-
chart: webhook-v0.7.0
1263+
chart: webhook-v0.8.0-alpha.0
12641264
release: cert-manager
12651265
heritage: Tiller
12661266
roleRef:
@@ -1285,7 +1285,7 @@ metadata:
12851285
namespace: kube-system
12861286
labels:
12871287
app: webhook
1288-
chart: webhook-v0.7.0
1288+
chart: webhook-v0.8.0-alpha.0
12891289
release: cert-manager
12901290
heritage: Tiller
12911291
roleRef:
@@ -1306,7 +1306,7 @@ metadata:
13061306
name: cert-manager-webhook:webhook-requester
13071307
labels:
13081308
app: webhook
1309-
chart: webhook-v0.7.0
1309+
chart: webhook-v0.8.0-alpha.0
13101310
release: cert-manager
13111311
heritage: Tiller
13121312
rules:
@@ -1327,7 +1327,7 @@ metadata:
13271327
namespace: "cert-manager"
13281328
labels:
13291329
app: webhook
1330-
chart: webhook-v0.7.0
1330+
chart: webhook-v0.8.0-alpha.0
13311331
release: cert-manager
13321332
heritage: Tiller
13331333
spec:
@@ -1349,7 +1349,7 @@ metadata:
13491349
namespace: "cert-manager"
13501350
labels:
13511351
app: cainjector
1352-
chart: cainjector-v0.7.0
1352+
chart: cainjector-v0.8.0-alpha.0
13531353
release: cert-manager
13541354
heritage: Tiller
13551355
spec:
@@ -1368,7 +1368,7 @@ spec:
13681368
serviceAccountName: cert-manager-cainjector
13691369
containers:
13701370
- name: cainjector
1371-
image: "quay.io/jetstack/cert-manager-cainjector:v0.7.0"
1371+
image: "quay.io/jetstack/cert-manager-cainjector:v0.8.0-alpha.0"
13721372
imagePullPolicy: IfNotPresent
13731373
args:
13741374
- --v=2
@@ -1391,7 +1391,7 @@ metadata:
13911391
namespace: "cert-manager"
13921392
labels:
13931393
app: webhook
1394-
chart: webhook-v0.7.0
1394+
chart: webhook-v0.8.0-alpha.0
13951395
release: cert-manager
13961396
heritage: Tiller
13971397
spec:
@@ -1410,7 +1410,7 @@ spec:
14101410
serviceAccountName: cert-manager-webhook
14111411
containers:
14121412
- name: webhook
1413-
image: "quay.io/jetstack/cert-manager-webhook:v0.7.0"
1413+
image: "quay.io/jetstack/cert-manager-webhook:v0.8.0-alpha.0"
14141414
imagePullPolicy: IfNotPresent
14151415
args:
14161416
- --v=2
@@ -1442,7 +1442,7 @@ metadata:
14421442
namespace: "cert-manager"
14431443
labels:
14441444
app: cert-manager
1445-
chart: cert-manager-v0.7.2
1445+
chart: cert-manager-v0.8.0-alpha.0
14461446
release: cert-manager
14471447
heritage: Tiller
14481448
spec:
@@ -1464,7 +1464,7 @@ spec:
14641464
serviceAccountName: cert-manager
14651465
containers:
14661466
- name: cert-manager
1467-
image: "quay.io/jetstack/cert-manager-controller:v0.7.0"
1467+
image: "quay.io/jetstack/cert-manager-controller:v0.8.0-alpha.0"
14681468
imagePullPolicy: IfNotPresent
14691469
args:
14701470
- --v=2
@@ -1491,7 +1491,7 @@ metadata:
14911491
name: v1beta1.admission.certmanager.k8s.io
14921492
labels:
14931493
app: webhook
1494-
chart: webhook-v0.7.0
1494+
chart: webhook-v0.8.0-alpha.0
14951495
release: cert-manager
14961496
heritage: Tiller
14971497
annotations:
@@ -1517,7 +1517,7 @@ metadata:
15171517
namespace: "cert-manager"
15181518
labels:
15191519
app: webhook
1520-
chart: webhook-v0.7.0
1520+
chart: webhook-v0.8.0-alpha.0
15211521
release: cert-manager
15221522
heritage: Tiller
15231523
spec:
@@ -1533,7 +1533,7 @@ metadata:
15331533
namespace: "cert-manager"
15341534
labels:
15351535
app: webhook
1536-
chart: webhook-v0.7.0
1536+
chart: webhook-v0.8.0-alpha.0
15371537
release: cert-manager
15381538
heritage: Tiller
15391539
spec:
@@ -1554,7 +1554,7 @@ metadata:
15541554
namespace: "cert-manager"
15551555
labels:
15561556
app: webhook
1557-
chart: webhook-v0.7.0
1557+
chart: webhook-v0.8.0-alpha.0
15581558
release: cert-manager
15591559
heritage: Tiller
15601560
spec:
@@ -1571,7 +1571,7 @@ metadata:
15711571
namespace: "cert-manager"
15721572
labels:
15731573
app: webhook
1574-
chart: webhook-v0.7.0
1574+
chart: webhook-v0.8.0-alpha.0
15751575
release: cert-manager
15761576
heritage: Tiller
15771577
spec:
@@ -1592,7 +1592,7 @@ metadata:
15921592
name: cert-manager-webhook
15931593
labels:
15941594
app: webhook
1595-
chart: webhook-v0.7.0
1595+
chart: webhook-v0.8.0-alpha.0
15961596
release: cert-manager
15971597
heritage: Tiller
15981598
annotations:

‎docs/getting-started/install.rst

+4-4
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ are included in a single YAML manifest file:
5757
.. code-block:: shell
5858
5959
# Install the CustomResourceDefinitions and cert-manager itself
60-
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/cert-manager.yaml
60+
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/cert-manager.yaml
6161
6262
.. note::
6363
If you are running kubectl v1.12 or below, you will need to add the
@@ -115,7 +115,7 @@ In order to install the Helm chart, you must run:
115115
.. code-block:: shell
116116
117117
# Install the CustomResourceDefinition resources separately
118-
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml
118+
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml
119119
120120
# Create the namespace for cert-manager
121121
kubectl create namespace cert-manager
@@ -133,7 +133,7 @@ In order to install the Helm chart, you must run:
133133
helm install \
134134
--name cert-manager \
135135
--namespace cert-manager \
136-
--version v0.7.0 \
136+
--version v0.8.0-alpha.0 \
137137
jetstack/cert-manager
138138
139139
The default cert-manager configuration is good for the majority of users, but a
@@ -266,7 +266,7 @@ If you have any issues with your installation, please refer to the
266266
:doc:`troubleshooting guide <./troubleshooting>`.
267267
268268
.. _`CustomResourceDefinitions`: https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/
269-
.. _`Helm chart README`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/charts/cert-manager/README.md
269+
.. _`Helm chart README`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/charts/cert-manager/README.md
270270
.. _`kubernetes/kubernetes#69590`: https://github.com/kubernetes/kubernetes/issues/69590
271271
.. _`ValidatingWebhookConfiguration`: https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/
272272
.. _`Helm`: https://helm.sh/

‎docs/getting-started/webhook.rst

+5-5
Original file line numberDiff line numberDiff line change
@@ -193,15 +193,15 @@ To re-install cert-manager without the webhook, run:
193193

194194
.. code-block:: shell
195195
196-
kubectl delete -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/cert-manager.yaml
196+
kubectl delete -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/cert-manager.yaml
197197
198-
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/cert-manager-no-webhook.yaml
198+
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/cert-manager-no-webhook.yaml
199199
200200
Once you have re-installed cert-manager, you should then
201201
:doc:`restore your configuration </tasks/backup-restore-crds>`.
202202

203-
.. _`deploy directory`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests
204-
.. _`cert-manager.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests/cert-manager.yaml
205-
.. _`cert-manager-no-webhook.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests/cert-manager-no-webhook.yaml
203+
.. _`deploy directory`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests
204+
.. _`cert-manager.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests/cert-manager.yaml
205+
.. _`cert-manager-no-webhook.yaml`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests/cert-manager-no-webhook.yaml
206206
.. _`GKE docs`: https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules
207207
.. _`ValidatingWebhookConfiguration`: https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/

‎docs/tasks/issuing-certificates/index.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ A full list of the fields supported on the Certificate resource can be found in
7272
the `API reference documentation`_.
7373

7474
.. _`#1269`: https://github.com/jetstack/cert-manager/issues/1269
75-
.. _`API reference documentation`: https://docs.cert-manager.io/en/release-0.7/reference/api-docs/index.html#certificatespec-v1alpha1
75+
.. _`API reference documentation`: https://docs.cert-manager.io/en/release-0.8/reference/api-docs/index.html#certificatespec-v1alpha1
7676

7777
Temporary certificates whilst issuing
7878
=====================================

‎docs/tasks/upgrading/index.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -92,5 +92,5 @@ version number you want to install:
9292
upgrading-0.5-0.6
9393

9494
.. _`official Helm charts repository`: https://hub.helm.sh/charts/jetstack
95-
.. _`static deployment manifests`: https://github.com/jetstack/cert-manager/blob/release-0.7/deploy/manifests
95+
.. _`static deployment manifests`: https://github.com/jetstack/cert-manager/blob/release-0.8/deploy/manifests
9696
.. _`kubernetes/kubernetes#69590`: https://github.com/kubernetes/kubernetes/issues/69590

‎docs/tasks/upgrading/upgrading-0.5-0.6.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Before upgrading you will need to:
7676
7777
# Install the cert-manager CRDs
7878
$ kubectl apply \
79-
-f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml
79+
-f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml
8080
8181
# Update helm repository cache
8282
$ helm repo update

‎docs/tutorials/acme/quick-start/index.rst

+16-16
Original file line numberDiff line numberDiff line change
@@ -236,8 +236,8 @@ sample deployment and an associated service:
236236
.. literalinclude:: example/service.yaml
237237
:language: yaml
238238
239-
.. _`deployment.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/deployment.yaml
240-
.. _`service.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/service.yaml
239+
.. _`deployment.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/deployment.yaml
240+
.. _`service.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/service.yaml
241241
.. _`kuard`: https://github.com/kubernetes-up-and-running/kuard
242242
243243
You can create download and reference these files locally, or you can
@@ -247,10 +247,10 @@ you may use the commands:
247247
248248
.. code-block:: shell
249249
250-
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/deployment.yaml
250+
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/deployment.yaml
251251
deployment.extensions "kuard" created
252252
253-
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/service.yaml
253+
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/service.yaml
254254
service "kuard" created
255255
256256
An `ingress resource`_ is what Kubernetes uses to expose this example service
@@ -265,14 +265,14 @@ A sample ingress you can start with is:
265265
.. literalinclude:: example/ingress.yaml
266266
:language: yaml
267267
268-
.. _`ingress.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress.yaml
268+
.. _`ingress.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress.yaml
269269
.. _`ingress resource`: https://kubernetes.io/docs/concepts/services-networking/ingress/
270270
271271
You can download the sample manifest from github, edit it, and submit the manifest to Kubernetes with the command:
272272
273273
.. code-block:: shell
274274
275-
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress.yaml
275+
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress.yaml
276276
277277
# edit the file in your editor, and once it is saved:
278278
ingress.extensions "kuard" created
@@ -351,8 +351,8 @@ install cert-manager. This example installed cert-manager into the
351351
.. code-block:: shell
352352
353353
# Install the cert-manager CRDs. We must do this before installing the Helm
354-
# chart in the next step for `release-0.7` of cert-manager:
355-
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/deploy/manifests/00-crds.yaml
354+
# chart in the next step for `release-0.8` of cert-manager:
355+
$ kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml
356356
357357
## IMPORTANT: if the cert-manager namespace **already exists**, you MUST ensure
358358
## it has an additional label on it in order for the deployment to succeed
@@ -499,13 +499,13 @@ expirations and updates.
499499
.. literalinclude:: example/staging-issuer.yaml
500500
:language: yaml
501501
502-
.. _`staging-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/staging-issuer.yaml
502+
.. _`staging-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/staging-issuer.yaml
503503
504504
Once edited, apply the custom resource:
505505
506506
.. code-block:: shell
507507
508-
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/staging-issuer.yaml
508+
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/staging-issuer.yaml
509509
issuer.certmanager.k8s.io "letsencrypt-staging" created
510510
511511
Also create a production issuer and deploy it. As with the staging issuer, you
@@ -517,11 +517,11 @@ will need to update this example and add in your own email address.
517517
:language: yaml
518518
:emphasize-lines: 10
519519
520-
.. _`production-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/production-issuer.yaml
520+
.. _`production-issuer.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/production-issuer.yaml
521521
522522
.. code-block:: shell
523523
524-
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/production-issuer.yaml
524+
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/production-issuer.yaml
525525
issuer.certmanager.k8s.io "letsencrypt-prod" created
526526
527527
Both of these issuers are configured to use the
@@ -599,13 +599,13 @@ example:
599599
:language: yaml
600600
:emphasize-lines: 6-8
601601
602-
.. _`ingress-tls.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls.yaml
602+
.. _`ingress-tls.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls.yaml
603603
604604
and apply it:
605605
606606
.. code-block:: shell
607607
608-
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls.yaml
608+
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls.yaml
609609
ingress.extensions "kuard" configured
610610
611611
Cert-manager will read these annotations and use them to create a certificate,
@@ -715,11 +715,11 @@ can update the annotations in the ingress to specify the production issuer:
715715
.. literalinclude:: example/ingress-tls-final.yaml
716716
:language: yaml
717717
718-
.. _`ingress-tls-final.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml
718+
.. _`ingress-tls-final.yaml`: https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml
719719
720720
.. code-block:: shell
721721
722-
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml
722+
$ kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/docs/tutorials/acme/quick-start/example/ingress-tls-final.yaml
723723
724724
ingress.extensions "kuard" configured
725725

0 commit comments

Comments
 (0)
Please sign in to comment.