From 551bac8e890830194ff9d72a7dac21d7e3f2057b Mon Sep 17 00:00:00 2001 From: gar Date: Sat, 16 Nov 2019 07:59:50 -0800 Subject: [PATCH] cert-manager - updating to Helm v3 usage Signed-off-by: gar --- kubernetes/helm/cert-manager/Chart.yaml | 17 ------------- .../cert-manager-cluster-issuer/.gitignore | 0 .../cert-manager-cluster-issuer/Chart.yaml | 2 +- .../cert-manager-cluster-issuer/Makefile | 0 .../cert-manager-cluster-issuer/README.md | 13 ++++++---- .../environments/aws-dev/values.yaml | 0 .../environments/gcp-dev/values.yaml | 18 ++++++++------ .../aws-route53-credentials-secret.yaml | 0 .../templates/dns01.yaml | 6 ++--- .../templates/http01.yaml | 4 +-- .../cert-manager-cluster-issuer/values.yaml | 0 .../{ => cert-manager}/.gitignore | 0 .../helm/cert-manager/cert-manager/Chart.lock | 6 +++++ .../helm/cert-manager/cert-manager/Chart.yaml | 9 +++++++ .../cert-manager/{ => cert-manager}/Makefile | 4 +-- .../cert-manager/{ => cert-manager}/README.md | 0 .../charts/cert-manager-v0.11.0.tgz | Bin 0 -> 13203 bytes .../cert-manager/cert-manager/values.yaml | 5 ++++ .../charts/cert-manager-v0.8.0.tgz | Bin 11044 -> 0 bytes .../cert-manager/issuers/clouddns/dns01.yaml | 20 --------------- .../clouddns/service-account-secret.yaml | 8 ------ .../helm/cert-manager/issuers/http01.yaml | 16 ------------ .../aws-route53-credentials-secret.yaml | 9 ------- .../cert-manager/issuers/route53/dns01.yaml | 23 ------------------ .../helm/cert-manager/requirements.lock | 6 ----- .../helm/cert-manager/requirements.yaml | 5 ---- kubernetes/helm/cert-manager/values.yaml | 8 ------ 27 files changed, 47 insertions(+), 132 deletions(-) delete mode 100644 kubernetes/helm/cert-manager/Chart.yaml rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/.gitignore (100%) rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/Chart.yaml (63%) rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/Makefile (100%) rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/README.md (87%) rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/environments/aws-dev/values.yaml (100%) rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/environments/gcp-dev/values.yaml (50%) rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/templates/aws-route53-credentials-secret.yaml (100%) rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/templates/dns01.yaml (85%) rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/templates/http01.yaml (84%) rename kubernetes/helm/{ => cert-manager}/cert-manager-cluster-issuer/values.yaml (100%) rename kubernetes/helm/cert-manager/{ => cert-manager}/.gitignore (100%) create mode 100644 kubernetes/helm/cert-manager/cert-manager/Chart.lock create mode 100644 kubernetes/helm/cert-manager/cert-manager/Chart.yaml rename kubernetes/helm/cert-manager/{ => cert-manager}/Makefile (91%) rename kubernetes/helm/cert-manager/{ => cert-manager}/README.md (100%) create mode 100644 kubernetes/helm/cert-manager/cert-manager/charts/cert-manager-v0.11.0.tgz create mode 100644 kubernetes/helm/cert-manager/cert-manager/values.yaml delete mode 100644 kubernetes/helm/cert-manager/charts/cert-manager-v0.8.0.tgz delete mode 100644 kubernetes/helm/cert-manager/issuers/clouddns/dns01.yaml delete mode 100644 kubernetes/helm/cert-manager/issuers/clouddns/service-account-secret.yaml delete mode 100644 kubernetes/helm/cert-manager/issuers/http01.yaml delete mode 100644 kubernetes/helm/cert-manager/issuers/route53/aws-route53-credentials-secret.yaml delete mode 100644 kubernetes/helm/cert-manager/issuers/route53/dns01.yaml delete mode 100644 kubernetes/helm/cert-manager/requirements.lock delete mode 100644 kubernetes/helm/cert-manager/requirements.yaml delete mode 100644 kubernetes/helm/cert-manager/values.yaml diff --git a/kubernetes/helm/cert-manager/Chart.yaml b/kubernetes/helm/cert-manager/Chart.yaml deleted file mode 100644 index ad475717e..000000000 --- a/kubernetes/helm/cert-manager/Chart.yaml +++ /dev/null @@ -1,17 +0,0 @@ -name: cert-manager -# The version and appVersion fields are set automatically by the release tool -version: v0.8.0 -appVersion: v0.8.0 -description: A Helm chart for cert-manager -home: https://github.com/jetstack/cert-manager -icon: https://raw.githubusercontent.com/jetstack/cert-manager/master/logo/logo.png -keywords: - - cert-manager - - kube-lego - - letsencrypt - - tls -sources: - - https://github.com/jetstack/cert-manager -maintainers: - - name: munnerz - email: james@jetstack.io diff --git a/kubernetes/helm/cert-manager-cluster-issuer/.gitignore b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/.gitignore similarity index 100% rename from kubernetes/helm/cert-manager-cluster-issuer/.gitignore rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/.gitignore diff --git a/kubernetes/helm/cert-manager-cluster-issuer/Chart.yaml b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/Chart.yaml similarity index 63% rename from kubernetes/helm/cert-manager-cluster-issuer/Chart.yaml rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/Chart.yaml index 632635822..737344847 100644 --- a/kubernetes/helm/cert-manager-cluster-issuer/Chart.yaml +++ b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/Chart.yaml @@ -1,5 +1,5 @@ +apiVersion: v2 name: cert-manager-cluster-issuer -# The version and appVersion fields are set automatically by the release tool version: v0.1.0 appVersion: v0.1.0 description: A Helm chart to create the cert-manager cluster issuers diff --git a/kubernetes/helm/cert-manager-cluster-issuer/Makefile b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/Makefile similarity index 100% rename from kubernetes/helm/cert-manager-cluster-issuer/Makefile rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/Makefile diff --git a/kubernetes/helm/cert-manager-cluster-issuer/README.md b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/README.md similarity index 87% rename from kubernetes/helm/cert-manager-cluster-issuer/README.md rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/README.md index b766c3568..392eac541 100644 --- a/kubernetes/helm/cert-manager-cluster-issuer/README.md +++ b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/README.md @@ -47,19 +47,22 @@ Creating keys: https://docs.cert-manager.io/en/latest/tasks/issuers/setup-acme/d Adding a request for a certificate via a dns01 verification +doc: https://docs.cert-manager.io/en/release-0.11/tutorials/acme/dns-validation.html + ``` --- -apiVersion: certmanager.k8s.io/v1alpha1 +apiVersion: cert-manager.io/v1alpha2 kind: Certificate metadata: name: test1-dev-k8s-managedkube-com-tls namespace: default spec: + secretName: test1-dev-k8s-managedkube-com-tls + issuerRef: + # kind: ClusterIssuer + name: issuer-dns01 dnsNames: - test1.dev.k8s.managedkube.com - test2.dev.k8s.managedkube.com - issuerRef: - kind: ClusterIssuer - name: issuer-dns01 - secretName: test1-dev-k8s-managedkube-com-tls + ``` diff --git a/kubernetes/helm/cert-manager-cluster-issuer/environments/aws-dev/values.yaml b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/environments/aws-dev/values.yaml similarity index 100% rename from kubernetes/helm/cert-manager-cluster-issuer/environments/aws-dev/values.yaml rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/environments/aws-dev/values.yaml diff --git a/kubernetes/helm/cert-manager-cluster-issuer/environments/gcp-dev/values.yaml b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/environments/gcp-dev/values.yaml similarity index 50% rename from kubernetes/helm/cert-manager-cluster-issuer/environments/gcp-dev/values.yaml rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/environments/gcp-dev/values.yaml index c8faf626e..786d0d30e 100644 --- a/kubernetes/helm/cert-manager-cluster-issuer/environments/gcp-dev/values.yaml +++ b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/environments/gcp-dev/values.yaml @@ -8,13 +8,17 @@ clouddns: # This is the secret used to access the service account # The file name has to be "credentials.json". The file name is put into the secret # as the key name and the chart is looking for the key name "credentials.json" - # kubectl -n cert-manager create secret generic gcp-credentials-json --from-file=/credentials.json + # kubectl -n cert-manager create secret generic clouddns-dns01-solver-svc-acct --from-file=credentials.json + # Doc: https://docs.cert-manager.io/en/latest/tasks/issuers/setup-acme/dns01/google.html#create-a-service-account-secret serviceAccountSecretRef: - name: "gcp-credentials-json" + name: "clouddns-dns01-solver-svc-acct" key: credentials.json -# AWS Route53 -# aws: -# region: us-east-1 -# accessKeyID: xxx -# secretKey: xxx +issuer: + dns: + enabled: true + name: issuer-dns01 + + http: + enabled: true + name: issuer-http01 diff --git a/kubernetes/helm/cert-manager-cluster-issuer/templates/aws-route53-credentials-secret.yaml b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/templates/aws-route53-credentials-secret.yaml similarity index 100% rename from kubernetes/helm/cert-manager-cluster-issuer/templates/aws-route53-credentials-secret.yaml rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/templates/aws-route53-credentials-secret.yaml diff --git a/kubernetes/helm/cert-manager-cluster-issuer/templates/dns01.yaml b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/templates/dns01.yaml similarity index 85% rename from kubernetes/helm/cert-manager-cluster-issuer/templates/dns01.yaml rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/templates/dns01.yaml index ca83eb3f3..fdd53ee14 100644 --- a/kubernetes/helm/cert-manager-cluster-issuer/templates/dns01.yaml +++ b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/templates/dns01.yaml @@ -1,7 +1,7 @@ {{- if .Values.issuer.dns.enabled }} # doc: http://docs.cert-manager.io/en/latest/reference/issuers/acme/dns01.html --- -apiVersion: certmanager.k8s.io/v1alpha1 +apiVersion: cert-manager.io/v1alpha2 kind: ClusterIssuer metadata: name: {{ .Values.issuer.dns.name }} @@ -10,7 +10,7 @@ spec: email: {{ .Values.email }} server: {{ .Values.letsencrypt.server }} privateKeySecretRef: - name: letsencrypt-private-key + name: letsencrypt-private-key-dns-01 solvers: - dns01: @@ -27,7 +27,7 @@ spec: {{- end }} {{ if eq .Values.provider "google" }} - # Google Provider + # Google Provider - https://docs.cert-manager.io/en/release-0.11/tasks/issuers/setup-acme/dns01/google.html clouddns: # The ID of the GCP project project: {{ .Values.clouddns.project }} diff --git a/kubernetes/helm/cert-manager-cluster-issuer/templates/http01.yaml b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/templates/http01.yaml similarity index 84% rename from kubernetes/helm/cert-manager-cluster-issuer/templates/http01.yaml rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/templates/http01.yaml index 894d6400a..085b29481 100644 --- a/kubernetes/helm/cert-manager-cluster-issuer/templates/http01.yaml +++ b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/templates/http01.yaml @@ -1,6 +1,6 @@ {{- if .Values.issuer.http.enabled }} --- -apiVersion: certmanager.k8s.io/v1alpha1 +apiVersion: cert-manager.io/v1alpha2 kind: ClusterIssuer metadata: name: issuer-http01 @@ -12,7 +12,7 @@ spec: email: {{ .Values.email }} # Name of a secret used to store the ACME account private key from step 3 privateKeySecretRef: - name: letsencrypt-private-key + name: letsencrypt-private-key-http-01 # Enable the HTTP-01 challenge provider http01: {} diff --git a/kubernetes/helm/cert-manager-cluster-issuer/values.yaml b/kubernetes/helm/cert-manager/cert-manager-cluster-issuer/values.yaml similarity index 100% rename from kubernetes/helm/cert-manager-cluster-issuer/values.yaml rename to kubernetes/helm/cert-manager/cert-manager-cluster-issuer/values.yaml diff --git a/kubernetes/helm/cert-manager/.gitignore b/kubernetes/helm/cert-manager/cert-manager/.gitignore similarity index 100% rename from kubernetes/helm/cert-manager/.gitignore rename to kubernetes/helm/cert-manager/cert-manager/.gitignore diff --git a/kubernetes/helm/cert-manager/cert-manager/Chart.lock b/kubernetes/helm/cert-manager/cert-manager/Chart.lock new file mode 100644 index 000000000..da73874f5 --- /dev/null +++ b/kubernetes/helm/cert-manager/cert-manager/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: cert-manager + repository: https://charts.jetstack.io + version: v0.11.0 +digest: sha256:51683512f39cf91681ecfb04428c086da8cdaf29f27d39e82c13052464a69beb +generated: "2019-11-16T07:44:27.913185996-08:00" diff --git a/kubernetes/helm/cert-manager/cert-manager/Chart.yaml b/kubernetes/helm/cert-manager/cert-manager/Chart.yaml new file mode 100644 index 000000000..9a8e755a2 --- /dev/null +++ b/kubernetes/helm/cert-manager/cert-manager/Chart.yaml @@ -0,0 +1,9 @@ +apiVersion: v2 +name: cert-manager +version: v0.11.0 +appVersion: v0.11.0 +description: A Helm chart for cert-manager +dependencies: +- name: cert-manager + version: v0.11.0 + repository: https://charts.jetstack.io diff --git a/kubernetes/helm/cert-manager/Makefile b/kubernetes/helm/cert-manager/cert-manager/Makefile similarity index 91% rename from kubernetes/helm/cert-manager/Makefile rename to kubernetes/helm/cert-manager/cert-manager/Makefile index 13de7a7fb..bf8e6c479 100644 --- a/kubernetes/helm/cert-manager/Makefile +++ b/kubernetes/helm/cert-manager/cert-manager/Makefile @@ -7,7 +7,7 @@ BASE_PATH=. APPLCATION_CHART_NAME=./ # APPLCATION_CHART_NAME=jetstack/cert-manager APPLICATION_NAME=cert-manager -VERSION=0.8 +VERSION=0.11 VALUES_FILE?=values.yaml @@ -17,7 +17,7 @@ dependency: ${HELM_BINARY} dependency build apply-crd: - kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-${VERSION}/deploy/manifests/00-crds.yaml + kubectl apply --validate=false -f https://raw.githubusercontent.com/jetstack/cert-manager/release-${VERSION}/deploy/manifests/00-crds.yaml delete-crd: kubectl delete -f https://raw.githubusercontent.com/jetstack/cert-manager/release-${VERSION}/deploy/manifests/00-crds.yaml diff --git a/kubernetes/helm/cert-manager/README.md b/kubernetes/helm/cert-manager/cert-manager/README.md similarity index 100% rename from kubernetes/helm/cert-manager/README.md rename to kubernetes/helm/cert-manager/cert-manager/README.md diff --git a/kubernetes/helm/cert-manager/cert-manager/charts/cert-manager-v0.11.0.tgz b/kubernetes/helm/cert-manager/cert-manager/charts/cert-manager-v0.11.0.tgz new file mode 100644 index 0000000000000000000000000000000000000000..3f88213ff058abe22c600085bdbe7707954ca544 GIT binary patch literal 13203 zcmajGWl$YK+bxQFa0~A4?(QDk-CcvTfdGME!QCB#hv4q68z;DHaG%5be)rb-s_u_F zKc=Rt<>{`eM|!Q*q|pf25dV1qdI&}{IdwJ*Ib|LtUw&?LPHi?z4Q@Mq4SpU~ZEYT9 z9Y=dJXG>qrFD}AzR*p^(XPy2YYb|$d>)lWED*IovTQI1f+Nv@F4-Z!_3`CWQRL?e? zXjN$<fU4pHbsff-tFqV>p-3@&ECI3S7q;}ms_q^v`3=$j0Ea^ zu;!o>7ek#^k4-rVw^uCd>=|2x#x6npmcZfRbqgxolYRDAEO>Gsce|c+jyjzf&JuEx zKF!EOlx-_5m2?pQg2aLC*OvfkHO#2)ik zQWVq&G=<0R%}rtZe*pg+ZuSnl0u-d*H6z`HfPt$pH4y?l48R|B(!MEqy*Lq{obiETr{R2}(escLs8KHPqWD=5w47 z6Y?Aav=zE~M2JPaSwf#8)$extI5L&cU@0sz@=Vj35H_KysA#DmTr)kK0^vNr4qEi? zec^Z+3l4ewi=l-}h03BxF;$5(2G@=BgwL2Q<5yv>y$8aun~+9pR+un4ZF-VEfOyw| ziv`g?`p?niF<*M>nIMcL`32xAe~CSm?Utjs;KWKp4#cR*3=nld{FAWR_l%@xQ9>M8 zNHbDV%o&luYpaZd?vWWu+C|!8kAWcxHAPI-8d~V?Gp0Z`nhW;v$oVAeKKJ_jywXWW zxBQ1qdMsUDamTx;{Th;khIY)SH`O~P z_rzx1@?ddYb|Z?|4fZ(-qe;N;>v3x_mD?H(K*$Ty*ucBNN82XWsyZ89mX(;MZ`>>& zM1~-5>sDBXK`Y4Xeqxv4l!D@Ks6>*jhSCe$){UdHx*>n%758WrbI1tO&uNgE$R1m! zb0wRRLXD2!4W2UNf{zQI!4mU{h_7J?5{Zbk7fM^6sP`#ZO5HnOBXZY+xR66Hc2L8^ zwdH_8la8F+mrw}p`9;P@YNF;g$~K(fnvG*~b-ROPE@LA#l{s7&Pbsd}1BpDX#p#Dh zmAH}Tk!yM&cgEwm7~VbIyQHb;9b7b1gZPi44c&Q2788x4lnSaZhk1ivdHuSt@(=^3 z;eif=ODfcd4&eYUBY=OTVa|}romjQ`F2`;syy;3HuAe;%1C7)_SKo!8)BG%fz1J|2 zlYI~cJv|`UQ)Wve6Q;{CvSO9q>^F?36P(^o0YNk-y112SH7wcQ0Q8RlXhqccuzRGR za8i6qu3;G`j(r-AB(&oBU1eNCDKSJ4*wUJ0Q9g!dKP_f?_FkyoMrq_DDSL?nSn&m{ zlafQ7d*g{txdl;g6Sb><)5s_#&`nikR)+05YSD`cMOlntqgpD$;lH~`q!*Oo`_AuN zhvHcak4_mB@01kmZq#IKJ0mq@ai766c8|R`?y36fAgCUnR>fqM9BCPvqI~yE!0hNz(oENAzbHUsT*vJQ3&3P*erT(0Gjf&ZGzf z^|q*~jvA43A+Ss_&MJWBIWGB3PWM|cZ#UD^eQN-Otz;a4z0Vp z?%EJDRePmin0zt_aS8f(r{2M})5e0*?{Fr3uZ&rr@ms!i!FYHix{CKJp5z%DZuH<& zCa|Gktq5}NX&<8O$PslGooO#(X#iY1^e;z-GYH-dOPSSZ;80Dzh!v#@+iO@cJOOB( zx6?hBE)Q^b+^*EZu#N&kzLIL*F#t{uTS4L(sd3xH%vLaYm!{}`kJghJR2`;unNlgG zLvZElT~Y`tx900?IYDbMOpAcF7s22pP%!>^)px>O{1^THr;NI1InMfC714){3l9I8j#_|c-Wxd#X2e9Cu%^TBGc)PlCXr(2-&ZPMiTVeFY;Kdll*wU6n{}BH80vUI~blEQcQ_pJ{|RRH)!Y zS!4)lBUlng!IanNLvWEKMMnBQGue{qH8^+F2xHMLVbI_Fb!7VDOsAn;GA8X_QlX^C z&;W;xrA+vT-^VstDkzu`pD`+^H&+hl3p+S8^mCLGs%Sy*qukePo41RBI%4j>{HNTB zo1^t1av7;raxlA67~{PP6p7W_KH(9g!H&tb8tF`mzA;KY=iaxhvBbt$1 zhDFf6a($j$n~zA8?fvr^iGP%KrE)z*Z0iuy-eNOLn4HgiJABukK4SIS# zG<|Sw-T(sQG-rrPBl{6{={8xmqtvO2FGPXH-E3L0jM|bXjNI~A>|D9+o;l$s#uBLG zSZqh0z`9^6IL%dX0ZI&1?!RR`+=I?UBAs*f5e9TegEBrNmYFcABquP;gmGKkO#}xD z)!fT`qKI0x?2F~E$Pl$_>a?*WmVp#|o)T{yV;q4*!T93LR4H{=h)lMtiZU3<;;5>m zIZ}DI^}YkT0%4*%Y!1X|+zk7T3IyokCwQy<1MOAybTVQ70M9u~JnEP07nLn|HMaQQaISv&jIe$#Q!0Pz|`1MUSsd~S+* zsBeKSQ&-JG;QP1!Z>jI1vd^~_&Cr~fs5nt1Nf3&dPm*-s2eWp_&u)WWCKFn-KYo_F z;+Iud9)m3!6CDN-s=gU|HDtYf=nbLhxmZIdS9kJ)R?*{rn+(o*1yRK}it8;`)iw^DHDu(sma)$FE&55d^Kh$jtQAuU=`I9`Ob6;&vYVQ&zMjJk#YmZ>58rXmF`WA{;TUC$1Ig&kx{YOx`4Xepr@@T7#rB|-4IY|Ru-wM=G-$o zdaZ`eiO>0NA^q9wboxiCXR%MF*X(cC=oLecMJi5(lEe8j$EHrQ1U#xBPVE-ftl-M7 zWE~~MfZ^ApUogdPdQ3DyE^5hizDg?J0=i>&d`B^(?fG!U zB#=>JqO&i_9-rKHUIw`oyESR`#lo31uA(esRwyrJJhk=iJhjQ4JmII)KoiKxd}kV< zF04DGOTeob%39<>-R`Gr2%lTA1u1H_{dtR*Yt70J8pIYdLN|%?(OK(rW9ylKzM9x3bb!)NcYrXBjXHBZN)w)B@SKb1s)Aa)`J$W~}I6Sasx%B?m=tGF{%rf|rfij^%AeO2@2F4WclXynAd1y#zY%^R$CQz!LGcEdDNh-1WC%y*X=YC7ZtPdVV(OWPLLH>H_4Ny|G(SI+QI=DXQy| zh0Z+aq%dRQ;x}#!2eU{k?Cs)VqtlOMj&k=6-v67`+g6EDVgqLt;~R5M(#hepDb2B9 z7T)3MP{R{jZ6&u}1bHlY#rKETff_P*mVNPAM#!k6$NGZWiL{jT#zSF~YUW#s@PxLr zg#T(-S<>p2CqaW9WiGiRa_ZJOjqaF$?aRyC`^DG52X%?!ARQhU+)3Y!`w)ZAO`cM> z)R4{Q$GLdr?4ixJ<`z#-^LkvMryB9zF1D;5CQvM7p-Kk009?btl{B1dJkIAP-pjNU znrmsDge!h>5VNjr^6OdSh2lsTT&3ge>;%*O#`BxU0Hu6){isY=Eg$jq-k{8IxWwvC zqk@SSk>L+&eH1wF*(>QUA6@F1M6=*aL7T#fyAE8Vx>nM;cheLs&w#dtc1Rli>gmG2 zG`utyRZ(N2ZvOT*ArXH6*7A6Q^e)X=Wmc_)W?tfsJ||ROd;34!?iu_>!n2d2Hn(4A zOgMPCi8eVPst=N@D|EkU!}nPppX?fNquL{+VmmpSmaKvj+WxU>G45a6H-QVQbPUJ^ zn(kCAYwQQP!*wcJ&1u#QMXx2YdHNKiJ;9JE;7n==9Vd-Ws|)+s8_K_=p7SqEDR=b@ zk3*%4=4C7Ky0HDxutJtK1*1ILe|YWh&DIabCRN5Lg1xesk;$GhmW(Q4wKZ8yn5TCZ z8FR8yyq+c+GgOJl?aN`sY21~eTv-@8wwWcqAkoJChrP>yg(Of4Z zu`k{1@fu$eXCYkvAa+au!?UwNcEH2YRe2K-kh+lXl6D!jc2e_~geM~V(l(gbA1fpF z=V76g5T0Fa7N zaJw6^!IlcMN{#R%3Nz&i{jbZgJzujZHY?ibLr~>v6%&j{ie1D?BpOav_ofOTOR^?K z6j98@3E?&DnF$UcOLZ;JR~JU^dn>|hA7o7c(7JO*}K zL-Zv8?}xAB?|G>AU)OE`8+pPx5cAZn^*0P$x{}AV{kg2q=mC-ge??ptJ{>II*y7t9 z@~|N7&@<#z7n0?BFLzsdDnU_#d;h3*8cg_Eqqzy5i<*;L@eA=^F@{*kQ^`d}UuoOt z(wp@X_Q6e7!Ry!=`wif8a!^9%E<2-YqOs1S*{n;3kldJ~p5^7^(`V@y4xFK-^1^v- zhs5ETjOKOw};4%5P-iO;u+ zVN@Gu&V0+Y%8adl$U(%-(V3a8(t1}&jwX9zl+3%d@9H| zMz4lh$W`M|yq$lapV|3h5A6M056pRaUtDgr&bPM*xhy~n%|o+nU_y9?eW1*)P0+Cq zU3DFTDbB(lR9-Y~9Z3!57WFqIOVAu?DwrbWsVvEbg$b(yE>TuYqU!O}vKd1hO*vPI z4=ZtYKF3ww?YoXERUMVzo=UNKXfEumB<jLn|1jf<6~gbX|p|k zm%2ptVLA0I8r7^rVILz~_aaT>sZR2SvQM4sE!n7xWQZd;i07e3!bE@SDj4UMY^aXj zH;BQP-+@swoNi;!!^C*tdo`V^_So4&r& z`c;!~DDhSjvOYIhcYoJ@ikjQb&ya(r>gn+A&I*+8yJ$aSaZ=UGtFuN*M#`%=_-MQ( z*J@dt;~UuQ^^L(}`&II3F^Zq6A#}~oUETUBIA%#;bSuUGo}cVW^C!MlOJRU(MZS!; zuHJGnOAbyQ!lsqD{WZP`4V+P+>z7QPa@o%rKg)TMj>?+_@zJ_SiHM1bE{Nm0Wl64O zUtTPJcMJCU{1z1vz&|G;B04+2-&vE7pOxA&#*HRF1S;Tn<5vj1C7O*v&6|P3%Rr5Q zIMUCorgBJWEtbFY-{w-j&DG(HVjJoH?puJiy|ae`^`1i8G?y)VDI(|M&G1ZyIOr&(@~OLjlQWTY*DAq@9T3 zbBqf#Efh=rzI&JmmaKJS2GuXKf2}_M3cn~>^pIXQRlI5XwYS){pQSs=J-<+Mw3xr= z-BhR82(GzYwB3F9-FDt;zx36A>aATDY@ND#w@&i;-Ffjhx5jy!v$qdOma&~pXY+nF zXdNs1bFcULj!}aTxW;KWIe#>48xgaGv7BI<+!IF8)h5S%nRbVK|7Wf9ZC0piKwQJ0 z$@MhD6?dt%ls6y77ebQ)uT;Y4G+Mo|RmN#FL&wIr@LYC+S5f@Ze|#)tsZYR~Fw+Z2 zfQabNdtNSeitwa1Wpc8Rh?V73z6&AIi9=$d692I*wh6k&-r z?IdSP%~hQRJhpu|kKgIks)WT8-kU=aus0b} zSW87H8Z~DR!PXG39>UX&IO{SDV zi~3Z(g)>Ft3i|f+{^xReP!juD|a(WNW%I|3~y+=%ST+D`rj6F1`wpI${j z4Oz3uIsL(D(F7QWftB;iPpglj(}@aH?6Kd{8g3d6zMJ=5g_XCg#L_N)B&o@)Z!`|t z8g{z@8JnZOmrr6`-wI7e)+~7_U=MTpxt}F;5>IXZ_WXSat`xA`r*l%-5-I}7AEI`y~%0N zdwDi_$v8@t|G4xZUG#pHXfECKC&p6@#!pi+lrKH?fmcV`6v5U3sz@9@=H_0ds(wtC zq_-a*Y*b)$ySPQR6>J ze}6U;Og3S%@<=n^wYw|THN>df1rivJB8byM?sV{-q^QFFa%M8&n5#m3&k8U4gIi!F zaFjbTTFwLs;q_>4`D?DFQZ=zpjRi+9N}^viui;1lZqJQ~@L(1~EI%p%jO1lZBd&(U z*{sVm#eriGyIhPO*B(RyCEy!t^HIs4|F@DK(g||97}`2xfWW*MN{%8$eRz0K$dm2? zcP3t>!#sY^eI50u*s2+pQr6z}Ec1^(Ou=mSx#05T+C6v(EwJFx3#Iq{(Mb5(pOp5$qcgj%JZ+lR{sKPTKj^=7+sL1ufGTPe z_uGSACgz^>zAY3SVHxcdoS0WZ@Hl_sQ7ZmR%q7^6o=lM}EA+h?DV2vwUphj5^k1&c#N^*ZXTgptjH5?taDF zSR%ohVTs`C)Ax18kd)T5Ix--6<9n0)nhuhKgA#Ke_<@~5yw8;Z4S-G%n>G`3rQ)(q z!A|X9^ozU3(R(z#H;$Rf4V)Xc851_HHT$aJcxi_#PWk@*plH)xzYid#M%}}F@9tjO zWLyJo(bjH0_Q!YyfF-1yot#3XyT`S$r$A8Um(ZQOEmpOhDCP-3|yr59#oj z+7s<EdPF)CYk?$QA&VwwhXPf zj$hn>Btn#_6UV^D5=$Dz8qReTi<~elp4nj0U}lc1Gz>Kou4mp6@>3g~cq^hFSyCO- z36+iyZ2k&Pv3EsmUU>O4mEGVHBht;ZEO#CyXvL_Xx=Z?uK8- za`hg3;Mm~a`tZOx#9XDDtX%|TZ9p5#0Pt_$uAip2>N2VVQyJk%@h^t zDG$LS&5IqjcOhW04eKV+_#UwT<{U$e^tzb>6RAWoc4e_x9|k<2!C3*M{<5;?@0*Rq z%q<@zVyVii_;hC+m|sC|E6Em${n~jJ#$#z^?l6renE+m7P#i+tcV-}4DoLluH5ewt zEL?BVANy$vSIVal9l>}2C4N-+zRCA8&!p{&2kAhJQcIl&(R_l84C5>D!|lm#NIux zw=b`_$sR4PxJly+3IeB&y{eHInXY`I!n<*VoD6y;yO^X!xl_YOteX_XbX&k$9_!R! zBVj+{@vClgKyX=@Pv}1!D&`Lh8JiPhHN3w660pZmwB)gm#8Gwg;RX>j7*Aj`ADJs7 zY8Omp%pGd+zUmH>HWMd(W}GWvW98p*7ANm5X>;7*W4GY)nlQr+(0h?T_z}nrV7X`9 z&S=Sq&|ev`${?RaVvDnbF~udRJRepk9{EAwT0(r3}FBQnOa z)q6(Fg9HzuK3F@5IG;Y(dOCCbWQZDjd2=f+x;1nQnQ~PjY#0w}>tJlsK3%>sB*s2( zYO#i#d<2t;$P-vZ_LwW(F_A|R8pjKPsYP5vj*ElqeRNBfasOlz&z0(Cuwu&7oelG~z)%2{Pp=syNi}vcgRdw0@LZ35-tbV{E__%l6Rf129x z(DxHZmGk2-XvYKI?e^Pyr$ZgH2K2CGO*v@}6K+$KfnbTk83a|iWDI=5H)eV4Sqjq4b`A2hQBgWZ-j=z{zP-I{aSe-~4J8e`UsaF{#Zar`Y?CfU zI-x?G*~t*-I#Zw9}k9BTA~wwtyC4*^z&}K1Ew~InFE4?l0M2U5UmoEZF@gm z`PX>upWwox37ZZ;F|;U8)VQuV7V-IFsJOI2U-h`9Jovq6lv-<3&Wj<)Xe~4ID%1|* zsA!HMwj39S6K6Z7$5kF3XCL>mjL9&>DFvqkdT0_- z_Ilgg;Z$!6^W==T>-qsu?y{27sb+NH^r>kxbfD@B*sua3st8Ge{;@XwkY=AI+5U7H zK1?F?!-XWJ&FR)OYirDinus+aWksmLMr5tabU4UPjX>!lh$?W;q%v%hURNB3Bsnf- z&T)$Z_D$O$Hdbn@>debT&2B)%I5t#3gvNxhjCpw6wY<&ySwMtyX3w*eXoVr~C)!Tl ztIrK|kC^dxVIdp{`<@;i1iy|LsDzAuyA>YlL+)OEcK!=$q1Uu9!c5@Kj^CE4gW2p* zSjolQ=Zo+LiHeNMLw2wok`VcDoYJ@pvbztIGF5&?vetSKxyi*G)p8O>Y}vxy)P&nh+PX!&b?(G^O_J7CUc>Pz`7k`#Z*b4}lp<1jrVgkve= z6gHT8+YO3X9nvfN)e!rKm%Jd{Li`RkS0QbF-;Tx*SG4uD9&bmDLW4%96yBmUI816~ zV?E%RnUG#tUZohxmDLf+vouH|Q_}aT_n}ZpXAFJFkXS+i;RHTAud?*e-U!(!Qz|KKJX6D~iDk{|PWYzh!Xmsu27-OQ<9B;&lOJNu zeRj3u8g<9z!%Mqj$e^4OVGkL5im4wtZj4U=efh$Zw{Xh@_oGb<{~7D|(u#a@)-E*T zKG;thb9A=8aH6cxI#&$Fn-XS*aiEB-&W;dR8{gA#Q83&x$z)YQ*4L5$?x6ZFCM>A3Ma zw&^yEL9g@#kB`E zkMG@-VLv-|Av}U}m)-!w_o8*)p~Twp*(JP#XR$I^{1enrU8ATgzfpKmlKZ66%%4pJ2uHm_oPK)7U^%CCFtxv#|MfDcJ@lvCg0kv6S8?I8 zwk*zdwqkj2w4-Em$JmW~Xy_jNehyO=H={aQm6jLG08|UE#SoeZZ!5?6JJy55!4KW6;Y8s3i{$E<-* zEoZeh$DNAJof*Mdl0lh_vxi)^HEh4H-s}@3o8i*hJtk6t95IUE4J}k~GTMMS-^&7h zVF`uBxL&EGdh3$?^qJ+gw*UPaG| zn;yFJsG0Nr%d@Au=?ti10Zz@`-nwzXAOD5FfN$#Uv4#u0H5Cy95{nfXd;CAN0wP?O zAK&ZdHKs)T1gBO49nThi>q*;Bl~TbD@134#h@cSr?@Ak0ULJftL-?Td0{rZZ4kjF( zMZTHJ@AYoyKFjx2SqjlS%p8AZV3G60QdNge{vGE=p*IV{!j|haWM>8YEIoa8IAZAj z=`|APif@J{Zd$V4V>CK^v9h3-175821!cjIfyXmD;R2VcMMR2>@D_h@cR2|PNH@^D`m6P~ zf&%O}dP^tf4x{!EcFF{N$-~-?7oETK;`4VkjSHDUc&Yi^&6su^kUvhJxTB>H)eU|| zA1=29+MXl`Z#{c66b5P&4vh5AJQ=_XkP13@-6?96@d$hAPXWAWknLf>B`FE&*gNRC zof!b7-XioGIq1#q3i?!yU^zTJ=#|~#x&PCkei(=D6p;yDIw)B2wC(muU#g|RnoV90`w)yswvuq0O2YmvmmfRnEcjFe16&dPc)a>Ne*aI)3|;$b_4x0 z4F%58{rzi_FeS`*Ny?zNUR$)1*^7GvN@R2}w9HT`T)r-QcSI!m?(!iGfT% zzCB8Af=HxDAueGU)~tS`goykXoyXQ#xJBV+F0k!Gyoz`Q^CGFHQ?ySvPGVe2I@R+1 zw|}Slf0!~|cnfNUiFb&)6emkJriBy&#^|qL-2V?#7NqrmnKFWLwX-anbAe%@$6J;* z$qCUep){A$VhBd{&b{r=J`?f^V6*)?rl5W*RN9N$e0uF<^cvIlYKojJ6iq5@ohv|rIEp1jWl z@ERyz3Suz{)aGNM*SvR2_GMKHmDrzb5wN<&BVtawE+BkiRefTN3cO)-4(+0I{$e!Q z$_e2S-FyTuv4}%sE*_yJL+;{d6m8L9ZZP>~w^PlRH(ohu9(eUZGXQM+cz?(OP1dlN-7g9sMRXyA;(MkFk%m*AYWrc>o2 ze`HXo)_dK~bo+$En(nwt^Omf$Az$*LDEG?bt3l=2l8fplYKUF5(Ub7dL>&P-_SYc! zmgO&`V^>`L2wyq~SSK1p!$>Qs&mDWi3gnWB_OVz0hooC-S*z&%xel>apxf~CCujv!t(YNbzU%C@x!a^35D~Jy1Vj{9 zg<8BF-rtI`AEM!&-xn(kvQkTEo?ZA~S3ctKVfWj{_501ACBFrC09u2wm{Sc*Z$ zg&r~7Ivh^GTOqI~hbu1QD?RDB?2l=#6LLBfGx4*>sPPleCH-TZl~yiB+XHDbN2)Wv zCkh0jB5&u1SURJ*tp%UF??mT7qh?PzS+I%cRpB)ms?OR#ACZvZGNNH@OuTK%T4jD- zQh4+QsV#D<=}vB&WX#>EY?tqTuz(zeh_;;w`a_~@L4Clko!FkeO`4)m@t5-@b}<8N zwyxDjE($Bgl%!-FHshx;(Dggi^Tj0I{w z;{TDZ8k7hjp_;iod~(YU{nuizVtrMe>xk^6mDj~tz-o~ph$*QHHpin z=h6O_<9omlU}@uhTihRb(3=~(=?)=WF1a=t1WvcM z>Y6^1$ig$o>8<UtMw z|G!3kFHPA8KCSn#tO3=}pp7+Q`}2=tpy|JpqV)n^A1%EA0Z{w$z5PG2x#A93{qJ1w zZu0`SK-3OM>#h6ZKK_37Wpg@FAE=F&Jo}&JECLRvz@3329*Gz{N3mm{B}KQ&7bge-0r?pcN{Q?c(EN zhu=x9bJuQMkd^QqZy7epNl=g^!=P4osva_?w ZT3sl0p?~ZC&;1*q0FI3Yq74$_{{T{%7E=HK literal 0 HcmV?d00001 diff --git a/kubernetes/helm/cert-manager/cert-manager/values.yaml b/kubernetes/helm/cert-manager/cert-manager/values.yaml new file mode 100644 index 000000000..76f5ca1b1 --- /dev/null +++ b/kubernetes/helm/cert-manager/cert-manager/values.yaml @@ -0,0 +1,5 @@ +--- +cert-manager: + webhook: + enabled: false + diff --git a/kubernetes/helm/cert-manager/charts/cert-manager-v0.8.0.tgz b/kubernetes/helm/cert-manager/charts/cert-manager-v0.8.0.tgz deleted file mode 100644 index 7b9ab090f31f49df66e2d64e6418a17778f22ca6..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 11044 zcmZ{qWl)_#x1|ZeU4sTExNC4pAh^4`2De}bcXtV{2X}&NaCi6MPH@h7C*RzAr)sKZ zx_@{7Shc(B*=ud`Xe2zC|15w3hRNicD!bV?1z!0dpLtBVG}+D7cx-glKJzMRYVs;* z+1r{pnEy~$aTNY$VgDWG+z;Zi{;T2WIa_H~I!jN+S3&mHs;0uy&X06@^E{KLhM(&w zcT6$X1Sg5T6p0MRtxCov&*I;9~i0GW0^bs@u1p@6edI^RE4-EA5N(pkX z(dtt?r2B(5y~l!mXpn#3)MhwK6j5&c?MgS?MrMB`iVXGkfCW&))vjqRdLuaNkcTp7 z7|8m+L}Xz4ba7xOAB^3dG(94I(5C>}wMG@@!to3NXY%4k*fG@Jt@cia_{Td)y`>nv2}IQQ33Fq6;qsmQM(w$cH2Z zFmg}8vDa1p1TgF~%mO%4yYJ$Y70}@26ZG`&=gx;>;`RqRiCs@8^NDs)kClEyBJGU` z(YEvog)`INX%z1LVh1u<{SZcn9GH6f{zl8A=Zj|b%Vr3 z`mFt-7#m^CSe6JO&M)k%t`U{pD|a9EpbTM>HJW+UP{x@oA=#g~uP&m|b@ov+hGKqO zxDiHoxk^RYM098!9O(KC9w~Uoqr?UpIV4;z!Ehc#WVoy=Rb{81VyzyzA-kcMOIRY% zPvm!=9C1$}F@soA^at7>V3s4|;=mfb`NQ+h>S3O;BZXL|QuNfO2>uaXCUq{K2jK|P z;7o}}D9cI|EecxO!Ex_X>;E0~$8y${(*!w03yxFZL# z5aI^lC1K;OB%j_iCL=O_dm&wcbvKOmV337VC;SVo5nxJ>AE->sghKqG2kA(g6gaYs z>I(d}w-(r8W@C~0_Pik=TI)|Ig_`_Kg$XRChw7icXduGI{?Uiy$2dW&vFxqKN+Jt2 zPfbA=(s;W^qN-SxHEs>1Q|aHqg$$!ScnUsaHe@awJ<@6EL`e-6O!0SC?XzwDeGt9h86>{cB+1p80v`yW89iZ(iI8J0wIW!|Nn+Jbu%{f6|f)k~k8 zIYY!jStxiy8n>pPEA&KMf5rE|di@JS?!oFhj-id0Qv(X2r`X;2!gPM7x(PW0i7E8r z-90f+AkM78hE_-*o}-LgKWH~2lTJ}SIGMf>R;GW3I&IotN{fF%lm#{^sBeV5n`zl6 zB}7chWjPGFy)S@5u|{H#35S=YnDM@BqefbNEJ~gpPQ7ATjM_^HH*nW!I~eqBj(C>6 zIIoEl`(5|fd46@F5b9iZoY)+P#5Z3&ncRMTe2UqOQBejp1<+G1W^WzaJxB~znJ|b# z4Xp3Bd(nYuCCOreX5jMV)56Jqjo_y<`NyUoJ|}m6XK_7Rj?jb#C(MLd+NyMe_$Q_E zC~6*kN7}_8w-^46I=$!C9Fk|luy;5qV~~1N%xbKF(+DCAs~bY@OKq~~j}tH;5QjSp zV^j`F;q3CYd?Uc+oTOi2Pd((2L#6L}7K{wK%}$=@vns>I3*#r=$Fx1Gw)DDxC=?xW z$;qCSj9yWCvXwY-4-{#x*`>yT6!;kWWuj0`$T6A?QR*&$o}8es&##`qy;AQix(RoZ z3k%z>8~!wejLVzp$Ph~S;Qewm4juO|Q;CZxy+ZUEHrzh*3EoV2q5r8|!AvGb_SXU1pEElllKu$QD-;fQ1WWEgj}I`!SWVvUEYhnfk|S70;e6%$ z=tt+&JEPsVyqqa-Rc}MDJx%+)n6`sAQ9{!5)F~i5xX9lJx-G?M--0{1i?UC@y#Ax` z!4MoW1wG}jrOs!bA=$wvV~WkCQ$dGwlFl|)8NDykz?z{myc zcr2lB!-e|-Zg`ge2>zijGx;eJHepP@pCZ3|t~xO-O_5Q#80iM3^;5`$(}LOr4fC#P z*8L|_Vu2~8l++Hr6FHMWIF^rb3p$EX#zzafFtl-oBnAxgKRm_r?Z6|UDTZ=>GK!NW zDh&D}l=E^{kaxO^Cn_S`p{+J5S=0b1Z-+fCgmLe_HYj}r=n9T{6FqI+2DK!MfG#h3 zV}%sIVGC1HrcvDvgMWSi1%=nmzrHLcw*72e*Orx2X@6$-LAGQ>Cw$RKk!F*##BC6T-QH<)ur&@(VYX?ff#A}C`*h_F(g&t1V zvp!us{;9+wbMq8_ArmR9o<(Xim#6$g%3066;4WLQ6DbwBtnS*c{_B^Ief;&bHGX^zz@Jrlt(R_Ilaf6pN zvR{wQ6tor-MiqCXcX{XcE0F)MI@2G4fqf5PTULT&^juV#^loc%2L+YesbcWOot{X0mPT92)LKgxJ1n94hta9)I@(GDi`%ut8~kEAECN=pNYa;3TxB!oZ*y zVvp{*_>S#kAf82DM8?71w681Arc6&Saob4{9UuOS5;yuT>K7W6gSKaiTKTcB_tY2p zM3G;~I736lt3|44-!onCu6m+FSU-y0-xIJ?d)th^RcV;}v2(;%u;>_R9P(NnF|=eZ z>sk{X==ewdhNC;xhX7wU{EkTA?23hOh?Yx{$`SLh+aboy;KIxF3Oee`zO*JYmJ zb;|O-Qa^iCEr09Hbt5Q9rv{#SR0L0Vb#kN@2amIoFJtvX6{OMc}*EvCH_$L2eeC)UVYa5l0 zm$Tj{+X$ljW6v`wYf!sp-)x<1$+Vqv)Ef83pxCif_Ep~a`(wB3_Q^Zh>e_Mvx5xZm>CeT$quskyVy|5R>PQT@H#QW3*-aHcZ#VQ8}qBOQEGIK3%T4!55(t}t$d*gFn z+on@hOeU7%miKAxd8=|&T8;PcBDI~yurt4)r_R(|Y-5!eF45F>n`1xH7b~ihQJPB; zNGTS1LuFTl{>tkqr6k7PYk}=c?Z=HClmzoGx6m!M zD(nPL#ckA^&6M>9@qSk@?DtRugM9orhXq+|TdV)5!Fma=8=qfwD9k-Jt1%f^QnZdO22ESjYuEkMmRw=-X zGHCAk;+>4_)F$pHu=E#V-OnjRu%xE1Y<=nbSgF3zZEVDQnz_01%XVz zQ9^|3A2|A9fU~cD3m_!IZ+!u@CK2m>UxgLLJ)<=+i<2;L$x8oeX4_os`J6xP-#WGgvuB7?MlIkpLUGLKAF2E2Eau8^O^@KDk@3?S`*uy;zD|vRiWwL z7d-t#8WIve3_}Q?m#wS1Y*R(6ouP-lbo^-Iw_sj#s#z~B90r^N1j(4eLGQT2-V+I$ z)DIHWUjHPZYDFM{fxh$yd#doO?U2`BCf)9!%7h3H`?%k{hR$?*l(`9%V83~Lzk6r0 zaWnMg??O-eYn@TsuX9-}-j%T(EKw>9qHDAhOa8x+`C4dc$Q ztUf!Iq4rQoS@-YWS8`o?aTMLg9C^|7mY3aeybPNySfRWDm*kGqTSoSsu@-NlD{T9q zi;twu4|#er^l?O892D9NL#e1g-ke$kbSw8jAz%&8;v@s!vfCdbP3zvdlxLN?^@DG-z^*V|7eZLEdjhJZy zZD}L%p-JbGF+>G{9uXS02;c5ah*71LjrsfYWbsG+gK&H~sBQ7gqjpi^i!Xy6&H62K z_uV?2rs`mocfJ^3@;hLQ9XxGolrCcvd<#xwP-X@<3Qj4>5W>#ZHuY13>b@AnTpP?N zvNb3Nz*AAyx%b{3g&<4)U8p4&K3a%G>L`kFqUX-B4y@$u;PcCHLtOB>O^3v&3j`HD&BD2kSv z{FH6PDuTz<67KN=#ShQ<*u^O*Xd}h7*w8NVKuSFJEdCDdnJVRsbZQ4E-%k{5=Xxq8 zN?3n1BtFX6!ux6-(zes(zkRQhABfANV7)_HyfND-GLO_SEyeEU4|7^(tW0vgeRB(i z^Z<4&?};?%MELeLR>dg?=ri7R)9PR6rS9o=a3sGi6pAQoiJLW)*Pq#@cu1lF|4rTt_K@HzCDjdKwMx`K z9b%WlDw)2qvtht^i;hf?9(4$c97cmL`KTfOSfH%STIV*WEP{$ z+f4u!bd*%hS-%lcWL_%DMB9#=n_CRz+CO+2Q!~idcZOI#W2z3#oTw|}45)ciH`7x4 zFfR_5&1XpQFn_=Y{5%5-yN)cR=>1I%o?Bte@_B zS$m*0!KU^#eLoE6AFL(61vegu59>CBv?DU z#XnGvZ%JyrFVRW=V&->L?~_Y5_D!`4joJ z!ekaKR;SYwf3VRm%YWjBvU=+n1>d-&@K}2eFW0*Go-PP~b=K$+%}|p*yr#EPiHk>P ztj~clZ)@f5J?zM4B$*ex{9;}ed5o&>54DXd{Q%XepFlR25g+#!WwOhDUM85PUvR;w z6mZ2K5k>s15hQNrRDLR>Q#NjG>Tm&~Q>iO|u)~4(bST`5)L2)wRH(qa&KlxuR$5AD zIFehdeypvy2pF?{~>b{!IPR9Ojen&2_kOd`+0OtE%$ELzB-){rR^*bD5&yVuc!8eaE6*>DZQo$jl9Y6UDN{&0ic^ zVyoork4(&P9OD;r8rq%mm_(@-MMhsGD-;8|k`E*e zR4~7JE~;9grY_k)0QTq6v9%uXeM1epD;&LM_YS=>vw;u}9+Qqg_sFSg!UEki+}K%2%)rU$b`m|3^M}*|FQOtQxuWcm{vJ#2?*iKVhli*dG=E4L ze2AtGKBr%g-NEAYD7^pi`Mrsu2!d{x&4`|6?di&Rg;R+FcWraO`9n-~zg6>{Rim!S zwdX;L?eMt9^36{TTlbc6RIOnZ<8E0d)Tdfi=|p%Y4VGOAKR>>#lV4b?EOG9z?QRA? zvf76l$rry*4sV`MZ?iU*e@GHxy;#4Ln|4-|2-GRAid&!)!!P|t^!GU6gHZH~NlPyG zOrq&ClegM0Eza~lsqbhz^C2O>{$7mc8&+JQoWOf*eq9e@ddAk?ZRu6xb6PSu5w$7w zPO>h3lkb37r@maY-S2<(Zu~^pCR>c>LTXV{ay5t)&U~N)^R0K-f@933#6f2&*O;*E zW_4nj&Tm|OuG5Y>B~7JzP>)3203$syva z0C4^54^T~mJH@T{)Q}e*=a$w-E*W(sydlVCUWE-~<%;{8W)8|?^hf$JAVhL>|= zo4-2M`sT7LoEQF!FwI06=)EZQ`gep)DCML6C41fG&eng}1aYe03?jc~cc7PjYJp)F z6}iYd6O9M>h)^tvfbkwVsFBZb@P7y@trmDGph&9%3_(EoFQ^YhJR0cCaf`npzeNqX z5_}mrQ<)XvMa?w+O-NCQ^@@*$So}TF&5>Zzfkbo%xUJ$z55kon;M|pTXfU?n6PJGP%J-xRjY~9X%#N zUV(UTh*XvG{4Qcl;(^rSIANdZUM(>O_0 z1JbpiDZ^sU&uhtXe)TvuPXu~9j>Pu1m#J%(4p7slxxCD<{J=n%C;~SDB~QuA7mMcNd1uns zfq{QEe)8u1z)`I&${_QQq?giSKcrA>b^u|2X)Cl~|RZqFPTX zD2KCbQLz}^_t?8Xx6PV(ke8>;)h{^ApDnC^y2v1>lO+6GW>cHuI)(M{xP>JhZE*K} zNM9PW0E`-|rjx&+A*E~gJ7zl11jE1%w??UefM{h8jIES@-Xi;&v`v$uH|JW z6rLEfPa4~lOU7jh{nv$BBiJAxj;eHHXaVOt^UJae#1U}nu?GbCt*<~WN$tuyZgjmI zX%*p0bwS>X5{snu9|I<$T8qAW2-0ev#e9nh@5*JMGCb+bN84yWveru|8y%+ zqFG^>x;+wjMj{6f<&$f)A$_uVGr9*pZ*1G$_f!`z0cH09_!{_>1IpR}NVOh;e@`Yk z%ICGn9SYtdY04FyRQ(q>%{?C}LPe#eA-vFW&AFs|qwVLizDHnRoCpA(oNBxN`8e&O zK;GY<%L0J?#xq^c+S1)oq&Kt}^-at{wApW$pVT11IpjS$Pv(b4AKE)7&Nu<01E-Jm z-fa0Y!7-}N-kd!g#EyxMK?)9@(x-dzKfb#X@J}VuyJS+yT6kJ0kQL+ zr$aywFFqI0o>=w20GKP3F_Vetuh8DI&V6Q;q2C1>&@J)F68ow`Ot@6x0hxs}M_sgk0=aQ6)+$Xg^vWfEB2@&$iCs+s& zf6*RkB_m7|r(<(6=7DomQ%EOkOHh{JTAUv!4`*6({zvxdJkE1Z_np;yU>b7!465yE z-OdGCl6e0BpS3LQXW-8DR){V)FI=Z6$ZMyMHr@#ng-^r3TAW=x4|WM#;4==vdzg(4 z#!Dk2zLqRg9WZ`N6QrVqs`!cR2xGfUTNQq?vwiT0wMxZV_Bxy(I&LRRS6bPgbBhfd z#p_9Ao;X7&v22^^08doF`rdF{iOsykw1^ZvrllPNH#|Dq z7{*{I$V>eh>N(>NtjoF>ET2d`oX~Xj{tiT5YRi^(z~_z!|E9-x@-_{J4aK%lBrvxT ztO!rE4b3lr7YxpdPR)LYvM=L-#PRM+_D8XbBNrG%^j{ z5nHZPv41*SUMHqc1~qfIsmqnofsKL->eX$(*ccn(+f(j-nhL_GNE4hqCBxl&Tzyy^rUTe`wpT?j4KnJf|rS&{5^D^*=8OL-Z8W*nz z&`| z6HNvRwUoOROzf~H)lxH9`WIV`1@oHfiV z^vHdaIUI(bDBh;%a2qD zxp?PVX=&FWjJ`~7+6{38=2xiCM(s5)>wgAxrK;Bf`T^6r0zIr4?jWtmo5}HjBw!0P!b4g=C=6A4vh0*+v>?_IOXK`oO7L{{~}%{87C4t;d* z1JKfRj#x-PR+BB}bL)MoW{6LbwaBZF>Z-96@&kF??p9qNr{8Hk6!lZ`Olt^K!Ny=A z_?p1& zhcNgq;oG}W&T z+;t5!mU;Q{;^W7+aJA3MBtzcT1*nrV3eCq&=Jsh&jDg@XS{{e_zlDEDBnyM$z zo{-Temyhy8KVvR2#xveCr|sZ>clu4$WQtx_C`kSVTQ(vZpZWBBqYjq&K*0uu+&ht= znD(tFF}W89S{n&CcW&>A+S4_^fJlI%SYUPt$e;%Jg5Wykfyy1=@*WdY@3pqNc<8JL z0q6Q3U_qfO&#!>E573(9272mA4e(=uyGEc4uq$G1q3=~ff&WGP+htv>7n3Dt&21Ze z1O0dIAPE8(*V+R;t*y(B7ogT8-caCa^Xt2APl}OeNxx3*gy^Ba<~tMw!-%OXs=KKApy3_|CGFaT@o&nf5669}jMm2#C+3 z5Q{8jiU5ard|1g$_gU;$Jbz()&tvM3|2dd6`Vb&lNT^(>B<=K+$H;+C$097X-$KPV zxX2bF=$^`Q%T{Se?jXF-1#wa9kH<|W<>XPABuQY=u|p^ zVYW#d!4aJBWyQ5qi=f8{X{>HOR4r5+y(iaDOpMU8lLK4$zV@DKISQuw&mw>wCFs&nAo_oEiou7MY9j~q4403yTK-W+DYa_6;oV*~XF@lB@d_0xD}bxnS#dj{Ep=fHXodDv1CD3F`U~KnXEO`!!9I%bcn1BAUw;DhWG0tD z=tuDgFWWaezk+}@$E$zUcR39dMJ%rffb3_Ui%{}cz5Rt4rsHvfPFglaY+qGlDaxZ) zyJQE#J$9a{nwAM>iu+7g>TS(L){MDAf7v`PX&NN_`;ly%FtBem^bB;MeCvSge0awO z0?R6Z7(CDb<>TkK-3J_K@gbt8@+Pu}jECHs!bmxFT|^3%u_o)y81w ztjDbfSCn=9`L?y~Ct%qLYKH@Kxj@NDG1l(3HRnp-fbMj9ipR?bKC6WIlQBMqwgo%hSEIY+M6oX zJ>uz~pWhoS?_VOnu4mTFvS;q`C58Uj%wJ$8@a9YX;XdvCpl6UA>TRSI2)(rDYm$O{ zT(YXWC+f^wkO$&xM~N-PtpHJ7;2s6=-H&x#>t)OiUT8PEX3g|(2; z3Ii(z4w%Ok6v2+6cWtMTOSb;00}z2VW6aI-1Z=4dGJ45hunK+Vu3=QWO8wUm6MZ|^ zmWIE`0!pMZHjK-sf8nZxX{Cv1_si=TGf&iP0~^==A4s*H{eK}91^fRXRVRn#-Ty(V z%x48zGw?zLTKMV8GxD&FxxaU?i9Heref0mIsIXB6RvlXWZC%SFZW|^NDzlt?uL{iq zYu>&Pc*M?2vI-fJku$7vXv=sk+$v##eGvB*){g~>Wq2LMo9dg#eBOo}l~7aviDvZv z&Fo({3v%++UIHF5{+p`EHysFK@HyQ&45agjT^e`mT`)4}-ycPi>|n(w=A#iVYW5#S z`eVL(h(vir3=%N-jv<+85$0RVk0J**QpX=MT=&%;OEz%&SMU5S>A?tc&0>&?U%5Ns z_BkSz922PvU za)jLsEt?dY%z3~_2VvVEfA|eIB`nL7iHDY4a_7l;H@j=--PN0;~?jr_loGv4{^0=yKoSD40$`TnGS0{GAY!lK;GA+*Zdw9oTAx#$H5tt|vtaWxX> zrF#KVZRq5&9Fh&*$DJj6&G%9RBP+b&mOp<#EVOTd+u`%jU^ul6b6TC;n!MG6=j<|@ zN`+JzQ~ib*AKJ5S{z6tq!yEgHjHZlM<59vFgtSiTP}n7Cr4&RzFG=i%u2#gNTRku?Jvb&Q`$R{u;A3@-J?pmG#x1b)iF^;5bW|jJU%jR! zD)s9FYk;n;-`aw1+occM7roQJ-Y?r!5D@iFt!F<-Sb(_c5{l$MC S!2CB53m9&~vB8ABgZW=t0|x*A diff --git a/kubernetes/helm/cert-manager/issuers/clouddns/dns01.yaml b/kubernetes/helm/cert-manager/issuers/clouddns/dns01.yaml deleted file mode 100644 index 42954f22b..000000000 --- a/kubernetes/helm/cert-manager/issuers/clouddns/dns01.yaml +++ /dev/null @@ -1,20 +0,0 @@ -# doc: http://docs.cert-manager.io/en/latest/reference/issuers/acme/dns01.html ---- -apiVersion: certmanager.k8s.io/v1alpha1 -kind: ClusterIssuer -metadata: - name: issuer-dns01 -spec: - acme: - email: devops@expanse.com - server: https://acme-v02.api.letsencrypt.org/directory - privateKeySecretRef: - name: letsencrypt-private-key - dns01: - providers: - - name: prod - clouddns: - project: elasticsearch-204100 - serviceAccountSecretRef: - name: gcp-clouddns-service-account - key: service-account.json diff --git a/kubernetes/helm/cert-manager/issuers/clouddns/service-account-secret.yaml b/kubernetes/helm/cert-manager/issuers/clouddns/service-account-secret.yaml deleted file mode 100644 index cd49cfd75..000000000 --- a/kubernetes/helm/cert-manager/issuers/clouddns/service-account-secret.yaml +++ /dev/null @@ -1,8 +0,0 @@ ---- -apiVersion: v1 -kind: Secret -metadata: - name: gcp-clouddns-service-account -data: - # Base64 encoded GCP service account json file content - service-account.json: xxxxxx diff --git a/kubernetes/helm/cert-manager/issuers/http01.yaml b/kubernetes/helm/cert-manager/issuers/http01.yaml deleted file mode 100644 index 53a154499..000000000 --- a/kubernetes/helm/cert-manager/issuers/http01.yaml +++ /dev/null @@ -1,16 +0,0 @@ ---- -apiVersion: certmanager.k8s.io/v1alpha1 -kind: ClusterIssuer -metadata: - name: issuer-http01 -spec: - acme: - # The ACME server URL - server: https://acme-v02.api.letsencrypt.org/directory - # Email address used for ACME registration - email: devops@managedkube.com - # Name of a secret used to store the ACME account private key from step 3 - privateKeySecretRef: - name: letsencrypt-private-key - # Enable the HTTP-01 challenge provider - http01: {} diff --git a/kubernetes/helm/cert-manager/issuers/route53/aws-route53-credentials-secret.yaml b/kubernetes/helm/cert-manager/issuers/route53/aws-route53-credentials-secret.yaml deleted file mode 100644 index 16a7125df..000000000 --- a/kubernetes/helm/cert-manager/issuers/route53/aws-route53-credentials-secret.yaml +++ /dev/null @@ -1,9 +0,0 @@ ---- -apiVersion: v1 -kind: Secret -metadata: - name: aws-route53-credentials-secret -type: Opaque -data: - # Base64 encoded string of the aws private key - secret-access-key: bar diff --git a/kubernetes/helm/cert-manager/issuers/route53/dns01.yaml b/kubernetes/helm/cert-manager/issuers/route53/dns01.yaml deleted file mode 100644 index f9ea7f0a3..000000000 --- a/kubernetes/helm/cert-manager/issuers/route53/dns01.yaml +++ /dev/null @@ -1,23 +0,0 @@ -# doc: http://docs.cert-manager.io/en/latest/reference/issuers/acme/dns01.html ---- -apiVersion: certmanager.k8s.io/v1alpha1 -kind: ClusterIssuer -metadata: - name: issuer-dns01 -spec: - acme: - email: devops@managedkube.com - server: https://acme-v02.api.letsencrypt.org/directory - privateKeySecretRef: - name: letsencrypt-private-key - dns01: - providers: - - name: prod - route53: - region: us-east-1 - - # optional if ambient credentials are available; see ambient credentials documentation - accessKeyID: foo - secretAccessKeySecretRef: - name: aws-route53-credentials-secret - key: secret-access-key diff --git a/kubernetes/helm/cert-manager/requirements.lock b/kubernetes/helm/cert-manager/requirements.lock deleted file mode 100644 index 8aa071bf2..000000000 --- a/kubernetes/helm/cert-manager/requirements.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: cert-manager - repository: https://charts.jetstack.io - version: v0.8.0 -digest: sha256:029b7796f2f59dae9d1d5d0e2c8fd84f8ffb124daa20c9838ba53c772e8902f4 -generated: 2019-06-07T18:58:47.416259347-07:00 diff --git a/kubernetes/helm/cert-manager/requirements.yaml b/kubernetes/helm/cert-manager/requirements.yaml deleted file mode 100644 index ba34a07b7..000000000 --- a/kubernetes/helm/cert-manager/requirements.yaml +++ /dev/null @@ -1,5 +0,0 @@ ---- -dependencies: -- name: cert-manager - version: v0.8.0 - repository: https://charts.jetstack.io diff --git a/kubernetes/helm/cert-manager/values.yaml b/kubernetes/helm/cert-manager/values.yaml deleted file mode 100644 index 88a2c7ecd..000000000 --- a/kubernetes/helm/cert-manager/values.yaml +++ /dev/null @@ -1,8 +0,0 @@ ---- -# cert-manager: -# webhook: -# enabled: false - - -webhook: - enabled: false