Skip to content

Commit

Permalink
Move deployment generation values.yaml to deploy/manifests and don't …
Browse files Browse the repository at this point in the history
…generate without-rbac variants of manifests

Signed-off-by: James Munnelly <james@munnelly.eu>
  • Loading branch information
munnerz committed Dec 4, 2018
1 parent dfa1a92 commit 4283138
Show file tree
Hide file tree
Showing 9 changed files with 46 additions and 765 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: webhook
name: cert-manager
namespace: "cert-manager"
labels:
app: webhook
Expand All @@ -20,7 +20,7 @@ metadata:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: webhook:auth-delegator
name: cert-manager:auth-delegator
labels:
app: webhook
chart: webhook-v0.6.0-dev.3
Expand All @@ -33,7 +33,7 @@ roleRef:
subjects:
- apiGroup: ""
kind: ServiceAccount
name: webhook
name: cert-manager
namespace: cert-manager

---
Expand All @@ -44,7 +44,7 @@ subjects:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: webhook:webhook-authentication-reader
name: cert-manager:webhook-authentication-reader
namespace: kube-system
labels:
app: webhook
Expand All @@ -58,15 +58,15 @@ roleRef:
subjects:
- apiGroup: ""
kind: ServiceAccount
name: webhook
name: cert-manager
namespace: cert-manager

---

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: webhook:webhook-requester
name: cert-manager:webhook-requester
labels:
app: webhook
chart: webhook-v0.6.0-dev.3
Expand All @@ -87,7 +87,7 @@ rules:
apiVersion: v1
kind: Service
metadata:
name: webhook
name: cert-manager
namespace: "cert-manager"
labels:
app: webhook
Expand All @@ -109,7 +109,7 @@ spec:
apiVersion: apps/v1beta1
kind: Deployment
metadata:
name: webhook
name: cert-manager
namespace: "cert-manager"
labels:
app: webhook
Expand All @@ -129,7 +129,7 @@ spec:
release: webhook
annotations:
spec:
serviceAccountName: webhook
serviceAccountName: cert-manager
containers:
- name: webhook
image: "quay.io/jetstack/cert-manager-webhook:canary"
Expand All @@ -156,7 +156,7 @@ spec:
volumes:
- name: certs
secret:
secretName: webhook-webhook-tls
secretName: cert-manager-webhook-tls

---
# Source: webhook/templates/ca-sync.yaml
Expand All @@ -167,7 +167,7 @@ spec:
apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: webhook-ca-sync
name: cert-manager-ca-sync
namespace: "cert-manager"
labels:
app: webhook
Expand All @@ -183,7 +183,7 @@ spec:
labels:
app: ca-helper
spec:
serviceAccountName: webhook-ca-sync
serviceAccountName: cert-manager-ca-sync
restartPolicy: OnFailure
containers:
- name: ca-helper
Expand All @@ -204,12 +204,12 @@ spec:
volumes:
- name: config
configMap:
name: webhook-ca-sync
name: cert-manager-ca-sync
---
apiVersion: batch/v1
kind: Job
metadata:
name: webhook-ca-sync
name: cert-manager-ca-sync
namespace: "cert-manager"
labels:
app: webhook
Expand All @@ -222,7 +222,7 @@ spec:
labels:
app: ca-helper
spec:
serviceAccountName: webhook-ca-sync
serviceAccountName: cert-manager-ca-sync
restartPolicy: OnFailure
containers:
- name: ca-helper
Expand All @@ -243,12 +243,12 @@ spec:
volumes:
- name: config
configMap:
name: webhook-ca-sync
name: cert-manager-ca-sync
---
apiVersion: v1
kind: ConfigMap
metadata:
name: webhook-ca-sync
name: cert-manager-ca-sync
namespace: "cert-manager"
labels:
app: webhook
Expand All @@ -262,15 +262,15 @@ data:
{
"name": "v1beta1.admission.certmanager.k8s.io",
"secret": {
"name": "webhook-ca",
"name": "cert-manager-ca",
"namespace": "cert-manager",
"key": "tls.crt"
}
}
],
"validatingWebhookConfigurations": [
{
"name": "webhook",
"name": "cert-manager",
"file": {
"path": "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
}
Expand All @@ -281,7 +281,7 @@ data:
apiVersion: v1
kind: ServiceAccount
metadata:
name: webhook-ca-sync
name: cert-manager-ca-sync
namespace: "cert-manager"
labels:
app: webhook
Expand All @@ -292,7 +292,7 @@ metadata:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: webhook-ca-sync
name: cert-manager-ca-sync
labels:
app: webhook
chart: webhook-v0.6.0-dev.3
Expand All @@ -303,12 +303,12 @@ rules:
resources: ["secrets"]
verbs: ["get"]
resourceNames:
- webhook-ca
- cert-manager-ca
- apiGroups: ["admissionregistration.k8s.io"]
resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"]
verbs: ["get", "update"]
resourceNames:
- webhook
- cert-manager
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get", "update"]
Expand All @@ -318,7 +318,7 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: webhook-ca-sync
name: cert-manager-ca-sync
labels:
app: webhook
chart: webhook-v0.6.0-dev.3
Expand All @@ -327,9 +327,9 @@ metadata:
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: webhook-ca-sync
name: cert-manager-ca-sync
subjects:
- name: webhook-ca-sync
- name: cert-manager-ca-sync
namespace: cert-manager
kind: ServiceAccount

Expand All @@ -349,7 +349,7 @@ spec:
groupPriorityMinimum: 1000
versionPriority: 15
service:
name: webhook
name: cert-manager
namespace: "cert-manager"
version: v1beta1

Expand All @@ -361,7 +361,7 @@ spec:
apiVersion: certmanager.k8s.io/v1alpha1
kind: Issuer
metadata:
name: webhook-selfsign
name: cert-manager-selfsign
namespace: "cert-manager"
labels:
app: webhook
Expand All @@ -377,17 +377,17 @@ spec:
apiVersion: certmanager.k8s.io/v1alpha1
kind: Certificate
metadata:
name: webhook-ca
name: cert-manager-ca
namespace: "cert-manager"
labels:
app: webhook
chart: webhook-v0.6.0-dev.3
release: webhook
heritage: Tiller
spec:
secretName: webhook-ca
secretName: cert-manager-ca
issuerRef:
name: webhook-selfsign
name: cert-manager-selfsign
commonName: "ca.webhook.cert-manager"
isCA: true

Expand All @@ -397,7 +397,7 @@ spec:
apiVersion: certmanager.k8s.io/v1alpha1
kind: Issuer
metadata:
name: webhook-ca
name: cert-manager-ca
namespace: "cert-manager"
labels:
app: webhook
Expand All @@ -406,36 +406,36 @@ metadata:
heritage: Tiller
spec:
ca:
secretName: webhook-ca
secretName: cert-manager-ca

---

# Finally, generate a serving certificate for the webhook to use
apiVersion: certmanager.k8s.io/v1alpha1
kind: Certificate
metadata:
name: webhook-webhook-tls
name: cert-manager-webhook-tls
namespace: "cert-manager"
labels:
app: webhook
chart: webhook-v0.6.0-dev.3
release: webhook
heritage: Tiller
spec:
secretName: webhook-webhook-tls
secretName: cert-manager-webhook-tls
issuerRef:
name: webhook-ca
name: cert-manager-ca
dnsNames:
- webhook
- webhook.cert-manager
- webhook.cert-manager.svc
- cert-manager
- cert-manager.cert-manager
- cert-manager.cert-manager.svc

---
# Source: webhook/templates/validating-webhook.yaml
apiVersion: admissionregistration.k8s.io/v1beta1
kind: ValidatingWebhookConfiguration
metadata:
name: webhook
name: cert-manager
labels:
app: webhook
chart: webhook-v0.6.0-dev.3
Expand Down
File renamed without changes.
Original file line number Diff line number Diff line change
@@ -1,3 +1,5 @@
fullnameOverride: cert-manager

resources:
requests:
cpu: 10m
Expand Down

0 comments on commit 4283138

Please sign in to comment.