Skip to content

Commit 9fd5c60

Browse files
committed
Update FBC catalogs in v4.17+ for v1.17.0 stage release
> make update-catalog OPERATOR_BUNDLE_IMAGE=registry.stage.redhat.io/cert-manager/cert-manager-operator-bundle@sha256:e6277b0aa2ddc7d5d6f68d8c7844c5e69e3003544d942c39cfb0c8e92e64cf48 CATALOG_DIR=catalogs/v4.17/catalog BUNDLE_FILE_NAME=bundle-v1.17.0.yaml REPLICATE_BUNDLE_FILE_IN_CATALOGS=no USE_MIGRATE_LEVEL_FLAG=yes > cp catalogs/v4.17/catalog/openshift-cert-manager-operator/bundle-v1.17.0.yaml catalogs/v4.18/catalog/openshift-cert-manager-operator/ > cp catalogs/v4.17/catalog/openshift-cert-manager-operator/bundle-v1.17.0.yaml catalogs/v4.19/catalog/openshift-cert-manager-operator/ > cp catalogs/v4.17/catalog/openshift-cert-manager-operator/bundle-v1.17.0.yaml catalogs/v4.20/catalog/openshift-cert-manager-operator/ Signed-off-by: chiragkyal <[email protected]>
1 parent 51f76b3 commit 9fd5c60

File tree

4 files changed

+1584
-0
lines changed

4 files changed

+1584
-0
lines changed
Lines changed: 396 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,396 @@
1+
---
2+
image: registry.stage.redhat.io/cert-manager/cert-manager-operator-bundle@sha256:e6277b0aa2ddc7d5d6f68d8c7844c5e69e3003544d942c39cfb0c8e92e64cf48
3+
name: cert-manager-operator.v1.17.0
4+
package: openshift-cert-manager-operator
5+
properties:
6+
- type: olm.gvk
7+
value:
8+
group: acme.cert-manager.io
9+
kind: Challenge
10+
version: v1
11+
- type: olm.gvk
12+
value:
13+
group: acme.cert-manager.io
14+
kind: Order
15+
version: v1
16+
- type: olm.gvk
17+
value:
18+
group: cert-manager.io
19+
kind: Certificate
20+
version: v1
21+
- type: olm.gvk
22+
value:
23+
group: cert-manager.io
24+
kind: CertificateRequest
25+
version: v1
26+
- type: olm.gvk
27+
value:
28+
group: cert-manager.io
29+
kind: ClusterIssuer
30+
version: v1
31+
- type: olm.gvk
32+
value:
33+
group: cert-manager.io
34+
kind: Issuer
35+
version: v1
36+
- type: olm.gvk
37+
value:
38+
group: operator.openshift.io
39+
kind: CertManager
40+
version: v1alpha1
41+
- type: olm.gvk
42+
value:
43+
group: operator.openshift.io
44+
kind: IstioCSR
45+
version: v1alpha1
46+
- type: olm.package
47+
value:
48+
packageName: openshift-cert-manager-operator
49+
version: 1.17.0
50+
- type: olm.csv.metadata
51+
value:
52+
annotations:
53+
alm-examples: |-
54+
[
55+
{
56+
"apiVersion": "acme.cert-manager.io/v1",
57+
"kind": "Challenge",
58+
"metadata": {
59+
"name": "tls-cert-sample",
60+
"namespace": "default"
61+
},
62+
"spec": {
63+
"authorizationURL": "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX",
64+
"dnsName": "sample.dns.name",
65+
"issuerRef": {
66+
"kind": "Issuer",
67+
"name": "letsencrypt-staging"
68+
},
69+
"key": "XXX",
70+
"solver": {
71+
"dns01": {
72+
"route53": {
73+
"accessKeyID": "XXX",
74+
"hostedZoneID": "XXX",
75+
"region": "us-east-1",
76+
"secretAccessKeySecretRef": {
77+
"key": "awsSecretAccessKey",
78+
"name": "aws-secret"
79+
}
80+
}
81+
},
82+
"selector": {
83+
"dnsNames": [
84+
"sample.dns.name"
85+
]
86+
}
87+
},
88+
"token": "XXX",
89+
"type": "DNS-01",
90+
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX",
91+
"wildcard": false
92+
}
93+
},
94+
{
95+
"apiVersion": "acme.cert-manager.io/v1",
96+
"kind": "Order",
97+
"metadata": {
98+
"annotations": {
99+
"cert-manager.io/certificate-name": "tls-cert",
100+
"cert-manager.io/certificate-revision": "1",
101+
"cert-manager.io/private-key-secret-name": "tls-cert-sample"
102+
},
103+
"name": "tls-cert-sample",
104+
"namespace": "default"
105+
},
106+
"spec": {
107+
"commonName": "sample.dns.name",
108+
"dnsNames": [
109+
"sample.dns.name"
110+
],
111+
"issuerRef": {
112+
"kind": "Issuer",
113+
"name": "letsencrypt-staging"
114+
},
115+
"request": "XXX"
116+
}
117+
},
118+
{
119+
"apiVersion": "cert-manager.io/v1",
120+
"kind": "Certificate",
121+
"metadata": {
122+
"name": "selfsigned-ca",
123+
"namespace": "default"
124+
},
125+
"spec": {
126+
"commonName": "selfsigned-ca.dns.name",
127+
"isCA": true,
128+
"issuerRef": {
129+
"group": "cert-manager.io",
130+
"kind": "ClusterIssuer",
131+
"name": "selfsigned-issuer"
132+
},
133+
"privateKey": {
134+
"algorithm": "ECDSA",
135+
"size": 256
136+
},
137+
"secretName": "ca-root-secret"
138+
}
139+
},
140+
{
141+
"apiVersion": "cert-manager.io/v1",
142+
"kind": "Certificate",
143+
"metadata": {
144+
"name": "tls-cert",
145+
"namespace": "default"
146+
},
147+
"spec": {
148+
"commonName": "sample.dns.name",
149+
"dnsNames": [
150+
"sample.dns.name"
151+
],
152+
"isCA": false,
153+
"issuerRef": {
154+
"kind": "Issuer",
155+
"name": "letsencrypt-staging"
156+
},
157+
"secretName": "tls-cert"
158+
}
159+
},
160+
{
161+
"apiVersion": "cert-manager.io/v1",
162+
"kind": "CertificateRequest",
163+
"metadata": {
164+
"annotations": {
165+
"cert-manager.io/certificate-name": "tls-cert",
166+
"cert-manager.io/certificate-revision": "1",
167+
"cert-manager.io/private-key-secret-name": "tls-cert-sample"
168+
},
169+
"name": "tls-cert-sample",
170+
"namespace": "default"
171+
},
172+
"spec": {
173+
"groups": [
174+
"system:serviceaccounts",
175+
"system:serviceaccounts:cert-manager",
176+
"system:authenticated"
177+
],
178+
"issuerRef": {
179+
"kind": "Issuer",
180+
"name": "letsencrypt-staging"
181+
},
182+
"request": "XXX",
183+
"username": "system:serviceaccount:cert-manager:cert-manager"
184+
}
185+
},
186+
{
187+
"apiVersion": "cert-manager.io/v1",
188+
"kind": "ClusterIssuer",
189+
"metadata": {
190+
"name": "selfsigned-issuer"
191+
},
192+
"spec": {
193+
"selfSigned": {}
194+
}
195+
},
196+
{
197+
"apiVersion": "cert-manager.io/v1",
198+
"kind": "Issuer",
199+
"metadata": {
200+
"name": "ca-issuer",
201+
"namespace": "default"
202+
},
203+
"spec": {
204+
"ca": {
205+
"secretName": "ca-root-secret"
206+
}
207+
}
208+
},
209+
{
210+
"apiVersion": "cert-manager.io/v1",
211+
"kind": "Issuer",
212+
"metadata": {
213+
"name": "letsencrypt-staging",
214+
"namespace": "default"
215+
},
216+
"spec": {
217+
"acme": {
218+
"email": "[email protected]",
219+
"privateKeySecretRef": {
220+
"name": "letsencrypt-staging"
221+
},
222+
"server": "https://acme-staging-v02.api.letsencrypt.org/directory",
223+
"solvers": [
224+
{
225+
"dns01": {
226+
"route53": {
227+
"accessKeyID": "ACCESS_KEY_ID",
228+
"hostedZoneID": "HOSTED_ZONE_ID",
229+
"region": "AWS_REGION",
230+
"secretAccessKeySecretRef": {
231+
"key": "access-key",
232+
"name": "sample-aws-secret"
233+
}
234+
}
235+
},
236+
"selector": {
237+
"dnsNames": [
238+
"sample.dns.name"
239+
]
240+
}
241+
}
242+
]
243+
}
244+
}
245+
},
246+
{
247+
"apiVersion": "operator.openshift.io/v1alpha1",
248+
"kind": "CertManager",
249+
"metadata": {
250+
"name": "cluster"
251+
},
252+
"spec": {
253+
"logLevel": "Normal",
254+
"managementState": "Managed"
255+
}
256+
},
257+
{
258+
"apiVersion": "operator.openshift.io/v1alpha1",
259+
"kind": "IstioCSR",
260+
"metadata": {
261+
"annotations": {
262+
"kubernetes.io/description": "Creating this resource requires the istio-csr tech-preview feature to be enabled, which otherwise has no effect. Please refer to the cert-manager documentation for more information on enabling the istio-csr feature. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process"
263+
},
264+
"name": "default",
265+
"namespace": "istio-csr"
266+
},
267+
"spec": {
268+
"istioCSRConfig": {
269+
"certManager": {
270+
"issuerRef": {
271+
"group": "cert-manager.io",
272+
"kind": "Issuer",
273+
"name": "istio-csr-issuer"
274+
}
275+
},
276+
"istio": {
277+
"namespace": "istio-system"
278+
},
279+
"istiodTLSConfig": {
280+
"trustDomain": "cluster.local"
281+
}
282+
}
283+
}
284+
}
285+
]
286+
capabilities: Seamless Upgrades
287+
categories: Security
288+
console.openshift.io/disable-operand-delete: "true"
289+
containerImage: registry.stage.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:4d5e238300ce6f427a1045d51d6b37a4e5c5633985208ebb44f91e7dd53897d9
290+
createdAt: 2025-07-24T02:14:55
291+
features.operators.openshift.io/cnf: "false"
292+
features.operators.openshift.io/cni: "false"
293+
features.operators.openshift.io/csi: "false"
294+
features.operators.openshift.io/disconnected: "true"
295+
features.operators.openshift.io/fips-compliant: "true"
296+
features.operators.openshift.io/proxy-aware: "true"
297+
features.operators.openshift.io/tls-profiles: "false"
298+
features.operators.openshift.io/token-auth-aws: "true"
299+
features.operators.openshift.io/token-auth-azure: "true"
300+
features.operators.openshift.io/token-auth-gcp: "true"
301+
olm.skipRange: '>=1.16.1 <1.17.0'
302+
operator.openshift.io/uninstall-message: The cert-manager Operator for Red Hat
303+
OpenShift will be removed from cert-manager-operator namespace. If your Operator
304+
configured any off-cluster resources, these will continue to run and require
305+
manual cleanup. All operands created by the operator will need to be manually
306+
cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html
307+
for additional steps.
308+
operatorframework.io/cluster-monitoring: "true"
309+
operatorframework.io/suggested-namespace: cert-manager-operator
310+
operators.openshift.io/valid-subscription: '["OpenShift Kubernetes Engine",
311+
"OpenShift Container Platform", "OpenShift Platform Plus"]'
312+
operators.operatorframework.io/builder: operator-sdk-v1.25.1
313+
operators.operatorframework.io/project_layout: go.kubebuilder.io/v3
314+
repository: https://github.com/openshift/cert-manager-operator
315+
support: Red Hat, Inc.
316+
apiServiceDefinitions: {}
317+
crdDescriptions:
318+
owned:
319+
- kind: CertificateRequest
320+
name: certificaterequests.cert-manager.io
321+
version: v1
322+
- kind: Certificate
323+
name: certificates.cert-manager.io
324+
version: v1
325+
- description: CertManager is the Schema for the certmanagers API
326+
displayName: CertManager
327+
kind: CertManager
328+
name: certmanagers.operator.openshift.io
329+
version: v1alpha1
330+
- kind: Challenge
331+
name: challenges.acme.cert-manager.io
332+
version: v1
333+
- kind: ClusterIssuer
334+
name: clusterissuers.cert-manager.io
335+
version: v1
336+
- kind: Issuer
337+
name: issuers.cert-manager.io
338+
version: v1
339+
- kind: IstioCSR
340+
name: istiocsrs.operator.openshift.io
341+
version: v1alpha1
342+
- kind: Order
343+
name: orders.acme.cert-manager.io
344+
version: v1
345+
description: |
346+
The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.17.4](https://github.com/cert-manager/cert-manager/tree/v1.17.4), which automates certificate management.
347+
For more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).
348+
displayName: cert-manager Operator for Red Hat OpenShift
349+
installModes:
350+
- supported: true
351+
type: OwnNamespace
352+
- supported: true
353+
type: SingleNamespace
354+
- supported: false
355+
type: MultiNamespace
356+
- supported: true
357+
type: AllNamespaces
358+
keywords:
359+
- cert-manager
360+
- cert-manager-operator
361+
- cert
362+
- certificates
363+
- security
364+
- TLS
365+
labels:
366+
operatorframework.io/arch.amd64: supported
367+
operatorframework.io/arch.arm64: supported
368+
operatorframework.io/arch.ppc64le: supported
369+
operatorframework.io/arch.s390x: supported
370+
operatorframework.io/os.linux: supported
371+
links:
372+
- name: Documentation
373+
url: https://github.com/openshift/cert-manager-operator/blob/master/README.md
374+
maintainers:
375+
376+
name: Red Hat Support
377+
maturity: stable
378+
minKubeVersion: 1.27.0
379+
provider:
380+
name: Red Hat
381+
relatedImages:
382+
- image: registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:9ea2c29a384b964cef14f853278821df3cd30320f25afab8823897192f67fc7e
383+
name: cert-manager-istiocsr
384+
- image: registry.stage.redhat.io/cert-manager/cert-manager-operator-bundle@sha256:e6277b0aa2ddc7d5d6f68d8c7844c5e69e3003544d942c39cfb0c8e92e64cf48
385+
name: ""
386+
- image: registry.stage.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:4d5e238300ce6f427a1045d51d6b37a4e5c5633985208ebb44f91e7dd53897d9
387+
name: ""
388+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:4f7c045819c39e176a6090efdaba6ec736edf772d88fc87dd1c6fb33d3b5b26b
389+
name: cert-manager-acmesolver
390+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:96d51e3a64bf30cbd92836c7cbd82f06edca16eef78ab1432757d34c16628659
391+
name: cert-manager-webhook
392+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:96d51e3a64bf30cbd92836c7cbd82f06edca16eef78ab1432757d34c16628659
393+
name: cert-manager-ca-injector
394+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:96d51e3a64bf30cbd92836c7cbd82f06edca16eef78ab1432757d34c16628659
395+
name: cert-manager-controller
396+
schema: olm.bundle

0 commit comments

Comments
 (0)