Skip to content

Commit

Permalink
Merge 3c41c14 into bfae5f7
Browse files Browse the repository at this point in the history
  • Loading branch information
fiddlermikey authored Jan 24, 2024
2 parents bfae5f7 + 3c41c14 commit e699718
Show file tree
Hide file tree
Showing 5 changed files with 63 additions and 82 deletions.
20 changes: 20 additions & 0 deletions .github/workflows/keyfactor-bootstrap-workflow.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
name: Keyfactor Bootstrap Workflow

on:
workflow_dispatch:
pull_request:
types: [opened, closed, synchronize, edited, reopened]
push:
create:
branches:
- 'release-*.*'

jobs:
call-starter-workflow:
uses: keyfactor/actions/.github/workflows/starter.yml@ab#53666-container-build
secrets:
token: ${{ secrets.V2BUILDTOKEN}}
APPROVE_README_PUSH: ${{ secrets.APPROVE_README_PUSH}}
gpg_key: ${{ secrets.KF_GPG_PRIVATE_KEY }}
gpg_pass: ${{ secrets.KF_GPG_PASSPHRASE }}

68 changes: 0 additions & 68 deletions .github/workflows/release.yml

This file was deleted.

25 changes: 17 additions & 8 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,25 +1,34 @@
# command-cert-manager-issuer

The Command external issuer for cert-manager allows users to enroll certificates with a CA managed by Keyfactor Command using cert-manager, allowing security administrators to manage the lifecycle of certificates for Kubernetes applications.

#### Integration status: Production - Ready for use in production environments.



## Support for command-cert-manager-issuer

command-cert-manager-issuer is open source and supported on best effort level for this tool/library/client. This means customers can report Bugs, Feature Requests, Documentation amendment or questions as well as requests for customer information required for setup that needs Keyfactor access to obtain. Such requests do not follow normal SLA commitments for response or resolution. If you have a support issue, please open a support ticket via the Keyfactor Support Portal at https://support.keyfactor.com/

###### To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, use the **[Pull requests](../../pulls)** tab.



<a href="https://kubernetes.io">
<img src="https://raw.githubusercontent.com/cert-manager/cert-manager/d53c0b9270f8cd90d908460d69502694e1838f5f/logo/logo-small.png" alt="Terraform logo" title="K8s" align="left" height="50" />
</a>

# Keyfactor Command Issuer for cert-manager

[![Go Report Card](https://goreportcard.com/badge/github.com/Keyfactor/command-cert-manager-issuer)](https://goreportcard.com/report/github.com/Keyfactor/command-cert-manager-issuer)
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://img.shields.io/badge/License-Apache%202.0-blue.svg)

The Command external issuer for cert-manager allows users to enroll certificates with a CA managed by Keyfactor Command using cert-manager. This allows security administrators to manage the lifecycle of certificates for Kubernetes applications.

Cert-manager is a native Kubernetes certificate management controller which allows applications to get their certificates from a variety of CAs (Certification Authorities). It ensures certificates are valid and up to date, it also attempts to renew certificates at a configured time before expiration.

## Community supported
We welcome contributions.

The cert-manager external issuer for Keyfactor command is open source and community supported, meaning that there is **no SLA** applicable for these tools.

###### To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, see the [contribution guidelines](https://github.com/Keyfactor/command-k8s-csr-signer/blob/main/CONTRIBUTING.md) and use the **[Pull requests](../../pulls)** tab.

* [Installation](docs/install.markdown)
* [Usage](docs/config_usage.markdown)
* [Example Usage](docs/example.markdown)
* [Customization](docs/annotations.markdown)
* [Testing the Source](docs/testing.markdown)

15 changes: 9 additions & 6 deletions integration-manifest.json
Original file line number Diff line number Diff line change
@@ -1,8 +1,11 @@
{
"$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
"integration_type": "api-client",
"name": "command-cert-manager-issuer",
"status": "pilot",
"link_github":false,
"description": "cert-manager external issuer for the Keyfactor Command platform"
"$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
"integration_type": "api-client",
"name": "command-cert-manager-issuer",
"status": "production",
"link_github": false,
"update_catalog": false,
"support_level": "kf-community",
"platform_matrix": "linux/amd64,linux/amd64,linux/s390x,linux/ppc64le",
"description": "The Command external issuer for cert-manager allows users to enroll certificates with a CA managed by Keyfactor Command using cert-manager, allowing security administrators to manage the lifecycle of certificates for Kubernetes applications. "
}
17 changes: 17 additions & 0 deletions readme_source.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
<a href="https://kubernetes.io">
<img src="https://raw.githubusercontent.com/cert-manager/cert-manager/d53c0b9270f8cd90d908460d69502694e1838f5f/logo/logo-small.png" alt="Terraform logo" title="K8s" align="left" height="50" />
</a>

[![Go Report Card](https://goreportcard.com/badge/github.com/Keyfactor/command-cert-manager-issuer)](https://goreportcard.com/report/github.com/Keyfactor/command-cert-manager-issuer)
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://img.shields.io/badge/License-Apache%202.0-blue.svg)

The Command external issuer for cert-manager allows users to enroll certificates with a CA managed by Keyfactor Command using cert-manager. This allows security administrators to manage the lifecycle of certificates for Kubernetes applications.

Cert-manager is a native Kubernetes certificate management controller which allows applications to get their certificates from a variety of CAs (Certification Authorities). It ensures certificates are valid and up to date, it also attempts to renew certificates at a configured time before expiration.


* [Installation](docs/install.markdown)
* [Usage](docs/config_usage.markdown)
* [Example Usage](docs/example.markdown)
* [Customization](docs/annotations.markdown)
* [Testing the Source](docs/testing.markdown)

0 comments on commit e699718

Please sign in to comment.