@@ -15,7 +15,7 @@ metadata:
15
15
{{- end }}
16
16
annotations :
17
17
{{- if .Values.certManager.enabled }}
18
- {{ .Values.certManager.apiGroup }} /inject-ca-from: {{ printf "%s/%s%s" .Release.Namespace .Release.Name "-root-certificate" | quote }}
18
+ cert-manager.io /inject-ca-from : {{ printf "%s/%s%s" .Release.Namespace .Release.Name "-root-certificate" | quote }}
19
19
{{- end }}
20
20
webhooks :
21
21
- name : federatedtypeconfigs.core.kubefed.io
@@ -152,15 +152,15 @@ stringData:
152
152
tls.key : {{ $cert.Key | quote }}
153
153
{{- else }}
154
154
---
155
- apiVersion : {{ .Values.certManager.apiGroup }}/{{ .Values.certManager.apiVersion }}
155
+ apiVersion : cert-manager.io/v1
156
156
kind : Issuer
157
157
metadata :
158
158
name : {{ .Release.Name }}-ca-issuer
159
159
spec :
160
160
selfSigned : {}
161
161
---
162
162
# Generate a CA Certificate used to sign certificates for the webhook
163
- apiVersion : {{ .Values.certManager.apiGroup }}/{{ .Values.certManager.apiVersion }}
163
+ apiVersion : cert-manager.io/v1
164
164
kind : Certificate
165
165
metadata :
166
166
name : {{ .Release.Name}}-root-certificate
@@ -173,7 +173,7 @@ spec:
173
173
isCA : true
174
174
---
175
175
# Create an Issuer that uses the above generated CA certificate to issue certs
176
- apiVersion : {{ .Values.certManager.apiGroup }}/{{ .Values.certManager.apiVersion }}
176
+ apiVersion : cert-manager.io/v1
177
177
kind : Issuer
178
178
metadata :
179
179
name : {{ .Release.Name }}-issuer
@@ -182,7 +182,7 @@ spec:
182
182
secretName : {{ .Release.Name}}-root-ca
183
183
---
184
184
# Finally, generate a serving certificate for the webhook to use
185
- apiVersion : {{ .Values.certManager.apiGroup }}/{{ .Values.certManager.apiVersion }}
185
+ apiVersion : cert-manager.io/v1
186
186
kind : Certificate
187
187
metadata :
188
188
name : {{ .Release.Name }}-certificate
0 commit comments