chore: Update manifests after change
This commit is contained in:
@@ -0,0 +1,323 @@
|
||||
---
|
||||
# Source: cert-manager/charts/cert-manager/templates/crd-cert-manager.io_certificaterequests.yaml
|
||||
apiVersion: apiextensions.k8s.io/v1
|
||||
kind: CustomResourceDefinition
|
||||
metadata:
|
||||
name: "certificaterequests.cert-manager.io"
|
||||
annotations:
|
||||
helm.sh/resource-policy: keep
|
||||
labels:
|
||||
app: "cert-manager"
|
||||
app.kubernetes.io/name: "cert-manager"
|
||||
app.kubernetes.io/instance: "cert-manager"
|
||||
app.kubernetes.io/component: "crds"
|
||||
app.kubernetes.io/version: "v1.19.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
helm.sh/chart: cert-manager-v1.19.1
|
||||
spec:
|
||||
group: cert-manager.io
|
||||
names:
|
||||
categories:
|
||||
- cert-manager
|
||||
kind: CertificateRequest
|
||||
listKind: CertificateRequestList
|
||||
plural: certificaterequests
|
||||
shortNames:
|
||||
- cr
|
||||
- crs
|
||||
singular: certificaterequest
|
||||
scope: Namespaced
|
||||
versions:
|
||||
- additionalPrinterColumns:
|
||||
- jsonPath: .status.conditions[?(@.type == "Approved")].status
|
||||
name: Approved
|
||||
type: string
|
||||
- jsonPath: .status.conditions[?(@.type == "Denied")].status
|
||||
name: Denied
|
||||
type: string
|
||||
- jsonPath: .status.conditions[?(@.type == "Ready")].status
|
||||
name: Ready
|
||||
type: string
|
||||
- jsonPath: .spec.issuerRef.name
|
||||
name: Issuer
|
||||
type: string
|
||||
- jsonPath: .spec.username
|
||||
name: Requester
|
||||
type: string
|
||||
- jsonPath: .status.conditions[?(@.type == "Ready")].message
|
||||
name: Status
|
||||
priority: 1
|
||||
type: string
|
||||
- description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
|
||||
jsonPath: .metadata.creationTimestamp
|
||||
name: Age
|
||||
type: date
|
||||
name: v1
|
||||
schema:
|
||||
openAPIV3Schema:
|
||||
description: |-
|
||||
A CertificateRequest is used to request a signed certificate from one of the
|
||||
configured issuers.
|
||||
|
||||
All fields within the CertificateRequest's `spec` are immutable after creation.
|
||||
A CertificateRequest will either succeed or fail, as denoted by its `Ready` status
|
||||
condition and its `status.failureTime` field.
|
||||
|
||||
A CertificateRequest is a one-shot resource, meaning it represents a single
|
||||
point in time request for a certificate and cannot be re-used.
|
||||
properties:
|
||||
apiVersion:
|
||||
description: |-
|
||||
APIVersion defines the versioned schema of this representation of an object.
|
||||
Servers should convert recognized schemas to the latest internal value, and
|
||||
may reject unrecognized values.
|
||||
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
||||
type: string
|
||||
kind:
|
||||
description: |-
|
||||
Kind is a string value representing the REST resource this object represents.
|
||||
Servers may infer this from the endpoint the client submits requests to.
|
||||
Cannot be updated.
|
||||
In CamelCase.
|
||||
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
||||
type: string
|
||||
metadata:
|
||||
type: object
|
||||
spec:
|
||||
description: |-
|
||||
Specification of the desired state of the CertificateRequest resource.
|
||||
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status
|
||||
properties:
|
||||
duration:
|
||||
description: |-
|
||||
Requested 'duration' (i.e. lifetime) of the Certificate. Note that the
|
||||
issuer may choose to ignore the requested duration, just like any other
|
||||
requested attribute.
|
||||
type: string
|
||||
extra:
|
||||
additionalProperties:
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
description: |-
|
||||
Extra contains extra attributes of the user that created the CertificateRequest.
|
||||
Populated by the cert-manager webhook on creation and immutable.
|
||||
type: object
|
||||
groups:
|
||||
description: |-
|
||||
Groups contains group membership of the user that created the CertificateRequest.
|
||||
Populated by the cert-manager webhook on creation and immutable.
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
x-kubernetes-list-type: atomic
|
||||
isCA:
|
||||
description: |-
|
||||
Requested basic constraints isCA value. Note that the issuer may choose
|
||||
to ignore the requested isCA value, just like any other requested attribute.
|
||||
|
||||
NOTE: If the CSR in the `Request` field has a BasicConstraints extension,
|
||||
it must have the same isCA value as specified here.
|
||||
|
||||
If true, this will automatically add the `cert sign` usage to the list
|
||||
of requested `usages`.
|
||||
type: boolean
|
||||
issuerRef:
|
||||
description: |-
|
||||
Reference to the issuer responsible for issuing the certificate.
|
||||
If the issuer is namespace-scoped, it must be in the same namespace
|
||||
as the Certificate. If the issuer is cluster-scoped, it can be used
|
||||
from any namespace.
|
||||
|
||||
The `name` field of the reference must always be specified.
|
||||
properties:
|
||||
group:
|
||||
description: |-
|
||||
Group of the issuer being referred to.
|
||||
Defaults to 'cert-manager.io'.
|
||||
type: string
|
||||
kind:
|
||||
description: |-
|
||||
Kind of the issuer being referred to.
|
||||
Defaults to 'Issuer'.
|
||||
type: string
|
||||
name:
|
||||
description: Name of the issuer being referred to.
|
||||
type: string
|
||||
required:
|
||||
- name
|
||||
type: object
|
||||
request:
|
||||
description: |-
|
||||
The PEM-encoded X.509 certificate signing request to be submitted to the
|
||||
issuer for signing.
|
||||
|
||||
If the CSR has a BasicConstraints extension, its isCA attribute must
|
||||
match the `isCA` value of this CertificateRequest.
|
||||
If the CSR has a KeyUsage extension, its key usages must match the
|
||||
key usages in the `usages` field of this CertificateRequest.
|
||||
If the CSR has a ExtKeyUsage extension, its extended key usages
|
||||
must match the extended key usages in the `usages` field of this
|
||||
CertificateRequest.
|
||||
format: byte
|
||||
type: string
|
||||
uid:
|
||||
description: |-
|
||||
UID contains the uid of the user that created the CertificateRequest.
|
||||
Populated by the cert-manager webhook on creation and immutable.
|
||||
type: string
|
||||
usages:
|
||||
description: |-
|
||||
Requested key usages and extended key usages.
|
||||
|
||||
NOTE: If the CSR in the `Request` field has uses the KeyUsage or
|
||||
ExtKeyUsage extension, these extensions must have the same values
|
||||
as specified here without any additional values.
|
||||
|
||||
If unset, defaults to `digital signature` and `key encipherment`.
|
||||
items:
|
||||
description: |-
|
||||
KeyUsage specifies valid usage contexts for keys.
|
||||
See:
|
||||
https://tools.ietf.org/html/rfc5280#section-4.2.1.3
|
||||
https://tools.ietf.org/html/rfc5280#section-4.2.1.12
|
||||
|
||||
Valid KeyUsage values are as follows:
|
||||
"signing",
|
||||
"digital signature",
|
||||
"content commitment",
|
||||
"key encipherment",
|
||||
"key agreement",
|
||||
"data encipherment",
|
||||
"cert sign",
|
||||
"crl sign",
|
||||
"encipher only",
|
||||
"decipher only",
|
||||
"any",
|
||||
"server auth",
|
||||
"client auth",
|
||||
"code signing",
|
||||
"email protection",
|
||||
"s/mime",
|
||||
"ipsec end system",
|
||||
"ipsec tunnel",
|
||||
"ipsec user",
|
||||
"timestamping",
|
||||
"ocsp signing",
|
||||
"microsoft sgc",
|
||||
"netscape sgc"
|
||||
enum:
|
||||
- signing
|
||||
- digital signature
|
||||
- content commitment
|
||||
- key encipherment
|
||||
- key agreement
|
||||
- data encipherment
|
||||
- cert sign
|
||||
- crl sign
|
||||
- encipher only
|
||||
- decipher only
|
||||
- any
|
||||
- server auth
|
||||
- client auth
|
||||
- code signing
|
||||
- email protection
|
||||
- s/mime
|
||||
- ipsec end system
|
||||
- ipsec tunnel
|
||||
- ipsec user
|
||||
- timestamping
|
||||
- ocsp signing
|
||||
- microsoft sgc
|
||||
- netscape sgc
|
||||
type: string
|
||||
type: array
|
||||
x-kubernetes-list-type: atomic
|
||||
username:
|
||||
description: |-
|
||||
Username contains the name of the user that created the CertificateRequest.
|
||||
Populated by the cert-manager webhook on creation and immutable.
|
||||
type: string
|
||||
required:
|
||||
- issuerRef
|
||||
- request
|
||||
type: object
|
||||
status:
|
||||
description: |-
|
||||
Status of the CertificateRequest.
|
||||
This is set and managed automatically.
|
||||
Read-only.
|
||||
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status
|
||||
properties:
|
||||
ca:
|
||||
description: |-
|
||||
The PEM encoded X.509 certificate of the signer, also known as the CA
|
||||
(Certificate Authority).
|
||||
This is set on a best-effort basis by different issuers.
|
||||
If not set, the CA is assumed to be unknown/not available.
|
||||
format: byte
|
||||
type: string
|
||||
certificate:
|
||||
description: |-
|
||||
The PEM encoded X.509 certificate resulting from the certificate
|
||||
signing request.
|
||||
If not set, the CertificateRequest has either not been completed or has
|
||||
failed. More information on failure can be found by checking the
|
||||
`conditions` field.
|
||||
format: byte
|
||||
type: string
|
||||
conditions:
|
||||
description: |-
|
||||
List of status conditions to indicate the status of a CertificateRequest.
|
||||
Known condition types are `Ready`, `InvalidRequest`, `Approved` and `Denied`.
|
||||
items:
|
||||
description: CertificateRequestCondition contains condition information for a CertificateRequest.
|
||||
properties:
|
||||
lastTransitionTime:
|
||||
description: |-
|
||||
LastTransitionTime is the timestamp corresponding to the last status
|
||||
change of this condition.
|
||||
format: date-time
|
||||
type: string
|
||||
message:
|
||||
description: |-
|
||||
Message is a human readable description of the details of the last
|
||||
transition, complementing reason.
|
||||
type: string
|
||||
reason:
|
||||
description: |-
|
||||
Reason is a brief machine readable explanation for the condition's last
|
||||
transition.
|
||||
type: string
|
||||
status:
|
||||
description: Status of the condition, one of (`True`, `False`, `Unknown`).
|
||||
enum:
|
||||
- "True"
|
||||
- "False"
|
||||
- Unknown
|
||||
type: string
|
||||
type:
|
||||
description: |-
|
||||
Type of the condition, known values are (`Ready`, `InvalidRequest`,
|
||||
`Approved`, `Denied`).
|
||||
type: string
|
||||
required:
|
||||
- status
|
||||
- type
|
||||
type: object
|
||||
type: array
|
||||
x-kubernetes-list-map-keys:
|
||||
- type
|
||||
x-kubernetes-list-type: map
|
||||
failureTime:
|
||||
description: |-
|
||||
FailureTime stores the time that this CertificateRequest failed. This is
|
||||
used to influence garbage collection and back-off.
|
||||
format: date-time
|
||||
type: string
|
||||
type: object
|
||||
type: object
|
||||
served: true
|
||||
storage: true
|
||||
subresources:
|
||||
status: {}
|
||||
Reference in New Issue
Block a user