diff --git a/.github/workflows/keyfactor-bootstrap-workflow.yml b/.github/workflows/keyfactor-bootstrap-workflow.yml
new file mode 100644
index 0000000..59b2626
--- /dev/null
+++ b/.github/workflows/keyfactor-bootstrap-workflow.yml
@@ -0,0 +1,20 @@
+name: Keyfactor Bootstrap Workflow
+
+on:
+ workflow_dispatch:
+ pull_request:
+ types: [opened, closed, synchronize, edited, reopened]
+ push:
+ create:
+ branches:
+ - 'release-*.*'
+
+jobs:
+ call-starter-workflow:
+ uses: keyfactor/actions/.github/workflows/starter.yml@release-2.3
+ secrets:
+ token: ${{ secrets.V2BUILDTOKEN}}
+ APPROVE_README_PUSH: ${{ secrets.APPROVE_README_PUSH}}
+ gpg_key: ${{ secrets.KF_GPG_PRIVATE_KEY }}
+ gpg_pass: ${{ secrets.KF_GPG_PASSPHRASE }}
+
diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml
deleted file mode 100644
index 2bf9bfd..0000000
--- a/.github/workflows/release.yml
+++ /dev/null
@@ -1,68 +0,0 @@
-name: Build and Release Helm Chart
-on:
- pull_request:
- branches:
- - 'v*'
- types:
- # action should run when the pull request is closed
- # (regardless of whether it was merged or just closed)
- - closed
- # Make sure the action runs every time new commits are
- # pushed to the pull request's branch
- - synchronize
-
-jobs:
- helm:
- runs-on: ubuntu-latest
- if: github.event.pull_request.merged == true
- steps:
- - name: Set IMAGE_NAME
- run: |
- echo "IMAGE_NAME=${GITHUB_REPOSITORY,,}" >>${GITHUB_ENV}
-
- # Checkout code
- # https://github.com/actions/checkout
- - name: Checkout code
- uses: actions/checkout@8ade135a41bc03ea155e62e844d188df1ea18608 # v4.1.0
-
- # Extract metadata (tags, labels) to use in Helm chart
- # https://github.com/docker/metadata-action
- - name: Extract Docker metadata
- id: meta
- uses: docker/metadata-action@96383f45573cb7f253c731d3b3ab81c87ef81934 # v5.0.0
- with:
- images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
-
- # Set version from DOCKER_METADATA_OUTPUT_VERSION as environment variable
- - name: Set Version
- run: |
- echo "VERSION=${DOCKER_METADATA_OUTPUT_VERSION:1}" >> $GITHUB_ENV
-
- # Change version and appVersion in Chart.yaml to the tag in the closed PR
- - name: Update Helm App/Chart Version
- shell: bash
- run: |
- sed -i "s/^version: .*/version: ${{ env.VERSION }}/g" deploy/charts/command-cert-manager-issuer/Chart.yaml
- sed -i "s/^appVersion: .*/appVersion: \"${{ env.DOCKER_METADATA_OUTPUT_VERSION }}\"/g" deploy/charts/command-cert-manager-issuer/Chart.yaml
-
- # Setup Helm
- # https://github.com/Azure/setup-helm
- - name: Install Helm
- uses: azure/setup-helm@5119fcb9089d432beecbf79bb2c7915207344b78 # v3.5
- with:
- token: ${{ secrets.GITHUB_TOKEN }}
-
- # Helm requires an ident name to be set for chart-releaser to work
- - name: Configure Git
- run: |
- git config user.name "$GITHUB_ACTOR"
- git config user.email "$GITHUB_ACTOR@users.noreply.github.com"
-
- # Build and release Helm chart to GitHub Pages
- # https://github.com/helm/chart-releaser-action
- - name: Run chart-releaser
- uses: helm/chart-releaser-action@be16258da8010256c6e82849661221415f031968 # v1.5.0
- env:
- CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}"
- with:
- charts_dir: deploy/charts
\ No newline at end of file
diff --git a/README.md b/README.md
index 5b27c16..71412bb 100644
--- a/README.md
+++ b/README.md
@@ -1,9 +1,23 @@
+# command-cert-manager-issuer
+
+The Command external issuer for cert-manager allows users to enroll certificates with a CA managed by Keyfactor Command using cert-manager, allowing security administrators to manage the lifecycle of certificates for Kubernetes applications.
+
+#### Integration status: Production - Ready for use in production environments.
+
+
+
+## Support for command-cert-manager-issuer
+
+command-cert-manager-issuer is open source and supported on best effort level for this tool/library/client. This means customers can report Bugs, Feature Requests, Documentation amendment or questions as well as requests for customer information required for setup that needs Keyfactor access to obtain. Such requests do not follow normal SLA commitments for response or resolution. If you have a support issue, please open a support ticket via the Keyfactor Support Portal at https://support.keyfactor.com/
+
+###### To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, use the **[Pull requests](../../pulls)** tab.
+
+
+
-# Keyfactor Command Issuer for cert-manager
-
[![Go Report Card](https://goreportcard.com/badge/github.com/Keyfactor/command-cert-manager-issuer)](https://goreportcard.com/report/github.com/Keyfactor/command-cert-manager-issuer)
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://img.shields.io/badge/License-Apache%202.0-blue.svg)
@@ -11,15 +25,10 @@ The Command external issuer for cert-manager allows users to enroll certificates
Cert-manager is a native Kubernetes certificate management controller which allows applications to get their certificates from a variety of CAs (Certification Authorities). It ensures certificates are valid and up to date, it also attempts to renew certificates at a configured time before expiration.
-## Community supported
-We welcome contributions.
-
-The cert-manager external issuer for Keyfactor command is open source and community supported, meaning that there is **no SLA** applicable for these tools.
-
-###### To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, see the [contribution guidelines](https://github.com/Keyfactor/command-k8s-csr-signer/blob/main/CONTRIBUTING.md) and use the **[Pull requests](../../pulls)** tab.
* [Installation](docs/install.markdown)
* [Usage](docs/config_usage.markdown)
* [Example Usage](docs/example.markdown)
* [Customization](docs/annotations.markdown)
* [Testing the Source](docs/testing.markdown)
+
diff --git a/integration-manifest.json b/integration-manifest.json
index 90778f1..38597bf 100644
--- a/integration-manifest.json
+++ b/integration-manifest.json
@@ -1,8 +1,11 @@
{
- "$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
- "integration_type": "api-client",
- "name": "command-cert-manager-issuer",
- "status": "pilot",
- "link_github":false,
- "description": "cert-manager external issuer for the Keyfactor Command platform"
+ "$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
+ "integration_type": "api-client",
+ "name": "command-cert-manager-issuer",
+ "status": "production",
+ "link_github": false,
+ "update_catalog": false,
+ "support_level": "kf-community",
+ "platform_matrix": "linux/amd64,linux/amd64,linux/s390x,linux/ppc64le",
+ "description": "The Command external issuer for cert-manager allows users to enroll certificates with a CA managed by Keyfactor Command using cert-manager, allowing security administrators to manage the lifecycle of certificates for Kubernetes applications. "
}
diff --git a/readme_source.md b/readme_source.md
new file mode 100644
index 0000000..20d7386
--- /dev/null
+++ b/readme_source.md
@@ -0,0 +1,17 @@
+
+
+
+
+[![Go Report Card](https://goreportcard.com/badge/github.com/Keyfactor/command-cert-manager-issuer)](https://goreportcard.com/report/github.com/Keyfactor/command-cert-manager-issuer)
+[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://img.shields.io/badge/License-Apache%202.0-blue.svg)
+
+The Command external issuer for cert-manager allows users to enroll certificates with a CA managed by Keyfactor Command using cert-manager. This allows security administrators to manage the lifecycle of certificates for Kubernetes applications.
+
+Cert-manager is a native Kubernetes certificate management controller which allows applications to get their certificates from a variety of CAs (Certification Authorities). It ensures certificates are valid and up to date, it also attempts to renew certificates at a configured time before expiration.
+
+
+* [Installation](docs/install.markdown)
+* [Usage](docs/config_usage.markdown)
+* [Example Usage](docs/example.markdown)
+* [Customization](docs/annotations.markdown)
+* [Testing the Source](docs/testing.markdown)