Skip to content

Commit 85c15ff

Browse files
authored
Improve docs and config (#18)
1 parent dcab504 commit 85c15ff

File tree

11 files changed

+42
-15
lines changed

11 files changed

+42
-15
lines changed

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,6 @@ jobs:
1818
registry-server: ghcr.io
1919
registry-username: ${{ github.actor }}
2020
image: ${{ github.repository }}
21-
version: 1.11.0+kadras.1
21+
version: 1.11.0+kadras.2
2222
secrets:
2323
pull-request-token: ${{ secrets.GH_ORG_PAT }}

Makefile

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,10 @@ prepare: test/setup
1414
dev: package
1515
cd package && kctrl dev -f package-resources.yml --local -y
1616

17+
# Clean development environment
18+
clean:
19+
cd package && kctrl dev -f package-resources.yml --local -y --delete
20+
1721
# Process the configuration manifests with ytt
1822
ytt:
1923
ytt --file package/config

docs/corporate-proxy.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
# Using a corporate proxy
2+
3+
When running Cert Manager behind a corporate proxy, you can configure the controller to proxy communications with external services.
4+
5+
```yaml
6+
proxy:
7+
http_proxy: "proxy.kadras.io"
8+
https_proxy: "proxy.kadras.io"
9+
no_proxy: ".svc, .cluster.local"
10+
```

docs/high-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The leader election strategy is enabled by default and can be customized.
1212
leader_election:
1313
lease_duration: "60s"
1414
renew_deadline: "40s"
15-
retry_period: "10s"
15+
retry_period: "15s"
1616
```
1717
1818
## High availability for the webhooks

docs/policies.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,10 @@
11
# Policies
22

3-
Validate and secure the Cert Manager installation.
3+
Validate and secure the package installation.
44

55
## Kyverno
66

7-
This package provides an optional set of out-of-the-box policies to validate and secure the Cert Manager installation and functionality. The policies requires [Kyverno](https://kyverno.io) to be installed in your Kubernetes cluster.
8-
9-
The following configuration instructs the package to include the set of Kyverno policies.
7+
This package provides an optional set of out-of-the-box policies to validate and secure the package installation and its functionality. The policies requires [Kyverno](https://kyverno.io) to be installed in your Kubernetes cluster.
108

119
```yaml
1210
policies:

docs/verify-release.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,20 +12,26 @@ The result:
1212

1313
```shell
1414
📦 Supply Chain Security Related artifacts for an image: ghcr.io/kadras-io/package-for-cert-manager
15-
└── 💾 Attestations for an image tag: ghcr.io/kadras-io/package-for-cert-manager:sha256-76d5d060d8a864933699715d29ef3fdc805378ed47600e029b03aadad020e77e.att
16-
└── 🍒 sha256:2daae1cfdfb38b1a51cb7f273cac0081a2216017e4db5f78b4e1430fabcd99d1
17-
└── 🔐 Signatures for an image tag: ghcr.io/kadras-io/package-for-cert-manager:sha256-76d5d060d8a864933699715d29ef3fdc805378ed47600e029b03aadad020e77e.sig
18-
└── 🍒 sha256:7390da18a629450c393c8ee9a9712e8bc27f1fbfedbd07312e54f57e9a6be5d5
15+
└── 💾 Attestations for an image tag: ghcr.io/kadras-io/package-for-cert-manager:sha256-3cc778ffeb099e827e357518ea32e4e4b5688ea1ef947270139732bb8719c355.att
16+
└── 🍒 sha256:050052870dc08a4d59d9c59189d14f02c17e89e5c75e17b429263484190dfda5
17+
└── 🔐 Signatures for an image tag: ghcr.io/kadras-io/package-for-cert-manager:sha256-3cc778ffeb099e827e357518ea32e4e4b5688ea1ef947270139732bb8719c355.sig
18+
└── 🍒 sha256:84b91f7dab26d39bf107e0b631f24baf3a6e74c13496a7e4ad0d314f21f784d4
1919
```
2020

2121
You can verify the signature and its claims:
2222

2323
```shell
24-
COSIGN_EXPERIMENTAL=1 cosign verify ghcr.io/kadras-io/package-for-cert-manager | jq
24+
cosign verify \
25+
--certificate-identity-regexp https://github.com/kadras-io \
26+
--certificate-oidc-issuer https://token.actions.githubusercontent.com \
27+
ghcr.io/kadras-io/package-for-cert-manager | jq
2528
```
2629

2730
You can also verify the SLSA Provenance attestation associated with the image.
2831

2932
```shell
30-
COSIGN_EXPERIMENTAL=1 cosign verify-attestation --type slsaprovenance ghcr.io/kadras-io/package-for-cert-manager | jq .payload -r | base64 --decode | jq
33+
cosign verify-attestation --type slsaprovenance \
34+
--certificate-identity-regexp https://github.com/slsa-framework \
35+
--certificate-oidc-issuer https://token.actions.githubusercontent.com \
36+
ghcr.io/kadras-io/package-for-cert-manager | jq .payload -r | base64 --decode | jq
3137
```
File renamed without changes.

package/config/overlays/namespace.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ metadata:
1919
#@overlay/match by=overlay.or_op(cluster_role_binding, role_binding), expects=13
2020
---
2121
subjects:
22-
#@overlay/match by=overlay.subset({"namespace": "cert-manager"})
22+
#@overlay/match by=overlay.subset({"namespace":"cert-manager"})
2323
- kind: ServiceAccount
2424
namespace: #@ data.values.namespace
2525

package/config/overlays/registry-credentials.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ type: kubernetes.io/dockerconfigjson
2020
data:
2121
.dockerconfigjson: e30K
2222

23-
#@overlay/match by=overlay.subset({"kind":"Deployment"}),expects="3+"
23+
#@overlay/match by=overlay.subset({"kind":"Deployment"}), expects="3+"
2424
---
2525
spec:
2626
template:

package/config/private-ca/bootstrap.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,13 @@ metadata:
1818
namespace: #@ data.values.namespace
1919
spec:
2020
isCA: true
21-
commonName: kadras-root-ca
21+
commonName: Kadras CA
2222
secretName: kadras-root-ca
2323
duration: 8760h #! 365 days
24+
renewBefore: 360h #! 15 days
25+
subject:
26+
organizations:
27+
- Kadras
2428
privateKey:
2529
algorithm: Ed25519
2630
encoding: PKCS8

0 commit comments

Comments
 (0)