From c36a1277783ef0cce225d39e3af7385653f212ef Mon Sep 17 00:00:00 2001 From: Shubha Narayanan Date: Thu, 1 Feb 2024 15:28:24 +0530 Subject: [PATCH] cert-manager content improvement --- _topic_maps/_topic_map.yml | 14 +- ...nfigure-cloud-credentials-aws-non-sts.adoc | 6 +- ...r-configure-cloud-credentials-aws-sts.adoc | 6 +- ...nfigure-cloud-credentials-gcp-non-sts.adoc | 6 +- ...r-configure-cloud-credentials-gcp-sts.adoc | 6 +- ...cert-manager-enable-operand-log-level.adoc | 4 +- modules/cert-manager-install-cli.adoc | 130 ++++++++++++++++++ modules/cert-manager-install-console.adoc | 8 +- modules/cert-manager-supported-versions.adoc | 10 ++ .../cert-manager-authenticate-aws.adoc | 16 --- .../cert-manager-authenticate-gcp.adoc | 16 --- ...cert-manager-authenticate-non-sts-gcp.adoc | 11 -- .../cert-manager-authenticate.adoc | 37 +++++ .../cert-manager-authentication-non-sts.adoc | 11 -- .../cert-manager-monitoring.adoc | 2 +- .../cert-manager-operator-install.adoc | 10 +- .../cert-manager-operator-issuer-acme.adoc | 8 +- .../cert-manager-operator-proxy.adoc | 2 - security/cert_manager_operator/index.adoc | 4 + 19 files changed, 214 insertions(+), 93 deletions(-) create mode 100644 modules/cert-manager-install-cli.adoc create mode 100644 modules/cert-manager-supported-versions.adoc delete mode 100644 security/cert_manager_operator/cert-manager-authenticate-aws.adoc delete mode 100644 security/cert_manager_operator/cert-manager-authenticate-gcp.adoc delete mode 100644 security/cert_manager_operator/cert-manager-authenticate-non-sts-gcp.adoc create mode 100644 security/cert_manager_operator/cert-manager-authenticate.adoc delete mode 100644 security/cert_manager_operator/cert-manager-authentication-non-sts.adoc diff --git a/_topic_maps/_topic_map.yml b/_topic_maps/_topic_map.yml index b97dbf4968..2b1ed5ca6c 100644 --- a/_topic_maps/_topic_map.yml +++ b/_topic_maps/_topic_map.yml @@ -1113,22 +1113,16 @@ Topics: File: cert-manager-operator-issuer-acme - Name: Configuring certificates with an issuer File: cert-manager-creating-certificate - - Name: Enabling monitoring for the cert-manager Operator for Red Hat OpenShift + - Name: Monitoring the cert-manager Operator for Red Hat OpenShift File: cert-manager-monitoring - - Name: Configuring the egress proxy for the cert-manager Operator for Red Hat OpenShift + - Name: Configuring the egress proxy File: cert-manager-operator-proxy - Name: Customizing cert-manager by using the cert-manager Operator API fields File: cert-manager-customizing-api-fields - - Name: Authenticating the cert-manager Operator with AWS Security Token Service - File: cert-manager-authenticate-aws + - Name: Authenticating the cert-manager Operator for Red Hat OpenShift + File: cert-manager-authenticate - Name: Configuring log levels for cert-manager and the cert-manager Operator for Red Hat OpenShift File: cert-manager-log-levels - - Name: Authenticating the cert-manager Operator for Red Hat OpenShift with GCP Workload Identity - File: cert-manager-authenticate-gcp - - Name: Authenticating the cert-manager Operator for Red Hat OpenShift on AWS - File: cert-manager-authentication-non-sts - - Name: Authenticating the cert-manager Operator for Red Hat OpenShift on GCP - File: cert-manager-authenticate-non-sts-gcp - Name: Uninstalling the cert-manager Operator for Red Hat OpenShift File: cert-manager-operator-uninstall - Name: Viewing audit logs diff --git a/modules/cert-manager-configure-cloud-credentials-aws-non-sts.adoc b/modules/cert-manager-configure-cloud-credentials-aws-non-sts.adoc index 1dff8fb819..afa6b9da0e 100644 --- a/modules/cert-manager-configure-cloud-credentials-aws-non-sts.adoc +++ b/modules/cert-manager-configure-cloud-credentials-aws-non-sts.adoc @@ -1,12 +1,10 @@ // Module included in the following assemblies: // -// * security/cert_manager_operator/cert-manager-authenticate-aws.adoc +// * security/cert_manager_operator/cert-manager-authenticate.adoc :_mod-docs-content-type: PROCEDURE [id="cert-manager-configure-cloud-credentials-aws-non-sts_{context}"] -= Configuring cloud credentials for the {cert-manager-operator} on AWS - -To configure the cloud credentials for the {cert-manager-operator} on the AWS cluster you must generate the cloud credentials secret by creating a `CredentialsRequest` object, and allowing the Cloud Credential Operator. += Authenticating on AWS .Prerequisites diff --git a/modules/cert-manager-configure-cloud-credentials-aws-sts.adoc b/modules/cert-manager-configure-cloud-credentials-aws-sts.adoc index 42d1849fab..dcda7cbd75 100644 --- a/modules/cert-manager-configure-cloud-credentials-aws-sts.adoc +++ b/modules/cert-manager-configure-cloud-credentials-aws-sts.adoc @@ -1,12 +1,10 @@ // Module included in the following assemblies: // -// * security/cert_manager_operator/cert-manager-authenticate-aws.adoc +// * security/cert_manager_operator/cert-manager-authenticate.adoc :_mod-docs-content-type: PROCEDURE [id="cert-manager-configure-cloud-credentials-aws-sts_{context}"] -= Configuring cloud credentials for the {cert-manager-operator} for the AWS Security Token Service cluster - -To configure the cloud credentials for the {cert-manager-operator} on the AWS Security Token Service (STS) cluster with the cloud credentials. You must generate the cloud credentials manually, and apply it on the cluster by using the `ccoctl` binary. += Authenticating with AWS Security Token Service .Prerequisites diff --git a/modules/cert-manager-configure-cloud-credentials-gcp-non-sts.adoc b/modules/cert-manager-configure-cloud-credentials-gcp-non-sts.adoc index 467ec60e04..1e6f786907 100644 --- a/modules/cert-manager-configure-cloud-credentials-gcp-non-sts.adoc +++ b/modules/cert-manager-configure-cloud-credentials-gcp-non-sts.adoc @@ -1,12 +1,10 @@ // Module included in the following assemblies: // -// * security/cert_manager_operator/cert-manager-authenticate-non-sts-gcp.adoc +// * security/cert_manager_operator/cert-manager-authenticate.adoc :_mod-docs-content-type: PROCEDURE [id="cert-manager-configure-cloud-credentials-gcp-non-sts_{context}"] -= Configuring cloud credentials for the {cert-manager-operator} on GCP - -To configure the cloud credentials for the {cert-manager-operator} on a GCP cluster you must create a `CredentialsRequest` object, and allow the Cloud Credential Operator to generate the cloud credentials secret. += Authenticating on GCP .Prerequisites diff --git a/modules/cert-manager-configure-cloud-credentials-gcp-sts.adoc b/modules/cert-manager-configure-cloud-credentials-gcp-sts.adoc index 0260ca8e93..fbd275f026 100644 --- a/modules/cert-manager-configure-cloud-credentials-gcp-sts.adoc +++ b/modules/cert-manager-configure-cloud-credentials-gcp-sts.adoc @@ -1,12 +1,10 @@ // Module included in the following assemblies: // -// * security/cert_manager_operator/cert-manager-authenticate-gcp.adoc +// * security/cert_manager_operator/cert-manager-authenticate.adoc :_mod-docs-content-type: PROCEDURE [id="cert-manager-configure-cloud-credentials-gcp-sts_{context}"] -= Configuring cloud credentials for the {cert-manager-operator} with GCP Workload Identity - -Generate the cloud credentials for the {cert-manager-operator} by using the `ccoctl` binary. Then, apply them to the GCP Workload Identity cluster. += Authenticating with GCP Workload Identity .Prerequisites diff --git a/modules/cert-manager-enable-operand-log-level.adoc b/modules/cert-manager-enable-operand-log-level.adoc index f2e03ef626..548568ff57 100644 --- a/modules/cert-manager-enable-operand-log-level.adoc +++ b/modules/cert-manager-enable-operand-log-level.adoc @@ -30,9 +30,9 @@ apiVersion: operator.openshift.io/v1alpha1 kind: CertManager ... spec: - logLevel: Normal <1> + logLevel: <1> ---- -<1> The default `logLevel` is `Normal`. Replace `Normal` with the desired log level value. The valid log level values for the `CertManager` resource are `Normal`, `Debug`, `Trace`, and `TraceAll`. To audit logs and perform common operations when everything is fine, set `logLevel` to `Normal` . To troubleshoot a minor issue by viewing verbose logs, set `logLevel` to `Debug` . To troubleshoot a major issue by viewing more verbose logs, you can set `logLevel` to `Trace`. To troubleshoot serious issues, set `logLevel` to `TraceAll`. +<1> The valid log level values for the `CertManager` resource are `Normal`, `Debug`, `Trace`, and `TraceAll`. To audit logs and perform common operations when there are no issues, set `logLevel` to `Normal` . To troubleshoot a minor issue by viewing verbose logs, set `logLevel` to `Debug` . To troubleshoot a major issue by viewing more verbose logs, you can set `logLevel` to `Trace`. To troubleshoot serious issues, set `logLevel` to `TraceAll`. The default `logLevel` is `Normal`. + [NOTE] ==== diff --git a/modules/cert-manager-install-cli.adoc b/modules/cert-manager-install-cli.adoc new file mode 100644 index 0000000000..d0ca25f016 --- /dev/null +++ b/modules/cert-manager-install-cli.adoc @@ -0,0 +1,130 @@ +// Module included in the following assemblies: +// +// * security/cert_manager_operator/cert-manager-operator-install.adoc + +:_mod-docs-content-type: PROCEDURE +[id="cert-manager-install-cli_{context}"] += Installing the {cert-manager-operator} by using the CLI + +.Prerequisites + +* You have access to the cluster with `cluster-admin` privileges. + +.Procedure + +. Create a new project named `cert-manager-operator` by running the following command: ++ +[source, terminal] +---- +$ oc new-project cert-manager-operator +---- + +. Create an `OperatorGroup` object: + +.. Create a YAML file, for example, `operatorGroup.yaml`, with the following content: ++ +[source, yaml] +---- +apiVersion: operators.coreos.com/v1 +kind: OperatorGroup +metadata: + name: openshift-cert-manager-operator + namespace: cert-manager-operator +spec: + targetNamespaces: + - "cert-manager-operator" +---- + +.. Create the `OperatorGroup` object by running the following command: ++ +[source, terminal] +---- +$ oc create -f operatorGroup.yaml +---- + +. Create a `Subscription` object: + +.. Create a YAML file, for example, `subscription.yaml`, that defines the `Subscription` object: ++ +[source, yaml] +---- +apiVersion: operators.coreos.com/v1alpha1 +kind: Subscription +metadata: + name: openshift-cert-manager-operator + namespace: cert-manager-operator +spec: + channel: stable-v1 + name: openshift-cert-manager-operator + source: redhat-operators + sourceNamespace: openshift-marketplace + installPlanApproval: Automatic + startingCSV: cert-manager-operator.v1.13.0 +---- + +.. Create the `Subscription` object by running the following command: ++ +[source, terminal] +---- +$ oc create -f subscription.yaml +---- + +.Verification + +. Verify that the OLM subscription is created by running the following command: ++ +[source, terminal] +---- +$ oc get subscription -n cert-manager-operator +---- ++ +.Example output +[source, terminal] +---- +NAME PACKAGE SOURCE CHANNEL +openshift-cert-manager-operator openshift-cert-manager-operator redhat-operators stable-v1 +---- + +. Verify whether the Operator is successfully installed by running the following command: ++ +[source, terminal] +---- +$ oc get csv -n cert-manager-operator +---- ++ +.Example output +[source, terminal] +---- +NAME DISPLAY VERSION REPLACES PHASE +cert-manager-operator.v1.13.0 cert-manager Operator for Red Hat OpenShift 1.13.0 cert-manager-operator.v1.12.1 Succeeded +---- + +. Verify that the status {cert-manager-operator} is `Running` by running the following command: ++ +[source, terminal] +---- +$ oc get pods -n cert-manager-operator +---- ++ +.Example output +[source, terminal] +---- +NAME READY STATUS RESTARTS AGE +cert-manager-operator-controller-manager-695b4d46cb-r4hld 2/2 Running 0 7m4s +---- + +. Verify that the status of cert-manager pods is `Running` by running the following command: ++ +[source, terminal] +---- +$ oc get pods -n cert-manager +---- ++ +.Example output +[source, terminal] +---- +NAME READY STATUS RESTARTS AGE +cert-manager-58b7f649c4-dp6l4 1/1 Running 0 7m1s +cert-manager-cainjector-5565b8f897-gx25h 1/1 Running 0 7m37s +cert-manager-webhook-9bc98cbdd-f972x 1/1 Running 0 7m40s +---- \ No newline at end of file diff --git a/modules/cert-manager-install-console.adoc b/modules/cert-manager-install-console.adoc index 4076a32219..53a025ce31 100644 --- a/modules/cert-manager-install-console.adoc +++ b/modules/cert-manager-install-console.adoc @@ -4,7 +4,7 @@ :_mod-docs-content-type: PROCEDURE [id="cert-manager-install-console_{context}"] -= Installing the {cert-manager-operator} using the web console += Installing the {cert-manager-operator} by using the web console You can use the web console to install the {cert-manager-operator}. @@ -21,11 +21,13 @@ You can use the web console to install the {cert-manager-operator}. . Enter *{cert-manager-operator}* into the filter box. -. Select the *{cert-manager-operator}* and click *Install*. +. Select the *{cert-manager-operator}* + +. Select the {cert-manager-operator} version from *Version* drop-down list, and click *Install*. + [NOTE] ==== -From the {cert-manager-operator} `1.12.0` and later, the z-stream versions of the upstream cert-manager operands such as cert-manager controller, CA injector, Webhook, and {cert-manager-operator} are decoupled. For example, for the {cert-manager-operator} `1.12.0`, the cert-manager operand version is `v1.12.4`. +See supported {cert-manager-operator} versions in the following "Additional resources" section. ==== . On the *Install Operator* page: diff --git a/modules/cert-manager-supported-versions.adoc b/modules/cert-manager-supported-versions.adoc new file mode 100644 index 0000000000..0e9addc998 --- /dev/null +++ b/modules/cert-manager-supported-versions.adoc @@ -0,0 +1,10 @@ +// Module included in the following assemblies: +// +// * security/cert_manager_operator/index.adoc + +:_mod-docs-content-type: REFERENCE +[id="cert-manager-operator-supported-versions_{context}"] +== Supported {cert-manager-operator} versions +{product-title} {product-version} supports the following versions of {cert-manager-operator}: + +* {cert-manager-operator} 1.13 \ No newline at end of file diff --git a/security/cert_manager_operator/cert-manager-authenticate-aws.adoc b/security/cert_manager_operator/cert-manager-authenticate-aws.adoc deleted file mode 100644 index d3cd48fb84..0000000000 --- a/security/cert_manager_operator/cert-manager-authenticate-aws.adoc +++ /dev/null @@ -1,16 +0,0 @@ -:_mod-docs-content-type: ASSEMBLY -[id="cert-manager-authenticate-aws"] -= Authenticating the {cert-manager-operator} with AWS Security Token Service -include::_attributes/common-attributes.adoc[] -:context: cert-manager-authenticate-aws - -toc::[] - -You can authenticate the {cert-manager-operator} on the AWS Security Token Service (STS) cluster. You can configure cloud credentials for the {cert-manager-operator} by using the `ccoctl` binary. - -include::modules/cert-manager-configure-cloud-credentials-aws-sts.adoc[leveloffset=+1] - -[role="_additional-resources"] -[id="additional-resources_cert-manager-authenticate-gcp"] -== Additional resources -* xref:../../installing/installing_aws/installing-aws-customizations.adoc#cco-ccoctl-configuring_installing-aws-customizations[Configuring the Cloud Credential Operator utility] \ No newline at end of file diff --git a/security/cert_manager_operator/cert-manager-authenticate-gcp.adoc b/security/cert_manager_operator/cert-manager-authenticate-gcp.adoc deleted file mode 100644 index ef24be242a..0000000000 --- a/security/cert_manager_operator/cert-manager-authenticate-gcp.adoc +++ /dev/null @@ -1,16 +0,0 @@ -:_mod-docs-content-type: ASSEMBLY -[id="cert-manager-authenticate-gcp"] -= Authenticating the {cert-manager-operator} with GCP Workload Identity -include::_attributes/common-attributes.adoc[] -:context: cert-manager-authenticate-gcp - -toc::[] - -You can authenticate the {cert-manager-operator} on the GCP Workload Identity cluster by using the cloud credentials. You can configure the cloud credentials by using the `ccoctl` binary. - -include::modules/cert-manager-configure-cloud-credentials-gcp-sts.adoc[leveloffset=+1] - -[role="_additional-resources"] -[id="additional-resources_cert-manager-authenticate-gcp-workload-identity"] -== Additional resources -* xref:../../installing/installing_gcp/installing-gcp-customizations.adoc#cco-ccoctl-configuring_installing-gcp-customizations[Configuring the Cloud Credential Operator utility] \ No newline at end of file diff --git a/security/cert_manager_operator/cert-manager-authenticate-non-sts-gcp.adoc b/security/cert_manager_operator/cert-manager-authenticate-non-sts-gcp.adoc deleted file mode 100644 index 86b71ad4b7..0000000000 --- a/security/cert_manager_operator/cert-manager-authenticate-non-sts-gcp.adoc +++ /dev/null @@ -1,11 +0,0 @@ -:_mod-docs-content-type: ASSEMBLY -[id="cert-manager-authenticate-non-sts-gcp"] -= Authenticating the {cert-manager-operator} on GCP -include::_attributes/common-attributes.adoc[] -:context: cert-manager-authenticate-non-sts-gcp - -toc::[] - -You can configure cloud credentials for the {cert-manager-operator} on a GCP cluster. The cloud credentials are generated by the Cloud Credential Operator. - -include::modules/cert-manager-configure-cloud-credentials-gcp-non-sts.adoc[leveloffset=+1] \ No newline at end of file diff --git a/security/cert_manager_operator/cert-manager-authenticate.adoc b/security/cert_manager_operator/cert-manager-authenticate.adoc new file mode 100644 index 0000000000..5dbfca8508 --- /dev/null +++ b/security/cert_manager_operator/cert-manager-authenticate.adoc @@ -0,0 +1,37 @@ +:_mod-docs-content-type: ASSEMBLY +[id="cert-manager-authenticate-aws"] += Authenticating the {cert-manager-operator} +include::_attributes/common-attributes.adoc[] +:context: cert-manager-authenticate + +toc::[] + +You can authenticate the cert-manager Operator for Red Hat OpenShift on the cluster by configuring the cloud credentials. + +// on AWS +include::modules/cert-manager-configure-cloud-credentials-aws-non-sts.adoc[leveloffset=+1] + +// with AWS Security Token Service +include::modules/cert-manager-configure-cloud-credentials-aws-sts.adoc[leveloffset=+1] + +[role="_additional-resources"] +[id="additional-resources_cert-manager-authenticate-gcp"] +.Additional resources + +* xref:../../installing/installing_aws/installing-aws-customizations.adoc#cco-ccoctl-configuring_installing-aws-customizations[Configuring the Cloud Credential Operator utility] + +// on GCP +include::modules/cert-manager-configure-cloud-credentials-gcp-non-sts.adoc[leveloffset=+1] + +// with GCP Workload Identity +include::modules/cert-manager-configure-cloud-credentials-gcp-sts.adoc[leveloffset=+1] + +[role="_additional-resources"] +[id="additional-resources_cert-manager-authenticate-gcp-workload-identity"] +.Additional resources + +* xref:../../installing/installing_gcp/installing-gcp-customizations.adoc#cco-ccoctl-configuring_installing-gcp-customizations[Configuring the Cloud Credential Operator utility] + +* xref:../../authentication/managing_cloud_provider_credentials/cco-short-term-creds.adoc#cco-short-term-creds[Manual mode with short-term credentials for components] + +* xref:../../authentication/managing_cloud_provider_credentials/about-cloud-credential-operator.adoc#about-cloud-credential-operator-default_about-cloud-credential-operator[Default behavior of the Cloud Credential Operator] \ No newline at end of file diff --git a/security/cert_manager_operator/cert-manager-authentication-non-sts.adoc b/security/cert_manager_operator/cert-manager-authentication-non-sts.adoc deleted file mode 100644 index 892b2e875d..0000000000 --- a/security/cert_manager_operator/cert-manager-authentication-non-sts.adoc +++ /dev/null @@ -1,11 +0,0 @@ -:_mod-docs-content-type: ASSEMBLY -[id="cert-manager-authentication-non-sts"] -= Authenticating the {cert-manager-operator} on AWS -include::_attributes/common-attributes.adoc[] -:context: cert-manager-authentication-non-sts - -toc::[] - -You can configure the cloud credentials for the {cert-manager-operator} on the AWS cluster. The cloud credentials are generated by the Cloud Credential Operator. - -include::modules/cert-manager-configure-cloud-credentials-aws-non-sts.adoc[leveloffset=+1] \ No newline at end of file diff --git a/security/cert_manager_operator/cert-manager-monitoring.adoc b/security/cert_manager_operator/cert-manager-monitoring.adoc index 4bb6ecbeb9..86be09c920 100644 --- a/security/cert_manager_operator/cert-manager-monitoring.adoc +++ b/security/cert_manager_operator/cert-manager-monitoring.adoc @@ -1,6 +1,6 @@ :_mod-docs-content-type: ASSEMBLY [id="cert-manager-monitoring"] -= Enabling monitoring for the {cert-manager-operator} += Monitoring {cert-manager-operator} include::_attributes/common-attributes.adoc[] :context: cert-manager-monitoring diff --git a/security/cert_manager_operator/cert-manager-operator-install.adoc b/security/cert_manager_operator/cert-manager-operator-install.adoc index c53b264a30..c56cde4428 100644 --- a/security/cert_manager_operator/cert-manager-operator-install.adoc +++ b/security/cert_manager_operator/cert-manager-operator-install.adoc @@ -8,8 +8,16 @@ toc::[] The {cert-manager-operator} is not installed in {product-title} by default. You can install the {cert-manager-operator} by using the web console. +== Installing the {cert-manager-operator} // Installing the {cert-manager-operator} using the web console -include::modules/cert-manager-install-console.adoc[leveloffset=+1] +include::modules/cert-manager-install-console.adoc[leveloffset=+2] + +//Installing using CLI +include::modules/cert-manager-install-cli.adoc[leveloffset=+2] + +[role="_additional-resources"] +.Additional resources +* xref:../cert_manager_operator/index.adoc#cert-manager-operator-supported-versions_cert-manager-operator-about[Supported {cert-manager-operator} versions] // Updating paths for the {cert-manager-operator} include::modules/cert-manager-operator-update-channels.adoc[leveloffset=+1] diff --git a/security/cert_manager_operator/cert-manager-operator-issuer-acme.adoc b/security/cert_manager_operator/cert-manager-operator-issuer-acme.adoc index ac899f062f..c5a38690ac 100644 --- a/security/cert_manager_operator/cert-manager-operator-issuer-acme.adoc +++ b/security/cert_manager_operator/cert-manager-operator-issuer-acme.adoc @@ -61,10 +61,10 @@ include::modules/cert-manager-acme-dns01-explicit-azure.adoc[leveloffset=+1] [id="additional-resources_cert-manager-operator-issuer-acme"] == Additional resources -* xref:../../security/cert_manager_operator/cert-manager-authenticate-aws.adoc#cert-manager-configure-cloud-credentials-aws-sts_cert-manager-authenticate-aws[Configuring cloud credentials for the {cert-manager-operator} for the AWS Security Token Service cluster] +* xref:../../security/cert_manager_operator/cert-manager-authenticate.adoc#cert-manager-configure-cloud-credentials-aws-sts_cert-manager-authenticate[Configuring cloud credentials for the {cert-manager-operator} for the AWS Security Token Service cluster] -* xref:../../security/cert_manager_operator/cert-manager-authentication-non-sts.adoc#cert-manager-configure-cloud-credentials-aws-non-sts_cert-manager-authentication-non-sts[Configuring cloud credentials for the {cert-manager-operator} on AWS] +* xref:../../security/cert_manager_operator/cert-manager-authenticate.adoc#cert-manager-configure-cloud-credentials-aws-non-sts_cert-manager-authenticate[Configuring cloud credentials for the {cert-manager-operator} on AWS] -* xref:../../security/cert_manager_operator/cert-manager-authenticate-gcp.adoc#cert-manager-configure-cloud-credentials-gcp-sts_cert-manager-authenticate-gcp[Configuring cloud credentials for the {cert-manager-operator} with GCP Workload Identity] +* xref:../../security/cert_manager_operator/cert-manager-authenticate.adoc#cert-manager-configure-cloud-credentials-gcp-sts_cert-manager-authenticate[Configuring cloud credentials for the {cert-manager-operator} with GCP Workload Identity] -* xref:../../security/cert_manager_operator/cert-manager-authenticate-non-sts-gcp.adoc#cert-manager-configure-cloud-credentials-gcp-non-sts_cert-manager-authenticate-non-sts-gcp[Configuring cloud credentials for the {cert-manager-operator} on GCP] \ No newline at end of file +* xref:../../security/cert_manager_operator/cert-manager-authenticate.adoc#cert-manager-configure-cloud-credentials-gcp-non-sts_cert-manager-authenticate[Configuring cloud credentials for the {cert-manager-operator} on GCP] \ No newline at end of file diff --git a/security/cert_manager_operator/cert-manager-operator-proxy.adoc b/security/cert_manager_operator/cert-manager-operator-proxy.adoc index 518556fc83..74e730169b 100644 --- a/security/cert_manager_operator/cert-manager-operator-proxy.adoc +++ b/security/cert_manager_operator/cert-manager-operator-proxy.adoc @@ -4,8 +4,6 @@ include::_attributes/common-attributes.adoc[] :context: cert-manager-operator-proxy -toc::[] - If a cluster-wide egress proxy is configured in {product-title}, Operator Lifecycle Manager (OLM) automatically configures Operators that it manages with the cluster-wide proxy. OLM automatically updates all of the Operator's deployments with the `HTTP_PROXY`, `HTTPS_PROXY`, `NO_PROXY` environment variables. You can inject any CA certificates that are required for proxying HTTPS connections into the {cert-manager-operator}. diff --git a/security/cert_manager_operator/index.adoc b/security/cert_manager_operator/index.adoc index dfb1618d19..fd1c471fa1 100644 --- a/security/cert_manager_operator/index.adoc +++ b/security/cert_manager_operator/index.adoc @@ -17,6 +17,10 @@ include::modules/cert-manager-issuer-types.adoc[leveloffset=+1] // Certificate request methods include::modules/cert-manager-request-methods.adoc[leveloffset=+1] +//Supported versions +include::modules/cert-manager-supported-versions.adoc[leveloffset=+1] + + [role="_additional-resources"] [id="cert-manager-operator-about_additional-resources"] == Additional resources