Skip to content

Commit 5678b07

Browse files
committed
chore(ci): Update integration manifest
Signed-off-by: Hayden Roszell <[email protected]>
1 parent cbcab45 commit 5678b07

File tree

2 files changed

+3
-18
lines changed

2 files changed

+3
-18
lines changed

docsource/content.md

Lines changed: 1 addition & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -229,22 +229,6 @@ For example, ClusterIssuer resources can be used to issue certificates for resou
229229
kubectl apply -f clusterissuer.yaml
230230
```
231231
232-
> **Overriding the `spec` using Kubernetes Annotations on CertificateRequest Resources**
233-
>
234-
> The
235-
>
236-
> <details><summary>Notes</summary>
237-
> The GoDaddy AnyCA Gateway REST plugin requires several custom enrollment parameters that are passed to GoDaddy upon the submission of a new PFX/CSR enrollment request. These custom enrollment parameters configure the domain/organization/extended validation procedure required to complete the certificate enrollment.
238-
>
239-
> Prior to Command v12.3, custom enrollment parameters are not supported on a per-request basis for PFX/CSR Enrollment. If your Keyfactor Command version is less than v12.3, the only way to configure custom enrollment parameters is to set default parameter values on the Certificate Template in the Keyfactor AnyCA Gateway REST.
240-
>
241-
> Before continuing with installation prior to Command 12.3, users should consider the following:
242-
>
243-
> * Each combination of custom enrollment parameters will require the creation of a new Certificate Template and Certificate Profile in the Keyfactor AnyCA Gateway REST.
244-
> * If you have multiple combinations of custom enrollment parameters, consider the operational complexity of managing multiple Certificate Templates and Certificate Profiles.
245-
> * If your certificate workflows mostly consist of certificate renewal, re-issuance, and revocation, the GoDaddy AnyCA Gateway REST plugin is fully supported.
246-
> </details>
247-
248232
# Creating a Certificate
249233
250234
Once an Issuer or ClusterIssuer resource is created, they can be used to issue certificates using cert-manager. The two most important concepts are `Certificate` and `CertificateRequest` resources.
@@ -341,7 +325,7 @@ Keyfactor Command allows users to [attach custom metadata to certificates](https
341325
342326
- **Pre-defined Certificate Metadata**
343327
344-
If **all of the following metadata fields are defined** in Command, Command Issuer will populate the fields upon certificate enrollment. All of the metadata fields are String types. Please refer to the [Command docs](https://software.keyfactor.com/Core/Current/Content/ReferenceGuide/Certificate%20Metadata.htm) to define these metadata fields in Command.
328+
If **all of the following metadata fields are defined** in Command, Command Issuer will populate the fields upon certificate enrollment. All of the metadata fields are String types. Please refer to the [Command docs](https://software.keyfactor.com/Core/Current/Content/ReferenceGuide/Certificate%20Metadata.htm) to define these metadata fields in Command if you would like Command Issuer to populate these fields on certificates upon enrollment.
345329
346330
| Field Name | Description |
347331
|-------------------------------------|-----------------------------------------------------------------------------------------------------------------|

integration-manifest.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
{
22
"$schema": "https://keyfactor.github.io/v2/integration-manifest-schema.json",
33
"integration_type": "api-client",
4-
"name": "command-cert-manager-issuer",
4+
"name": "Command Issuer",
55
"status": "production",
66
"link_github": false,
77
"update_catalog": false,
88
"support_level": "community",
9+
"platform_matrix": "linux/arm64,linux/amd64,linux/s390x,linux/ppc64le",
910
"description": "cert-manager external issuer for the Keyfactor Command platform"
1011
}

0 commit comments

Comments
 (0)