browserstack-node-sdk 1.27.3 → 1.28.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (117) hide show
  1. package/ats/src/CFTemplates/aws-eks-cluster-dep.yaml +1 -1
  2. package/ats/src/cloudproviders/AWS.js +1 -0
  3. package/ats/src/cloudproviders/Azure.js +1 -0
  4. package/ats/src/cloudproviders/CloudProvider.js +1 -0
  5. package/ats/src/cloudproviders/GoogleCloudProvider.js +1 -0
  6. package/ats/src/cloudproviders/gcs.js +1 -0
  7. package/ats/src/cloudproviders/utils.js +1 -0
  8. package/ats/src/commands/configure.js +1 -1
  9. package/ats/src/commands/connect.js +1 -1
  10. package/ats/src/commands/connect_commands/grid.js +1 -1
  11. package/ats/src/commands/create.js +1 -1
  12. package/ats/src/commands/create_commands/grid.js +1 -1
  13. package/ats/src/commands/delete.js +1 -1
  14. package/ats/src/commands/delete_commands/grid.js +1 -1
  15. package/ats/src/commands/init.js +1 -1
  16. package/ats/src/commands/list.js +1 -1
  17. package/ats/src/commands/list_commands/grid_profiles.js +1 -1
  18. package/ats/src/commands/list_commands/grids.js +1 -1
  19. package/ats/src/config/constants.js +1 -1
  20. package/ats/src/config/logger.js +1 -1
  21. package/ats/src/index.js +1 -1
  22. package/ats/src/templates/azureresources/akscluster.json +134 -0
  23. package/ats/src/templates/azureresources/federatedidentityhub.json +50 -0
  24. package/ats/src/templates/azureresources/federatedidentitynode.json +50 -0
  25. package/ats/src/templates/azureresources/managedidentity.json +49 -0
  26. package/ats/src/templates/azureresources/storageaccount.json +92 -0
  27. package/ats/src/templates/cert-manager/cert-manager.yaml +1140 -0
  28. package/ats/src/templates/cert-manager/clusterissuer.yaml +21 -0
  29. package/ats/src/templates/cert-manager/crds.yaml +4468 -0
  30. package/ats/src/templates/default-service-account.yaml +5 -0
  31. package/ats/src/templates/gcpresources/KubeConfigTemplate.yaml +23 -0
  32. package/ats/src/templates/gcpresources/gkecluster.json +92 -0
  33. package/ats/src/templates/gcpresources/regionmap.json +198 -0
  34. package/ats/src/templates/hub-deployment.yaml +6 -0
  35. package/ats/src/templates/hub-service.yaml +1 -1
  36. package/ats/src/templates/ingress.yaml +20 -0
  37. package/ats/src/templates/nginx/helper.yaml +333 -0
  38. package/ats/src/templates/nginx/pods-and-services.yaml +315 -0
  39. package/ats/src/templates/nginx/private-pods-and-services.yaml +184 -0
  40. package/ats/src/utils/AWSUtils.js +1 -1
  41. package/ats/src/utils/createAutoscalerStack.js +1 -1
  42. package/ats/src/utils/createClusterStack.js +1 -1
  43. package/ats/src/utils/createk8sClient.js +1 -1
  44. package/ats/src/utils/deleteStack.js +1 -1
  45. package/ats/src/utils/gridComponents.js +1 -1
  46. package/ats/src/utils/hstUtils.js +1 -1
  47. package/ats/src/utils/instrumentationUtils.js +1 -1
  48. package/ats/src/utils/userInput.js +1 -1
  49. package/ats/src/utils/utilityMethods.js +1 -1
  50. package/ats/src/utils/webSocketUtils.js +1 -1
  51. package/package.json +1 -1
  52. package/src/bin/codeceptjs/BrowserStackPlugin.js +1 -1
  53. package/src/bin/codeceptjs/command.js +1 -1
  54. package/src/bin/cucumber-js/command.js +1 -1
  55. package/src/bin/cucumber-js/formatter/custom_formatter.js +1 -1
  56. package/src/bin/cucumber-js/formatter/custom_formatter_old_versions.js +1 -1
  57. package/src/bin/cucumber-js/test.setup.js +1 -1
  58. package/src/bin/cucumber-js/test_old.setup.js +1 -1
  59. package/src/bin/cucumber-js/timeout.setup.js +1 -1
  60. package/src/bin/jest/command.js +1 -1
  61. package/src/bin/jest/customEnvironment.js +1 -1
  62. package/src/bin/jest/customTestRunnerTemplate.js +1 -1
  63. package/src/bin/jest/jest.setup.js +1 -1
  64. package/src/bin/jest/test_before.setup.js +1 -1
  65. package/src/bin/launcher/launcher.js +1 -1
  66. package/src/bin/mocha/accessibility-automation/helper.js +1 -1
  67. package/src/bin/mocha/bstack-reporter/customReporter.js +1 -1
  68. package/src/bin/mocha/command.js +1 -1
  69. package/src/bin/mocha/test-observability/builderPatch.js +1 -1
  70. package/src/bin/mocha/test-observability/data-hooks.js +1 -1
  71. package/src/bin/mocha/test-observability/mochaUtils.js +1 -1
  72. package/src/bin/mocha/test.setup.js +1 -1
  73. package/src/bin/nightwatch/command.js +1 -1
  74. package/src/bin/playwright/accessibility-helper.js +1 -1
  75. package/src/bin/playwright/command.js +1 -1
  76. package/src/bin/playwright/globalSetup.js +1 -1
  77. package/src/bin/playwright/mock-process.js +1 -1
  78. package/src/bin/playwright/reporter/pwUtils.js +1 -1
  79. package/src/bin/playwright/reporter/reporter.js +1 -1
  80. package/src/bin/playwright/reporter/test-details.js +1 -1
  81. package/src/bin/runner.js +1 -1
  82. package/src/bin/setup.js +1 -1
  83. package/src/bin/test-runner/index.js +1 -1
  84. package/src/bin/test-runner/runTest.js +1 -1
  85. package/src/bin/test-runner/testWorker.js +1 -1
  86. package/src/bin/utils/constants.js +1 -1
  87. package/src/bin/utils/log4jsAppender.js +1 -1
  88. package/src/bin/utils/logPatcher.js +1 -1
  89. package/src/bin/utils/logReportingAPI.js +1 -1
  90. package/src/bin/vanilla-js/command.js +1 -1
  91. package/src/helpers/BrowserStackSetup.js +1 -1
  92. package/src/helpers/accessibility-automation/constants.js +1 -1
  93. package/src/helpers/accessibility-automation/helper.js +1 -1
  94. package/src/helpers/ats/constants.js +1 -0
  95. package/src/helpers/ats/helper.js +1 -0
  96. package/src/helpers/capsMapping.js +1 -1
  97. package/src/helpers/helper.js +1 -1
  98. package/src/helpers/logger.js +1 -1
  99. package/src/helpers/patchHelpers.js +1 -1
  100. package/src/helpers/percy/Percy.js +1 -0
  101. package/src/helpers/percy/PercyBinary.js +1 -0
  102. package/src/helpers/percy/PercyCaptureMap.js +1 -0
  103. package/src/helpers/percy/PercyCaptureModes.js +1 -0
  104. package/src/helpers/percy/PercySDK.js +1 -0
  105. package/src/helpers/percy/index.js +1 -0
  106. package/src/helpers/request-spy.js +1 -1
  107. package/src/helpers/setKeepAlive.js +1 -1
  108. package/src/helpers/test-observability/constants.js +1 -1
  109. package/src/helpers/test-observability/error-handler.js +1 -1
  110. package/src/helpers/test-observability/performance-tester.js +1 -1
  111. package/src/helpers/test-observability/requestQueueHandler.js +1 -1
  112. package/src/helpers/test-observability/sessionHandler.js +1 -1
  113. package/src/helpers/test-observability/utils.js +1 -1
  114. package/src/helpers/w3cMapping.js +1 -1
  115. package/src/hubAllocationMethods.js +1 -1
  116. package/src/index.js +1 -1
  117. package/ats/src/config/instanceTypes.json +0 -554
@@ -0,0 +1,1140 @@
1
+ apiVersion: v1
2
+ kind: Namespace
3
+ metadata:
4
+ name: cert-manager
5
+ ---
6
+ # Source: cert-manager/templates/cainjector-serviceaccount.yaml
7
+ apiVersion: v1
8
+ kind: ServiceAccount
9
+ automountServiceAccountToken: true
10
+ metadata:
11
+ name: cert-manager-cainjector
12
+ namespace: cert-manager
13
+ labels:
14
+ app: cainjector
15
+ app.kubernetes.io/name: cainjector
16
+ app.kubernetes.io/instance: cert-manager
17
+ app.kubernetes.io/component: "cainjector"
18
+ app.kubernetes.io/version: "v1.13.0"
19
+ ---
20
+ # Source: cert-manager/templates/serviceaccount.yaml
21
+ apiVersion: v1
22
+ kind: ServiceAccount
23
+ automountServiceAccountToken: true
24
+ metadata:
25
+ name: cert-manager
26
+ namespace: cert-manager
27
+ labels:
28
+ app: cert-manager
29
+ app.kubernetes.io/name: cert-manager
30
+ app.kubernetes.io/instance: cert-manager
31
+ app.kubernetes.io/component: "controller"
32
+ app.kubernetes.io/version: "v1.13.0"
33
+ ---
34
+ # Source: cert-manager/templates/webhook-serviceaccount.yaml
35
+ apiVersion: v1
36
+ kind: ServiceAccount
37
+ automountServiceAccountToken: true
38
+ metadata:
39
+ name: cert-manager-webhook
40
+ namespace: cert-manager
41
+ labels:
42
+ app: webhook
43
+ app.kubernetes.io/name: webhook
44
+ app.kubernetes.io/instance: cert-manager
45
+ app.kubernetes.io/component: "webhook"
46
+ app.kubernetes.io/version: "v1.13.0"
47
+ ---
48
+ # Source: cert-manager/templates/controller-config.yaml
49
+ apiVersion: v1
50
+ kind: ConfigMap
51
+ metadata:
52
+ name: cert-manager
53
+ namespace: cert-manager
54
+ labels:
55
+ app: cert-manager
56
+ app.kubernetes.io/name: cert-manager
57
+ app.kubernetes.io/instance: cert-manager
58
+ app.kubernetes.io/component: "controller"
59
+ app.kubernetes.io/version: "v1.13.0"
60
+ data:
61
+ ---
62
+ # Source: cert-manager/templates/webhook-config.yaml
63
+ apiVersion: v1
64
+ kind: ConfigMap
65
+ metadata:
66
+ name: cert-manager-webhook
67
+ namespace: cert-manager
68
+ labels:
69
+ app: webhook
70
+ app.kubernetes.io/name: webhook
71
+ app.kubernetes.io/instance: cert-manager
72
+ app.kubernetes.io/component: "webhook"
73
+ app.kubernetes.io/version: "v1.13.0"
74
+ data:
75
+ ---
76
+ # Source: cert-manager/templates/cainjector-rbac.yaml
77
+ apiVersion: rbac.authorization.k8s.io/v1
78
+ kind: ClusterRole
79
+ metadata:
80
+ name: cert-manager-cainjector
81
+ labels:
82
+ app: cainjector
83
+ app.kubernetes.io/name: cainjector
84
+ app.kubernetes.io/instance: cert-manager
85
+ app.kubernetes.io/component: "cainjector"
86
+ app.kubernetes.io/version: "v1.13.0"
87
+ rules:
88
+ - apiGroups: ["cert-manager.io"]
89
+ resources: ["certificates"]
90
+ verbs: ["get", "list", "watch"]
91
+ - apiGroups: [""]
92
+ resources: ["secrets"]
93
+ verbs: ["get", "list", "watch"]
94
+ - apiGroups: [""]
95
+ resources: ["events"]
96
+ verbs: ["get", "create", "update", "patch"]
97
+ - apiGroups: ["admissionregistration.k8s.io"]
98
+ resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"]
99
+ verbs: ["get", "list", "watch", "update", "patch"]
100
+ - apiGroups: ["apiregistration.k8s.io"]
101
+ resources: ["apiservices"]
102
+ verbs: ["get", "list", "watch", "update", "patch"]
103
+ - apiGroups: ["apiextensions.k8s.io"]
104
+ resources: ["customresourcedefinitions"]
105
+ verbs: ["get", "list", "watch", "update", "patch"]
106
+ ---
107
+ # Source: cert-manager/templates/rbac.yaml
108
+ # Issuer controller role
109
+ apiVersion: rbac.authorization.k8s.io/v1
110
+ kind: ClusterRole
111
+ metadata:
112
+ name: cert-manager-controller-issuers
113
+ labels:
114
+ app: cert-manager
115
+ app.kubernetes.io/name: cert-manager
116
+ app.kubernetes.io/instance: cert-manager
117
+ app.kubernetes.io/component: "controller"
118
+ app.kubernetes.io/version: "v1.13.0"
119
+ rules:
120
+ - apiGroups: ["cert-manager.io"]
121
+ resources: ["issuers", "issuers/status"]
122
+ verbs: ["update", "patch"]
123
+ - apiGroups: ["cert-manager.io"]
124
+ resources: ["issuers"]
125
+ verbs: ["get", "list", "watch"]
126
+ - apiGroups: [""]
127
+ resources: ["secrets"]
128
+ verbs: ["get", "list", "watch", "create", "update", "delete"]
129
+ - apiGroups: [""]
130
+ resources: ["events"]
131
+ verbs: ["create", "patch"]
132
+ ---
133
+ # Source: cert-manager/templates/rbac.yaml
134
+ # ClusterIssuer controller role
135
+ apiVersion: rbac.authorization.k8s.io/v1
136
+ kind: ClusterRole
137
+ metadata:
138
+ name: cert-manager-controller-clusterissuers
139
+ labels:
140
+ app: cert-manager
141
+ app.kubernetes.io/name: cert-manager
142
+ app.kubernetes.io/instance: cert-manager
143
+ app.kubernetes.io/component: "controller"
144
+ app.kubernetes.io/version: "v1.13.0"
145
+ rules:
146
+ - apiGroups: ["cert-manager.io"]
147
+ resources: ["clusterissuers", "clusterissuers/status"]
148
+ verbs: ["update", "patch"]
149
+ - apiGroups: ["cert-manager.io"]
150
+ resources: ["clusterissuers"]
151
+ verbs: ["get", "list", "watch"]
152
+ - apiGroups: [""]
153
+ resources: ["secrets"]
154
+ verbs: ["get", "list", "watch", "create", "update", "delete"]
155
+ - apiGroups: [""]
156
+ resources: ["events"]
157
+ verbs: ["create", "patch"]
158
+ ---
159
+ # Source: cert-manager/templates/rbac.yaml
160
+ # Certificates controller role
161
+ apiVersion: rbac.authorization.k8s.io/v1
162
+ kind: ClusterRole
163
+ metadata:
164
+ name: cert-manager-controller-certificates
165
+ labels:
166
+ app: cert-manager
167
+ app.kubernetes.io/name: cert-manager
168
+ app.kubernetes.io/instance: cert-manager
169
+ app.kubernetes.io/component: "controller"
170
+ app.kubernetes.io/version: "v1.13.0"
171
+ rules:
172
+ - apiGroups: ["cert-manager.io"]
173
+ resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
174
+ verbs: ["update", "patch"]
175
+ - apiGroups: ["cert-manager.io"]
176
+ resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"]
177
+ verbs: ["get", "list", "watch"]
178
+ # We require these rules to support users with the OwnerReferencesPermissionEnforcement
179
+ # admission controller enabled:
180
+ # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
181
+ - apiGroups: ["cert-manager.io"]
182
+ resources: ["certificates/finalizers", "certificaterequests/finalizers"]
183
+ verbs: ["update"]
184
+ - apiGroups: ["acme.cert-manager.io"]
185
+ resources: ["orders"]
186
+ verbs: ["create", "delete", "get", "list", "watch"]
187
+ - apiGroups: [""]
188
+ resources: ["secrets"]
189
+ verbs: ["get", "list", "watch", "create", "update", "delete", "patch"]
190
+ - apiGroups: [""]
191
+ resources: ["events"]
192
+ verbs: ["create", "patch"]
193
+ ---
194
+ # Source: cert-manager/templates/rbac.yaml
195
+ # Orders controller role
196
+ apiVersion: rbac.authorization.k8s.io/v1
197
+ kind: ClusterRole
198
+ metadata:
199
+ name: cert-manager-controller-orders
200
+ labels:
201
+ app: cert-manager
202
+ app.kubernetes.io/name: cert-manager
203
+ app.kubernetes.io/instance: cert-manager
204
+ app.kubernetes.io/component: "controller"
205
+ app.kubernetes.io/version: "v1.13.0"
206
+ rules:
207
+ - apiGroups: ["acme.cert-manager.io"]
208
+ resources: ["orders", "orders/status"]
209
+ verbs: ["update", "patch"]
210
+ - apiGroups: ["acme.cert-manager.io"]
211
+ resources: ["orders", "challenges"]
212
+ verbs: ["get", "list", "watch"]
213
+ - apiGroups: ["cert-manager.io"]
214
+ resources: ["clusterissuers", "issuers"]
215
+ verbs: ["get", "list", "watch"]
216
+ - apiGroups: ["acme.cert-manager.io"]
217
+ resources: ["challenges"]
218
+ verbs: ["create", "delete"]
219
+ # We require these rules to support users with the OwnerReferencesPermissionEnforcement
220
+ # admission controller enabled:
221
+ # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
222
+ - apiGroups: ["acme.cert-manager.io"]
223
+ resources: ["orders/finalizers"]
224
+ verbs: ["update"]
225
+ - apiGroups: [""]
226
+ resources: ["secrets"]
227
+ verbs: ["get", "list", "watch"]
228
+ - apiGroups: [""]
229
+ resources: ["events"]
230
+ verbs: ["create", "patch"]
231
+ ---
232
+ # Source: cert-manager/templates/rbac.yaml
233
+ # Challenges controller role
234
+ apiVersion: rbac.authorization.k8s.io/v1
235
+ kind: ClusterRole
236
+ metadata:
237
+ name: cert-manager-controller-challenges
238
+ labels:
239
+ app: cert-manager
240
+ app.kubernetes.io/name: cert-manager
241
+ app.kubernetes.io/instance: cert-manager
242
+ app.kubernetes.io/component: "controller"
243
+ app.kubernetes.io/version: "v1.13.0"
244
+ rules:
245
+ # Use to update challenge resource status
246
+ - apiGroups: ["acme.cert-manager.io"]
247
+ resources: ["challenges", "challenges/status"]
248
+ verbs: ["update", "patch"]
249
+ # Used to watch challenge resources
250
+ - apiGroups: ["acme.cert-manager.io"]
251
+ resources: ["challenges"]
252
+ verbs: ["get", "list", "watch"]
253
+ # Used to watch challenges, issuer and clusterissuer resources
254
+ - apiGroups: ["cert-manager.io"]
255
+ resources: ["issuers", "clusterissuers"]
256
+ verbs: ["get", "list", "watch"]
257
+ # Need to be able to retrieve ACME account private key to complete challenges
258
+ - apiGroups: [""]
259
+ resources: ["secrets"]
260
+ verbs: ["get", "list", "watch"]
261
+ # Used to create events
262
+ - apiGroups: [""]
263
+ resources: ["events"]
264
+ verbs: ["create", "patch"]
265
+ # HTTP01 rules
266
+ - apiGroups: [""]
267
+ resources: ["pods", "services"]
268
+ verbs: ["get", "list", "watch", "create", "delete"]
269
+ - apiGroups: ["networking.k8s.io"]
270
+ resources: ["ingresses"]
271
+ verbs: ["get", "list", "watch", "create", "delete", "update"]
272
+ - apiGroups: [ "gateway.networking.k8s.io" ]
273
+ resources: [ "httproutes" ]
274
+ verbs: ["get", "list", "watch", "create", "delete", "update"]
275
+ # We require the ability to specify a custom hostname when we are creating
276
+ # new ingress resources.
277
+ # See: https://github.com/openshift/origin/blob/21f191775636f9acadb44fa42beeb4f75b255532/pkg/route/apiserver/admission/ingress_admission.go#L84-L148
278
+ - apiGroups: ["route.openshift.io"]
279
+ resources: ["routes/custom-host"]
280
+ verbs: ["create"]
281
+ # We require these rules to support users with the OwnerReferencesPermissionEnforcement
282
+ # admission controller enabled:
283
+ # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
284
+ - apiGroups: ["acme.cert-manager.io"]
285
+ resources: ["challenges/finalizers"]
286
+ verbs: ["update"]
287
+ # DNS01 rules (duplicated above)
288
+ - apiGroups: [""]
289
+ resources: ["secrets"]
290
+ verbs: ["get", "list", "watch"]
291
+ ---
292
+ # Source: cert-manager/templates/rbac.yaml
293
+ # ingress-shim controller role
294
+ apiVersion: rbac.authorization.k8s.io/v1
295
+ kind: ClusterRole
296
+ metadata:
297
+ name: cert-manager-controller-ingress-shim
298
+ labels:
299
+ app: cert-manager
300
+ app.kubernetes.io/name: cert-manager
301
+ app.kubernetes.io/instance: cert-manager
302
+ app.kubernetes.io/component: "controller"
303
+ app.kubernetes.io/version: "v1.13.0"
304
+ rules:
305
+ - apiGroups: ["cert-manager.io"]
306
+ resources: ["certificates", "certificaterequests"]
307
+ verbs: ["create", "update", "delete"]
308
+ - apiGroups: ["cert-manager.io"]
309
+ resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"]
310
+ verbs: ["get", "list", "watch"]
311
+ - apiGroups: ["networking.k8s.io"]
312
+ resources: ["ingresses"]
313
+ verbs: ["get", "list", "watch"]
314
+ # We require these rules to support users with the OwnerReferencesPermissionEnforcement
315
+ # admission controller enabled:
316
+ # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
317
+ - apiGroups: ["networking.k8s.io"]
318
+ resources: ["ingresses/finalizers"]
319
+ verbs: ["update"]
320
+ - apiGroups: ["gateway.networking.k8s.io"]
321
+ resources: ["gateways", "httproutes"]
322
+ verbs: ["get", "list", "watch"]
323
+ - apiGroups: ["gateway.networking.k8s.io"]
324
+ resources: ["gateways/finalizers", "httproutes/finalizers"]
325
+ verbs: ["update"]
326
+ - apiGroups: [""]
327
+ resources: ["events"]
328
+ verbs: ["create", "patch"]
329
+ ---
330
+ # Source: cert-manager/templates/rbac.yaml
331
+ apiVersion: rbac.authorization.k8s.io/v1
332
+ kind: ClusterRole
333
+ metadata:
334
+ name: cert-manager-cluster-view
335
+ labels:
336
+ app: cert-manager
337
+ app.kubernetes.io/name: cert-manager
338
+ app.kubernetes.io/instance: cert-manager
339
+ app.kubernetes.io/component: "controller"
340
+ app.kubernetes.io/version: "v1.13.0"
341
+ rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true"
342
+ rules:
343
+ - apiGroups: ["cert-manager.io"]
344
+ resources: ["clusterissuers"]
345
+ verbs: ["get", "list", "watch"]
346
+ ---
347
+ # Source: cert-manager/templates/rbac.yaml
348
+ apiVersion: rbac.authorization.k8s.io/v1
349
+ kind: ClusterRole
350
+ metadata:
351
+ name: cert-manager-view
352
+ labels:
353
+ app: cert-manager
354
+ app.kubernetes.io/name: cert-manager
355
+ app.kubernetes.io/instance: cert-manager
356
+ app.kubernetes.io/component: "controller"
357
+ app.kubernetes.io/version: "v1.13.0"
358
+ rbac.authorization.k8s.io/aggregate-to-view: "true"
359
+ rbac.authorization.k8s.io/aggregate-to-edit: "true"
360
+ rbac.authorization.k8s.io/aggregate-to-admin: "true"
361
+ rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true"
362
+ rules:
363
+ - apiGroups: ["cert-manager.io"]
364
+ resources: ["certificates", "certificaterequests", "issuers"]
365
+ verbs: ["get", "list", "watch"]
366
+ - apiGroups: ["acme.cert-manager.io"]
367
+ resources: ["challenges", "orders"]
368
+ verbs: ["get", "list", "watch"]
369
+ ---
370
+ # Source: cert-manager/templates/rbac.yaml
371
+ apiVersion: rbac.authorization.k8s.io/v1
372
+ kind: ClusterRole
373
+ metadata:
374
+ name: cert-manager-edit
375
+ labels:
376
+ app: cert-manager
377
+ app.kubernetes.io/name: cert-manager
378
+ app.kubernetes.io/instance: cert-manager
379
+ app.kubernetes.io/component: "controller"
380
+ app.kubernetes.io/version: "v1.13.0"
381
+ rbac.authorization.k8s.io/aggregate-to-edit: "true"
382
+ rbac.authorization.k8s.io/aggregate-to-admin: "true"
383
+ rules:
384
+ - apiGroups: ["cert-manager.io"]
385
+ resources: ["certificates", "certificaterequests", "issuers"]
386
+ verbs: ["create", "delete", "deletecollection", "patch", "update"]
387
+ - apiGroups: ["cert-manager.io"]
388
+ resources: ["certificates/status"]
389
+ verbs: ["update"]
390
+ - apiGroups: ["acme.cert-manager.io"]
391
+ resources: ["challenges", "orders"]
392
+ verbs: ["create", "delete", "deletecollection", "patch", "update"]
393
+ ---
394
+ # Source: cert-manager/templates/rbac.yaml
395
+ # Permission to approve CertificateRequests referencing cert-manager.io Issuers and ClusterIssuers
396
+ apiVersion: rbac.authorization.k8s.io/v1
397
+ kind: ClusterRole
398
+ metadata:
399
+ name: cert-manager-controller-approve:cert-manager-io
400
+ labels:
401
+ app: cert-manager
402
+ app.kubernetes.io/name: cert-manager
403
+ app.kubernetes.io/instance: cert-manager
404
+ app.kubernetes.io/component: "cert-manager"
405
+ app.kubernetes.io/version: "v1.13.0"
406
+ rules:
407
+ - apiGroups: ["cert-manager.io"]
408
+ resources: ["signers"]
409
+ verbs: ["approve"]
410
+ resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
411
+ ---
412
+ # Source: cert-manager/templates/rbac.yaml
413
+ # Permission to:
414
+ # - Update and sign CertificatSigningeRequests referencing cert-manager.io Issuers and ClusterIssuers
415
+ # - Perform SubjectAccessReviews to test whether users are able to reference Namespaced Issuers
416
+ apiVersion: rbac.authorization.k8s.io/v1
417
+ kind: ClusterRole
418
+ metadata:
419
+ name: cert-manager-controller-certificatesigningrequests
420
+ labels:
421
+ app: cert-manager
422
+ app.kubernetes.io/name: cert-manager
423
+ app.kubernetes.io/instance: cert-manager
424
+ app.kubernetes.io/component: "cert-manager"
425
+ app.kubernetes.io/version: "v1.13.0"
426
+ rules:
427
+ - apiGroups: ["certificates.k8s.io"]
428
+ resources: ["certificatesigningrequests"]
429
+ verbs: ["get", "list", "watch", "update"]
430
+ - apiGroups: ["certificates.k8s.io"]
431
+ resources: ["certificatesigningrequests/status"]
432
+ verbs: ["update", "patch"]
433
+ - apiGroups: ["certificates.k8s.io"]
434
+ resources: ["signers"]
435
+ resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"]
436
+ verbs: ["sign"]
437
+ - apiGroups: ["authorization.k8s.io"]
438
+ resources: ["subjectaccessreviews"]
439
+ verbs: ["create"]
440
+ ---
441
+ # Source: cert-manager/templates/webhook-rbac.yaml
442
+ apiVersion: rbac.authorization.k8s.io/v1
443
+ kind: ClusterRole
444
+ metadata:
445
+ name: cert-manager-webhook:subjectaccessreviews
446
+ labels:
447
+ app: webhook
448
+ app.kubernetes.io/name: webhook
449
+ app.kubernetes.io/instance: cert-manager
450
+ app.kubernetes.io/component: "webhook"
451
+ app.kubernetes.io/version: "v1.13.0"
452
+ rules:
453
+ - apiGroups: ["authorization.k8s.io"]
454
+ resources: ["subjectaccessreviews"]
455
+ verbs: ["create"]
456
+ ---
457
+ # Source: cert-manager/templates/cainjector-rbac.yaml
458
+ apiVersion: rbac.authorization.k8s.io/v1
459
+ kind: ClusterRoleBinding
460
+ metadata:
461
+ name: cert-manager-cainjector
462
+ labels:
463
+ app: cainjector
464
+ app.kubernetes.io/name: cainjector
465
+ app.kubernetes.io/instance: cert-manager
466
+ app.kubernetes.io/component: "cainjector"
467
+ app.kubernetes.io/version: "v1.13.0"
468
+ roleRef:
469
+ apiGroup: rbac.authorization.k8s.io
470
+ kind: ClusterRole
471
+ name: cert-manager-cainjector
472
+ subjects:
473
+ - name: cert-manager-cainjector
474
+ namespace: cert-manager
475
+ kind: ServiceAccount
476
+ ---
477
+ # Source: cert-manager/templates/rbac.yaml
478
+ apiVersion: rbac.authorization.k8s.io/v1
479
+ kind: ClusterRoleBinding
480
+ metadata:
481
+ name: cert-manager-controller-issuers
482
+ labels:
483
+ app: cert-manager
484
+ app.kubernetes.io/name: cert-manager
485
+ app.kubernetes.io/instance: cert-manager
486
+ app.kubernetes.io/component: "controller"
487
+ app.kubernetes.io/version: "v1.13.0"
488
+ roleRef:
489
+ apiGroup: rbac.authorization.k8s.io
490
+ kind: ClusterRole
491
+ name: cert-manager-controller-issuers
492
+ subjects:
493
+ - name: cert-manager
494
+ namespace: cert-manager
495
+ kind: ServiceAccount
496
+ ---
497
+ # Source: cert-manager/templates/rbac.yaml
498
+ apiVersion: rbac.authorization.k8s.io/v1
499
+ kind: ClusterRoleBinding
500
+ metadata:
501
+ name: cert-manager-controller-clusterissuers
502
+ labels:
503
+ app: cert-manager
504
+ app.kubernetes.io/name: cert-manager
505
+ app.kubernetes.io/instance: cert-manager
506
+ app.kubernetes.io/component: "controller"
507
+ app.kubernetes.io/version: "v1.13.0"
508
+ roleRef:
509
+ apiGroup: rbac.authorization.k8s.io
510
+ kind: ClusterRole
511
+ name: cert-manager-controller-clusterissuers
512
+ subjects:
513
+ - name: cert-manager
514
+ namespace: cert-manager
515
+ kind: ServiceAccount
516
+ ---
517
+ # Source: cert-manager/templates/rbac.yaml
518
+ apiVersion: rbac.authorization.k8s.io/v1
519
+ kind: ClusterRoleBinding
520
+ metadata:
521
+ name: cert-manager-controller-certificates
522
+ labels:
523
+ app: cert-manager
524
+ app.kubernetes.io/name: cert-manager
525
+ app.kubernetes.io/instance: cert-manager
526
+ app.kubernetes.io/component: "controller"
527
+ app.kubernetes.io/version: "v1.13.0"
528
+ roleRef:
529
+ apiGroup: rbac.authorization.k8s.io
530
+ kind: ClusterRole
531
+ name: cert-manager-controller-certificates
532
+ subjects:
533
+ - name: cert-manager
534
+ namespace: cert-manager
535
+ kind: ServiceAccount
536
+ ---
537
+ # Source: cert-manager/templates/rbac.yaml
538
+ apiVersion: rbac.authorization.k8s.io/v1
539
+ kind: ClusterRoleBinding
540
+ metadata:
541
+ name: cert-manager-controller-orders
542
+ labels:
543
+ app: cert-manager
544
+ app.kubernetes.io/name: cert-manager
545
+ app.kubernetes.io/instance: cert-manager
546
+ app.kubernetes.io/component: "controller"
547
+ app.kubernetes.io/version: "v1.13.0"
548
+ roleRef:
549
+ apiGroup: rbac.authorization.k8s.io
550
+ kind: ClusterRole
551
+ name: cert-manager-controller-orders
552
+ subjects:
553
+ - name: cert-manager
554
+ namespace: cert-manager
555
+ kind: ServiceAccount
556
+ ---
557
+ # Source: cert-manager/templates/rbac.yaml
558
+ apiVersion: rbac.authorization.k8s.io/v1
559
+ kind: ClusterRoleBinding
560
+ metadata:
561
+ name: cert-manager-controller-challenges
562
+ labels:
563
+ app: cert-manager
564
+ app.kubernetes.io/name: cert-manager
565
+ app.kubernetes.io/instance: cert-manager
566
+ app.kubernetes.io/component: "controller"
567
+ app.kubernetes.io/version: "v1.13.0"
568
+ roleRef:
569
+ apiGroup: rbac.authorization.k8s.io
570
+ kind: ClusterRole
571
+ name: cert-manager-controller-challenges
572
+ subjects:
573
+ - name: cert-manager
574
+ namespace: cert-manager
575
+ kind: ServiceAccount
576
+ ---
577
+ # Source: cert-manager/templates/rbac.yaml
578
+ apiVersion: rbac.authorization.k8s.io/v1
579
+ kind: ClusterRoleBinding
580
+ metadata:
581
+ name: cert-manager-controller-ingress-shim
582
+ labels:
583
+ app: cert-manager
584
+ app.kubernetes.io/name: cert-manager
585
+ app.kubernetes.io/instance: cert-manager
586
+ app.kubernetes.io/component: "controller"
587
+ app.kubernetes.io/version: "v1.13.0"
588
+ roleRef:
589
+ apiGroup: rbac.authorization.k8s.io
590
+ kind: ClusterRole
591
+ name: cert-manager-controller-ingress-shim
592
+ subjects:
593
+ - name: cert-manager
594
+ namespace: cert-manager
595
+ kind: ServiceAccount
596
+ ---
597
+ # Source: cert-manager/templates/rbac.yaml
598
+ apiVersion: rbac.authorization.k8s.io/v1
599
+ kind: ClusterRoleBinding
600
+ metadata:
601
+ name: cert-manager-controller-approve:cert-manager-io
602
+ labels:
603
+ app: cert-manager
604
+ app.kubernetes.io/name: cert-manager
605
+ app.kubernetes.io/instance: cert-manager
606
+ app.kubernetes.io/component: "cert-manager"
607
+ app.kubernetes.io/version: "v1.13.0"
608
+ roleRef:
609
+ apiGroup: rbac.authorization.k8s.io
610
+ kind: ClusterRole
611
+ name: cert-manager-controller-approve:cert-manager-io
612
+ subjects:
613
+ - name: cert-manager
614
+ namespace: cert-manager
615
+ kind: ServiceAccount
616
+ ---
617
+ # Source: cert-manager/templates/rbac.yaml
618
+ apiVersion: rbac.authorization.k8s.io/v1
619
+ kind: ClusterRoleBinding
620
+ metadata:
621
+ name: cert-manager-controller-certificatesigningrequestss
622
+ labels:
623
+ app: cert-manager
624
+ app.kubernetes.io/name: cert-manager
625
+ app.kubernetes.io/instance: cert-manager
626
+ app.kubernetes.io/component: "cert-manager"
627
+ app.kubernetes.io/version: "v1.13.0"
628
+ roleRef:
629
+ apiGroup: rbac.authorization.k8s.io
630
+ kind: ClusterRole
631
+ name: cert-manager-controller-certificatesigningrequests
632
+ subjects:
633
+ - name: cert-manager
634
+ namespace: cert-manager
635
+ kind: ServiceAccount
636
+ ---
637
+ # Source: cert-manager/templates/webhook-rbac.yaml
638
+ apiVersion: rbac.authorization.k8s.io/v1
639
+ kind: ClusterRoleBinding
640
+ metadata:
641
+ name: cert-manager-webhook:subjectaccessreviews
642
+ labels:
643
+ app: webhook
644
+ app.kubernetes.io/name: webhook
645
+ app.kubernetes.io/instance: cert-manager
646
+ app.kubernetes.io/component: "webhook"
647
+ app.kubernetes.io/version: "v1.13.0"
648
+ roleRef:
649
+ apiGroup: rbac.authorization.k8s.io
650
+ kind: ClusterRole
651
+ name: cert-manager-webhook:subjectaccessreviews
652
+ subjects:
653
+ - apiGroup: ""
654
+ kind: ServiceAccount
655
+ name: cert-manager-webhook
656
+ namespace: cert-manager
657
+ ---
658
+ # Source: cert-manager/templates/cainjector-rbac.yaml
659
+ # leader election rules
660
+ apiVersion: rbac.authorization.k8s.io/v1
661
+ kind: Role
662
+ metadata:
663
+ name: cert-manager-cainjector:leaderelection
664
+ namespace: kube-system
665
+ labels:
666
+ app: cainjector
667
+ app.kubernetes.io/name: cainjector
668
+ app.kubernetes.io/instance: cert-manager
669
+ app.kubernetes.io/component: "cainjector"
670
+ app.kubernetes.io/version: "v1.13.0"
671
+ rules:
672
+ # Used for leader election by the controller
673
+ # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
674
+ # see cmd/cainjector/start.go#L113
675
+ # cert-manager-cainjector-leader-election-core is used by the SecretBased injector controller
676
+ # see cmd/cainjector/start.go#L137
677
+ - apiGroups: ["coordination.k8s.io"]
678
+ resources: ["leases"]
679
+ resourceNames: ["cert-manager-cainjector-leader-election", "cert-manager-cainjector-leader-election-core"]
680
+ verbs: ["get", "update", "patch"]
681
+ - apiGroups: ["coordination.k8s.io"]
682
+ resources: ["leases"]
683
+ verbs: ["create"]
684
+ ---
685
+ # Source: cert-manager/templates/rbac.yaml
686
+ apiVersion: rbac.authorization.k8s.io/v1
687
+ kind: Role
688
+ metadata:
689
+ name: cert-manager:leaderelection
690
+ namespace: kube-system
691
+ labels:
692
+ app: cert-manager
693
+ app.kubernetes.io/name: cert-manager
694
+ app.kubernetes.io/instance: cert-manager
695
+ app.kubernetes.io/component: "controller"
696
+ app.kubernetes.io/version: "v1.13.0"
697
+ rules:
698
+ - apiGroups: ["coordination.k8s.io"]
699
+ resources: ["leases"]
700
+ resourceNames: ["cert-manager-controller"]
701
+ verbs: ["get", "update", "patch"]
702
+ - apiGroups: ["coordination.k8s.io"]
703
+ resources: ["leases"]
704
+ verbs: ["create"]
705
+ ---
706
+ # Source: cert-manager/templates/webhook-rbac.yaml
707
+ apiVersion: rbac.authorization.k8s.io/v1
708
+ kind: Role
709
+ metadata:
710
+ name: cert-manager-webhook:dynamic-serving
711
+ namespace: cert-manager
712
+ labels:
713
+ app: webhook
714
+ app.kubernetes.io/name: webhook
715
+ app.kubernetes.io/instance: cert-manager
716
+ app.kubernetes.io/component: "webhook"
717
+ app.kubernetes.io/version: "v1.13.0"
718
+ rules:
719
+ - apiGroups: [""]
720
+ resources: ["secrets"]
721
+ resourceNames:
722
+ - 'cert-manager-webhook-ca'
723
+ verbs: ["get", "list", "watch", "update"]
724
+ # It's not possible to grant CREATE permission on a single resourceName.
725
+ - apiGroups: [""]
726
+ resources: ["secrets"]
727
+ verbs: ["create"]
728
+ ---
729
+ # Source: cert-manager/templates/cainjector-rbac.yaml
730
+ # grant cert-manager permission to manage the leaderelection configmap in the
731
+ # leader election namespace
732
+ apiVersion: rbac.authorization.k8s.io/v1
733
+ kind: RoleBinding
734
+ metadata:
735
+ name: cert-manager-cainjector:leaderelection
736
+ namespace: kube-system
737
+ labels:
738
+ app: cainjector
739
+ app.kubernetes.io/name: cainjector
740
+ app.kubernetes.io/instance: cert-manager
741
+ app.kubernetes.io/component: "cainjector"
742
+ app.kubernetes.io/version: "v1.13.0"
743
+ roleRef:
744
+ apiGroup: rbac.authorization.k8s.io
745
+ kind: Role
746
+ name: cert-manager-cainjector:leaderelection
747
+ subjects:
748
+ - kind: ServiceAccount
749
+ name: cert-manager-cainjector
750
+ namespace: cert-manager
751
+ ---
752
+ # Source: cert-manager/templates/rbac.yaml
753
+ # grant cert-manager permission to manage the leaderelection configmap in the
754
+ # leader election namespace
755
+ apiVersion: rbac.authorization.k8s.io/v1
756
+ kind: RoleBinding
757
+ metadata:
758
+ name: cert-manager:leaderelection
759
+ namespace: kube-system
760
+ labels:
761
+ app: cert-manager
762
+ app.kubernetes.io/name: cert-manager
763
+ app.kubernetes.io/instance: cert-manager
764
+ app.kubernetes.io/component: "controller"
765
+ app.kubernetes.io/version: "v1.13.0"
766
+ roleRef:
767
+ apiGroup: rbac.authorization.k8s.io
768
+ kind: Role
769
+ name: cert-manager:leaderelection
770
+ subjects:
771
+ - apiGroup: ""
772
+ kind: ServiceAccount
773
+ name: cert-manager
774
+ namespace: cert-manager
775
+ ---
776
+ # Source: cert-manager/templates/webhook-rbac.yaml
777
+ apiVersion: rbac.authorization.k8s.io/v1
778
+ kind: RoleBinding
779
+ metadata:
780
+ name: cert-manager-webhook:dynamic-serving
781
+ namespace: cert-manager
782
+ labels:
783
+ app: webhook
784
+ app.kubernetes.io/name: webhook
785
+ app.kubernetes.io/instance: cert-manager
786
+ app.kubernetes.io/component: "webhook"
787
+ app.kubernetes.io/version: "v1.13.0"
788
+ roleRef:
789
+ apiGroup: rbac.authorization.k8s.io
790
+ kind: Role
791
+ name: cert-manager-webhook:dynamic-serving
792
+ subjects:
793
+ - apiGroup: ""
794
+ kind: ServiceAccount
795
+ name: cert-manager-webhook
796
+ namespace: cert-manager
797
+ ---
798
+ # Source: cert-manager/templates/service.yaml
799
+ apiVersion: v1
800
+ kind: Service
801
+ metadata:
802
+ name: cert-manager
803
+ namespace: cert-manager
804
+ labels:
805
+ app: cert-manager
806
+ app.kubernetes.io/name: cert-manager
807
+ app.kubernetes.io/instance: cert-manager
808
+ app.kubernetes.io/component: "controller"
809
+ app.kubernetes.io/version: "v1.13.0"
810
+ spec:
811
+ type: NodePort
812
+ ports:
813
+ - protocol: TCP
814
+ port: 9402
815
+ name: tcp-prometheus-servicemonitor
816
+ targetPort: 9402
817
+ selector:
818
+ app.kubernetes.io/name: cert-manager
819
+ app.kubernetes.io/instance: cert-manager
820
+ app.kubernetes.io/component: "controller"
821
+ ---
822
+ # Source: cert-manager/templates/webhook-service.yaml
823
+ apiVersion: v1
824
+ kind: Service
825
+ metadata:
826
+ name: cert-manager-webhook
827
+ namespace: cert-manager
828
+ labels:
829
+ app: webhook
830
+ app.kubernetes.io/name: webhook
831
+ app.kubernetes.io/instance: cert-manager
832
+ app.kubernetes.io/component: "webhook"
833
+ app.kubernetes.io/version: "v1.13.0"
834
+ spec:
835
+ type: NodePort
836
+ ports:
837
+ - name: https
838
+ port: 443
839
+ protocol: TCP
840
+ targetPort: "https"
841
+ selector:
842
+ app.kubernetes.io/name: webhook
843
+ app.kubernetes.io/instance: cert-manager
844
+ app.kubernetes.io/component: "webhook"
845
+ ---
846
+ # Source: cert-manager/templates/cainjector-deployment.yaml
847
+ apiVersion: apps/v1
848
+ kind: Deployment
849
+ metadata:
850
+ name: cert-manager-cainjector
851
+ namespace: cert-manager
852
+ labels:
853
+ app: cainjector
854
+ app.kubernetes.io/name: cainjector
855
+ app.kubernetes.io/instance: cert-manager
856
+ app.kubernetes.io/component: "cainjector"
857
+ app.kubernetes.io/version: "v1.13.0"
858
+ spec:
859
+ replicas: 1
860
+ selector:
861
+ matchLabels:
862
+ app.kubernetes.io/name: cainjector
863
+ app.kubernetes.io/instance: cert-manager
864
+ app.kubernetes.io/component: "cainjector"
865
+ template:
866
+ metadata:
867
+ labels:
868
+ app: cainjector
869
+ app.kubernetes.io/name: cainjector
870
+ app.kubernetes.io/instance: cert-manager
871
+ app.kubernetes.io/component: "cainjector"
872
+ app.kubernetes.io/version: "v1.13.0"
873
+ spec:
874
+ serviceAccountName: cert-manager-cainjector
875
+ enableServiceLinks: false
876
+ securityContext:
877
+ runAsNonRoot: true
878
+ seccompProfile:
879
+ type: RuntimeDefault
880
+ containers:
881
+ - name: cert-manager-cainjector
882
+ image: "quay.io/jetstack/cert-manager-cainjector:v1.13.0"
883
+ imagePullPolicy: IfNotPresent
884
+ args:
885
+ - --v=2
886
+ - --leader-election-namespace=kube-system
887
+ env:
888
+ - name: POD_NAMESPACE
889
+ valueFrom:
890
+ fieldRef:
891
+ fieldPath: metadata.namespace
892
+ securityContext:
893
+ allowPrivilegeEscalation: false
894
+ capabilities:
895
+ drop:
896
+ - ALL
897
+ nodeSelector:
898
+ kubernetes.io/os: linux
899
+ ---
900
+ # Source: cert-manager/templates/deployment.yaml
901
+ apiVersion: apps/v1
902
+ kind: Deployment
903
+ metadata:
904
+ name: cert-manager
905
+ namespace: cert-manager
906
+ labels:
907
+ app: cert-manager
908
+ app.kubernetes.io/name: cert-manager
909
+ app.kubernetes.io/instance: cert-manager
910
+ app.kubernetes.io/component: "controller"
911
+ app.kubernetes.io/version: "v1.13.0"
912
+ spec:
913
+ replicas: 1
914
+ selector:
915
+ matchLabels:
916
+ app.kubernetes.io/name: cert-manager
917
+ app.kubernetes.io/instance: cert-manager
918
+ app.kubernetes.io/component: "controller"
919
+ template:
920
+ metadata:
921
+ labels:
922
+ app: cert-manager
923
+ app.kubernetes.io/name: cert-manager
924
+ app.kubernetes.io/instance: cert-manager
925
+ app.kubernetes.io/component: "controller"
926
+ app.kubernetes.io/version: "v1.13.0"
927
+ annotations:
928
+ prometheus.io/path: "/metrics"
929
+ prometheus.io/scrape: 'true'
930
+ prometheus.io/port: '9402'
931
+ spec:
932
+ serviceAccountName: cert-manager
933
+ enableServiceLinks: false
934
+ securityContext:
935
+ runAsNonRoot: true
936
+ seccompProfile:
937
+ type: RuntimeDefault
938
+ containers:
939
+ - name: cert-manager-controller
940
+ image: "quay.io/jetstack/cert-manager-controller:v1.13.0"
941
+ imagePullPolicy: IfNotPresent
942
+ args:
943
+ - --v=2
944
+ - --cluster-resource-namespace=$(POD_NAMESPACE)
945
+ - --leader-election-namespace=kube-system
946
+ - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.13.0
947
+ - --max-concurrent-challenges=60
948
+ ports:
949
+ - containerPort: 9402
950
+ name: http-metrics
951
+ protocol: TCP
952
+ - containerPort: 9403
953
+ name: http-healthz
954
+ protocol: TCP
955
+ securityContext:
956
+ allowPrivilegeEscalation: false
957
+ capabilities:
958
+ drop:
959
+ - ALL
960
+ env:
961
+ - name: POD_NAMESPACE
962
+ valueFrom:
963
+ fieldRef:
964
+ fieldPath: metadata.namespace
965
+ nodeSelector:
966
+ kubernetes.io/os: linux
967
+ ---
968
+ # Source: cert-manager/templates/webhook-deployment.yaml
969
+ apiVersion: apps/v1
970
+ kind: Deployment
971
+ metadata:
972
+ name: cert-manager-webhook
973
+ namespace: cert-manager
974
+ labels:
975
+ app: webhook
976
+ app.kubernetes.io/name: webhook
977
+ app.kubernetes.io/instance: cert-manager
978
+ app.kubernetes.io/component: "webhook"
979
+ app.kubernetes.io/version: "v1.13.0"
980
+ spec:
981
+ replicas: 1
982
+ selector:
983
+ matchLabels:
984
+ app.kubernetes.io/name: webhook
985
+ app.kubernetes.io/instance: cert-manager
986
+ app.kubernetes.io/component: "webhook"
987
+ template:
988
+ metadata:
989
+ labels:
990
+ app: webhook
991
+ app.kubernetes.io/name: webhook
992
+ app.kubernetes.io/instance: cert-manager
993
+ app.kubernetes.io/component: "webhook"
994
+ app.kubernetes.io/version: "v1.13.0"
995
+ spec:
996
+ serviceAccountName: cert-manager-webhook
997
+ enableServiceLinks: false
998
+ securityContext:
999
+ runAsNonRoot: true
1000
+ seccompProfile:
1001
+ type: RuntimeDefault
1002
+ containers:
1003
+ - name: cert-manager-webhook
1004
+ image: "quay.io/jetstack/cert-manager-webhook:v1.13.0"
1005
+ imagePullPolicy: IfNotPresent
1006
+ args:
1007
+ - --v=2
1008
+ - --secure-port=10250
1009
+ - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
1010
+ - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
1011
+ - --dynamic-serving-dns-names=cert-manager-webhook
1012
+ - --dynamic-serving-dns-names=cert-manager-webhook.$(POD_NAMESPACE)
1013
+ - --dynamic-serving-dns-names=cert-manager-webhook.$(POD_NAMESPACE).svc
1014
+
1015
+ ports:
1016
+ - name: https
1017
+ protocol: TCP
1018
+ containerPort: 10250
1019
+ - name: healthcheck
1020
+ protocol: TCP
1021
+ containerPort: 6080
1022
+ livenessProbe:
1023
+ httpGet:
1024
+ path: /livez
1025
+ port: 6080
1026
+ scheme: HTTP
1027
+ initialDelaySeconds: 60
1028
+ periodSeconds: 10
1029
+ timeoutSeconds: 1
1030
+ successThreshold: 1
1031
+ failureThreshold: 3
1032
+ readinessProbe:
1033
+ httpGet:
1034
+ path: /healthz
1035
+ port: 6080
1036
+ scheme: HTTP
1037
+ initialDelaySeconds: 5
1038
+ periodSeconds: 5
1039
+ timeoutSeconds: 1
1040
+ successThreshold: 1
1041
+ failureThreshold: 3
1042
+ securityContext:
1043
+ allowPrivilegeEscalation: false
1044
+ capabilities:
1045
+ drop:
1046
+ - ALL
1047
+ env:
1048
+ - name: POD_NAMESPACE
1049
+ valueFrom:
1050
+ fieldRef:
1051
+ fieldPath: metadata.namespace
1052
+ nodeSelector:
1053
+ kubernetes.io/os: linux
1054
+ ---
1055
+ # Source: cert-manager/templates/webhook-mutating-webhook.yaml
1056
+ apiVersion: admissionregistration.k8s.io/v1
1057
+ kind: MutatingWebhookConfiguration
1058
+ metadata:
1059
+ name: cert-manager-webhook
1060
+ labels:
1061
+ app: webhook
1062
+ app.kubernetes.io/name: webhook
1063
+ app.kubernetes.io/instance: cert-manager
1064
+ app.kubernetes.io/component: "webhook"
1065
+ app.kubernetes.io/version: "v1.13.0"
1066
+ annotations:
1067
+ cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
1068
+ webhooks:
1069
+ - name: webhook.cert-manager.io
1070
+ rules:
1071
+ - apiGroups:
1072
+ - "cert-manager.io"
1073
+ - "acme.cert-manager.io"
1074
+ apiVersions:
1075
+ - "v1"
1076
+ operations:
1077
+ - CREATE
1078
+ - UPDATE
1079
+ resources:
1080
+ - "*/*"
1081
+ admissionReviewVersions: ["v1"]
1082
+ # This webhook only accepts v1 cert-manager resources.
1083
+ # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
1084
+ # this webhook (after the resources have been converted to v1).
1085
+ matchPolicy: Equivalent
1086
+ timeoutSeconds: 10
1087
+ failurePolicy: Fail
1088
+ # Only include 'sideEffects' field in Kubernetes 1.12+
1089
+ sideEffects: None
1090
+ clientConfig:
1091
+ service:
1092
+ name: cert-manager-webhook
1093
+ namespace: cert-manager
1094
+ path: /mutate
1095
+ ---
1096
+ # Source: cert-manager/templates/webhook-validating-webhook.yaml
1097
+ apiVersion: admissionregistration.k8s.io/v1
1098
+ kind: ValidatingWebhookConfiguration
1099
+ metadata:
1100
+ name: cert-manager-webhook
1101
+ labels:
1102
+ app: webhook
1103
+ app.kubernetes.io/name: webhook
1104
+ app.kubernetes.io/instance: cert-manager
1105
+ app.kubernetes.io/component: "webhook"
1106
+ app.kubernetes.io/version: "v1.13.0"
1107
+ annotations:
1108
+ cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca"
1109
+ webhooks:
1110
+ - name: webhook.cert-manager.io
1111
+ namespaceSelector:
1112
+ matchExpressions:
1113
+ - key: "cert-manager.io/disable-validation"
1114
+ operator: "NotIn"
1115
+ values:
1116
+ - "true"
1117
+ rules:
1118
+ - apiGroups:
1119
+ - "cert-manager.io"
1120
+ - "acme.cert-manager.io"
1121
+ apiVersions:
1122
+ - "v1"
1123
+ operations:
1124
+ - CREATE
1125
+ - UPDATE
1126
+ resources:
1127
+ - "*/*"
1128
+ admissionReviewVersions: ["v1"]
1129
+ # This webhook only accepts v1 cert-manager resources.
1130
+ # Equivalent matchPolicy ensures that non-v1 resource requests are sent to
1131
+ # this webhook (after the resources have been converted to v1).
1132
+ matchPolicy: Equivalent
1133
+ timeoutSeconds: 10
1134
+ failurePolicy: Fail
1135
+ sideEffects: None
1136
+ clientConfig:
1137
+ service:
1138
+ name: cert-manager-webhook
1139
+ namespace: cert-manager
1140
+ path: /validate