From 6b923d8fe69c26a3615a1b12be43119432765f48 Mon Sep 17 00:00:00 2001 From: github-actions Date: Fri, 30 May 2025 19:25:31 +0000 Subject: [PATCH] Update cert-manager metadata and add version 1.17.2 --- .../1.17.2.yml | 231 ++++++++++++++++++ 1 file changed, 231 insertions(+) create mode 100644 repo/packages/cert-manager.packages.kadras.io/1.17.2.yml diff --git a/repo/packages/cert-manager.packages.kadras.io/1.17.2.yml b/repo/packages/cert-manager.packages.kadras.io/1.17.2.yml new file mode 100644 index 0000000..55aff47 --- /dev/null +++ b/repo/packages/cert-manager.packages.kadras.io/1.17.2.yml @@ -0,0 +1,231 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + creationTimestamp: null + name: cert-manager.packages.kadras.io.1.17.2 +spec: + licenses: + - Apache 2.0 + refName: cert-manager.packages.kadras.io + releaseNotes: https://github.com/kadras-io/package-for-cert-manager/releases + releasedAt: "2025-05-30T19:24:22Z" + template: + spec: + deploy: + - kapp: {} + fetch: + - imgpkgBundle: + image: ghcr.io/kadras-io/package-for-cert-manager@sha256:95a278e351c04d81ea080013372a10e7e17bc99d739527ac27bcedf286710b33 + template: + - ytt: + paths: + - config + - kbld: + paths: + - '-' + - .imgpkg/images.yml + valuesSchema: + openAPIv3: + additionalProperties: false + properties: + cainjector: + additionalProperties: false + description: Settings for the cainjector controller. + properties: + loglevel: + default: 2 + description: Number of the log level verbosity. + maximum: 5 + minimum: 1 + type: integer + replicas: + default: 1 + description: The number of replicas. In order to enable high availability, + 2 replicas are recommended. + minimum: 1 + type: integer + type: object + controller: + additionalProperties: false + description: Settings for the cert-manager controller. + properties: + dns01: + additionalProperties: false + description: Configures the behaviour of the ACME DNS01 challenge solver. + properties: + recursive_nameservers: + default: [] + description: Each nameserver can be either the IP address and port + of a standard recursive DNS server, or the endpoint to an RFC + 8484 DNS over HTTPS endpoint. + items: + default: "" + type: string + type: array + recursive_nameservers_only: + default: false + description: When true, cert-manager will only ever query the configured + DNS resolvers to perform the ACME DNS01 self check. This is useful + in DNS constrained environments, where access to authoritative + nameservers is restricted. Enabling this option could cause the + DNS01 self check to take longer due to caching performed by the + recursive nameservers. + type: boolean + type: object + loglevel: + default: 2 + description: Number of the log level verbosity. + maximum: 5 + minimum: 1 + type: integer + replicas: + default: 1 + description: The number of replicas. In order to enable high availability, + 2 replicas are recommended. + minimum: 1 + type: integer + type: object + leader_election: + additionalProperties: false + description: Leader election configuration for the cert-manager and cert-manager-cainjector + Deployments. + properties: + namespace: + default: kube-system + description: 'Namespace used to perform leader election. The default + namespace needs changing in environments like GKE. More information: + https://cert-manager.io/docs/installation/compatibility.' + minLength: 1 + type: string + type: object + letsencrypt: + additionalProperties: false + description: Settings for Let's Encrypt. + properties: + challenge: + additionalProperties: false + properties: + dns_provider: + default: digital_ocean + description: 'The DNS provider to use for the ACME dns01 challenge. + Valid options: `cloudflare`, `digital_ocean`.' + enum: + - cloudflare + - digital_ocean + type: string + secret: + additionalProperties: false + properties: + key: + default: "" + description: The key within the Secret that contains the credentials + needed for the dns01 challenge. + type: string + name: + default: "" + description: Name of the Secret containing the credentials needed + for the dns01 challenge. + type: string + namespace: + default: kadras-system + description: Namespace containing the Secret with the credentials + needed for the dns01 challenge. + type: string + type: object + type: + default: http01 + description: 'The type of challenge used by the ACME CA Server. + Valid options: `http01`, `dns01`.' + enum: + - http01 + - dns01 + type: string + type: object + email: + default: "" + description: The email address that Let's Encrypt will use to send info + on expiring certificates or other issues. + type: string + include: + default: false + description: Whether to include a ClusterIssuer for Let's Encrypt. + type: boolean + production: + default: false + description: Whether to use Let's Encrypt staging (recommended for non-production + environments) or production. + type: boolean + type: object + namespace: + default: cert-manager + description: The namespace in which to deploy cert-manager. + minLength: 1 + type: string + policies: + additionalProperties: false + description: Settings for the Kyverno policies. + properties: + include: + default: false + description: Whether to include the out-of-the-box Kyverno policies + to validate and secure the package installation. + type: boolean + type: object + private_pki: + additionalProperties: false + description: Settings for the built-in, private PKI + properties: + include: + default: true + description: Whether to include a ClusterIssuer for a private PKI. + type: boolean + type: object + proxy: + additionalProperties: false + description: Settings for the corporate proxy. + properties: + http_proxy: + default: "" + description: The HTTP proxy to use for network traffic. + type: string + https_proxy: + default: "" + description: The HTTPS proxy to use for network traffic. + type: string + no_proxy: + default: "" + description: A comma-separated list of hostnames, IP addresses, or IP + ranges in CIDR format that should not use the proxy. + type: string + type: object + webhook: + additionalProperties: false + description: Settings for the cert-manager webhook. + properties: + host_network: + default: false + description: 'Whether to run the webhook in the host network so that + it can be reached by the cert-manager controller in environments like + AWS EKS. More information: https://cert-manager.io/docs/installation/compatibility.' + type: boolean + loglevel: + default: 2 + description: Number of the log level verbosity. + maximum: 5 + minimum: 1 + type: integer + replicas: + default: 1 + description: The number of replicas. In order to enable high availability, + at least 3 replicas are recommended. + minimum: 1 + type: integer + secure_port: + default: 6443 + description: 'The port where the webhook is exposed. The default port + needs changing in environments like AWS EKS and AWS Fargate. More + information: https://cert-manager.io/docs/installation/compatibility.' + type: integer + type: object + type: object + version: 1.17.2