Skip to content

Commit cb57c46

Browse files
Merge pull request #351 from swghosh/main
CM-458: Add 1.14.2 stage release bundle to catalogs v4.14-4.17
2 parents ec27705 + 86bafbb commit cb57c46

File tree

8 files changed

+635
-0
lines changed

8 files changed

+635
-0
lines changed

catalogs/v4.14/catalog/openshift-cert-manager-operator/bundle-v1.14.2.yaml

Lines changed: 88 additions & 0 deletions
Large diffs are not rendered by default.

catalogs/v4.14/catalog/openshift-cert-manager-operator/channel.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,9 @@ entries:
123123
- name: cert-manager-operator.v1.14.1
124124
replaces: cert-manager-operator.v1.14.0
125125
skipRange: '>=1.14.0 <1.14.1'
126+
- name: cert-manager-operator.v1.14.2
127+
replaces: cert-manager-operator.v1.14.1
128+
skipRange: '>=1.14.1 <1.14.2'
126129
name: stable-v1.14
127130
package: openshift-cert-manager-operator
128131
schema: olm.channel

catalogs/v4.15/catalog/openshift-cert-manager-operator/bundle-v1.14.2.yaml

Lines changed: 88 additions & 0 deletions
Large diffs are not rendered by default.

catalogs/v4.15/catalog/openshift-cert-manager-operator/channel.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ entries:
4343
- name: cert-manager-operator.v1.14.1
4444
replaces: cert-manager-operator.v1.14.0
4545
skipRange: '>=1.14.0 <1.14.1'
46+
- name: cert-manager-operator.v1.14.2
47+
replaces: cert-manager-operator.v1.14.1
48+
skipRange: '>=1.14.1 <1.14.2'
4649
name: stable-v1.14
4750
package: openshift-cert-manager-operator
4851
schema: olm.channel

catalogs/v4.16/catalog/openshift-cert-manager-operator/bundle-v1.14.2.yaml

Lines changed: 88 additions & 0 deletions
Large diffs are not rendered by default.

catalogs/v4.16/catalog/openshift-cert-manager-operator/channel.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ entries:
4343
- name: cert-manager-operator.v1.14.1
4444
replaces: cert-manager-operator.v1.14.0
4545
skipRange: '>=1.14.0 <1.14.1'
46+
- name: cert-manager-operator.v1.14.2
47+
replaces: cert-manager-operator.v1.14.1
48+
skipRange: '>=1.14.1 <1.14.2'
4649
name: stable-v1.14
4750
package: openshift-cert-manager-operator
4851
schema: olm.channel
Lines changed: 359 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,359 @@
1+
---
2+
image: registry.stage.redhat.io/cert-manager/cert-manager-operator-bundle@sha256:f813a8e9806bdd02d1a8319d8d310932dc6cd0f7af7583811c1f96e6f2ad2aa3
3+
name: cert-manager-operator.v1.14.2
4+
package: openshift-cert-manager-operator
5+
properties:
6+
- type: olm.gvk
7+
value:
8+
group: acme.cert-manager.io
9+
kind: Challenge
10+
version: v1
11+
- type: olm.gvk
12+
value:
13+
group: acme.cert-manager.io
14+
kind: Order
15+
version: v1
16+
- type: olm.gvk
17+
value:
18+
group: cert-manager.io
19+
kind: Certificate
20+
version: v1
21+
- type: olm.gvk
22+
value:
23+
group: cert-manager.io
24+
kind: CertificateRequest
25+
version: v1
26+
- type: olm.gvk
27+
value:
28+
group: cert-manager.io
29+
kind: ClusterIssuer
30+
version: v1
31+
- type: olm.gvk
32+
value:
33+
group: cert-manager.io
34+
kind: Issuer
35+
version: v1
36+
- type: olm.gvk
37+
value:
38+
group: operator.openshift.io
39+
kind: CertManager
40+
version: v1alpha1
41+
- type: olm.package
42+
value:
43+
packageName: openshift-cert-manager-operator
44+
version: 1.14.2
45+
- type: olm.csv.metadata
46+
value:
47+
annotations:
48+
alm-examples: |-
49+
[
50+
{
51+
"apiVersion": "acme.cert-manager.io/v1",
52+
"kind": "Challenge",
53+
"metadata": {
54+
"name": "tls-cert-sample",
55+
"namespace": "default"
56+
},
57+
"spec": {
58+
"authorizationURL": "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX",
59+
"dnsName": "sample.dns.name",
60+
"issuerRef": {
61+
"kind": "Issuer",
62+
"name": "letsencrypt-staging"
63+
},
64+
"key": "XXX",
65+
"solver": {
66+
"dns01": {
67+
"route53": {
68+
"accessKeyID": "XXX",
69+
"hostedZoneID": "XXX",
70+
"region": "us-east-1",
71+
"secretAccessKeySecretRef": {
72+
"key": "awsSecretAccessKey",
73+
"name": "aws-secret"
74+
}
75+
}
76+
},
77+
"selector": {
78+
"dnsNames": [
79+
"sample.dns.name"
80+
]
81+
}
82+
},
83+
"token": "XXX",
84+
"type": "DNS-01",
85+
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX",
86+
"wildcard": false
87+
}
88+
},
89+
{
90+
"apiVersion": "acme.cert-manager.io/v1",
91+
"kind": "Order",
92+
"metadata": {
93+
"annotations": {
94+
"cert-manager.io/certificate-name": "tls-cert",
95+
"cert-manager.io/certificate-revision": "1",
96+
"cert-manager.io/private-key-secret-name": "tls-cert-sample"
97+
},
98+
"name": "tls-cert-sample",
99+
"namespace": "default"
100+
},
101+
"spec": {
102+
"commonName": "sample.dns.name",
103+
"dnsNames": [
104+
"sample.dns.name"
105+
],
106+
"issuerRef": {
107+
"kind": "Issuer",
108+
"name": "letsencrypt-staging"
109+
},
110+
"request": "XXX"
111+
}
112+
},
113+
{
114+
"apiVersion": "cert-manager.io/v1",
115+
"kind": "Certificate",
116+
"metadata": {
117+
"name": "selfsigned-ca",
118+
"namespace": "default"
119+
},
120+
"spec": {
121+
"commonName": "selfsigned-ca.dns.name",
122+
"isCA": true,
123+
"issuerRef": {
124+
"group": "cert-manager.io",
125+
"kind": "ClusterIssuer",
126+
"name": "selfsigned-issuer"
127+
},
128+
"privateKey": {
129+
"algorithm": "ECDSA",
130+
"size": 256
131+
},
132+
"secretName": "ca-root-secret"
133+
}
134+
},
135+
{
136+
"apiVersion": "cert-manager.io/v1",
137+
"kind": "Certificate",
138+
"metadata": {
139+
"name": "tls-cert",
140+
"namespace": "default"
141+
},
142+
"spec": {
143+
"commonName": "sample.dns.name",
144+
"dnsNames": [
145+
"sample.dns.name"
146+
],
147+
"isCA": false,
148+
"issuerRef": {
149+
"kind": "Issuer",
150+
"name": "letsencrypt-staging"
151+
},
152+
"secretName": "tls-cert"
153+
}
154+
},
155+
{
156+
"apiVersion": "cert-manager.io/v1",
157+
"kind": "CertificateRequest",
158+
"metadata": {
159+
"annotations": {
160+
"cert-manager.io/certificate-name": "tls-cert",
161+
"cert-manager.io/certificate-revision": "1",
162+
"cert-manager.io/private-key-secret-name": "tls-cert-sample"
163+
},
164+
"name": "tls-cert-sample",
165+
"namespace": "default"
166+
},
167+
"spec": {
168+
"groups": [
169+
"system:serviceaccounts",
170+
"system:serviceaccounts:cert-manager",
171+
"system:authenticated"
172+
],
173+
"issuerRef": {
174+
"kind": "Issuer",
175+
"name": "letsencrypt-staging"
176+
},
177+
"request": "XXX",
178+
"username": "system:serviceaccount:cert-manager:cert-manager"
179+
}
180+
},
181+
{
182+
"apiVersion": "cert-manager.io/v1",
183+
"kind": "ClusterIssuer",
184+
"metadata": {
185+
"name": "selfsigned-issuer"
186+
},
187+
"spec": {
188+
"selfSigned": {}
189+
}
190+
},
191+
{
192+
"apiVersion": "cert-manager.io/v1",
193+
"kind": "Issuer",
194+
"metadata": {
195+
"name": "ca-issuer",
196+
"namespace": "default"
197+
},
198+
"spec": {
199+
"ca": {
200+
"secretName": "ca-root-secret"
201+
}
202+
}
203+
},
204+
{
205+
"apiVersion": "cert-manager.io/v1",
206+
"kind": "Issuer",
207+
"metadata": {
208+
"name": "letsencrypt-staging",
209+
"namespace": "default"
210+
},
211+
"spec": {
212+
"acme": {
213+
"email": "[email protected]",
214+
"privateKeySecretRef": {
215+
"name": "letsencrypt-staging"
216+
},
217+
"server": "https://acme-staging-v02.api.letsencrypt.org/directory",
218+
"solvers": [
219+
{
220+
"dns01": {
221+
"route53": {
222+
"accessKeyID": "ACCESS_KEY_ID",
223+
"hostedZoneID": "HOSTED_ZONE_ID",
224+
"region": "AWS_REGION",
225+
"secretAccessKeySecretRef": {
226+
"key": "access-key",
227+
"name": "sample-aws-secret"
228+
}
229+
}
230+
},
231+
"selector": {
232+
"dnsNames": [
233+
"sample.dns.name"
234+
]
235+
}
236+
}
237+
]
238+
}
239+
}
240+
},
241+
{
242+
"apiVersion": "operator.openshift.io/v1alpha1",
243+
"kind": "CertManager",
244+
"metadata": {
245+
"name": "cluster"
246+
},
247+
"spec": {
248+
"logLevel": "Normal",
249+
"managementState": "Managed"
250+
}
251+
}
252+
]
253+
capabilities: Seamless Upgrades
254+
categories: Security
255+
console.openshift.io/disable-operand-delete: "true"
256+
containerImage: registry.stage.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:5c593bfd70309f87cd05716e233e65aa55394eafcdaf85f178698912cb29d79d
257+
createdAt: 2025-04-08T08:00:54
258+
features.operators.openshift.io/cnf: "false"
259+
features.operators.openshift.io/cni: "false"
260+
features.operators.openshift.io/csi: "false"
261+
features.operators.openshift.io/disconnected: "false"
262+
features.operators.openshift.io/fips-compliant: "true"
263+
features.operators.openshift.io/proxy-aware: "true"
264+
features.operators.openshift.io/tls-profiles: "false"
265+
features.operators.openshift.io/token-auth-aws: "true"
266+
features.operators.openshift.io/token-auth-azure: "true"
267+
features.operators.openshift.io/token-auth-gcp: "true"
268+
olm.skipRange: '>=1.14.1 <1.14.2'
269+
operator.openshift.io/uninstall-message: The cert-manager Operator for Red Hat
270+
OpenShift will be removed from cert-manager-operator namespace. If your Operator
271+
configured any off-cluster resources, these will continue to run and require
272+
manual cleanup. All operands created by the operator will need to be manually
273+
cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html
274+
for additional steps.
275+
operatorframework.io/cluster-monitoring: "true"
276+
operatorframework.io/suggested-namespace: cert-manager-operator
277+
operators.openshift.io/infrastructure-features: '["proxy-aware"]'
278+
operators.openshift.io/valid-subscription: '["OpenShift Kubernetes Engine",
279+
"OpenShift Container Platform", "OpenShift Platform Plus"]'
280+
operators.operatorframework.io/builder: operator-sdk-v1.25.1
281+
operators.operatorframework.io/project_layout: go.kubebuilder.io/v3
282+
repository: https://github.com/openshift/cert-manager-operator
283+
support: Red Hat, Inc.
284+
apiServiceDefinitions: {}
285+
crdDescriptions:
286+
owned:
287+
- kind: CertificateRequest
288+
name: certificaterequests.cert-manager.io
289+
version: v1
290+
- kind: Certificate
291+
name: certificates.cert-manager.io
292+
version: v1
293+
- description: CertManager is the Schema for the certmanagers API
294+
displayName: CertManager
295+
kind: CertManager
296+
name: certmanagers.operator.openshift.io
297+
version: v1alpha1
298+
- kind: Challenge
299+
name: challenges.acme.cert-manager.io
300+
version: v1
301+
- kind: ClusterIssuer
302+
name: clusterissuers.cert-manager.io
303+
version: v1
304+
- kind: Issuer
305+
name: issuers.cert-manager.io
306+
version: v1
307+
- kind: Order
308+
name: orders.acme.cert-manager.io
309+
version: v1
310+
description: |
311+
The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.14.7](https://github.com/cert-manager/cert-manager/tree/v1.14.7), which automates certificate management.
312+
For more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).
313+
displayName: cert-manager Operator for Red Hat OpenShift
314+
installModes:
315+
- supported: true
316+
type: OwnNamespace
317+
- supported: true
318+
type: SingleNamespace
319+
- supported: false
320+
type: MultiNamespace
321+
- supported: false
322+
type: AllNamespaces
323+
keywords:
324+
- cert-manager
325+
- cert-manager-operator
326+
- cert
327+
- certificates
328+
- security
329+
- TLS
330+
labels:
331+
operatorframework.io/arch.amd64: supported
332+
operatorframework.io/arch.arm64: supported
333+
operatorframework.io/arch.ppc64le: supported
334+
operatorframework.io/arch.s390x: supported
335+
operatorframework.io/os.linux: supported
336+
links:
337+
- name: Documentation
338+
url: https://github.com/openshift/cert-manager-operator/blob/master/README.md
339+
maintainers:
340+
341+
name: Red Hat Support
342+
maturity: stable
343+
minKubeVersion: 1.25.0
344+
provider:
345+
name: Red Hat
346+
relatedImages:
347+
- image: registry.stage.redhat.io/cert-manager/cert-manager-operator-bundle@sha256:f813a8e9806bdd02d1a8319d8d310932dc6cd0f7af7583811c1f96e6f2ad2aa3
348+
name: ""
349+
- image: registry.stage.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:5c593bfd70309f87cd05716e233e65aa55394eafcdaf85f178698912cb29d79d
350+
name: ""
351+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:49fb8f710319d6f3479b98d2c5dd7d0c9df8c1678b2c00727314dea1a8e933a1
352+
name: cert-manager-acmesolver
353+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5df082f8e3787e6ac2edf395113806999ae192425ce18b4ddba9ab20c135fa5b
354+
name: cert-manager-webhook
355+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5df082f8e3787e6ac2edf395113806999ae192425ce18b4ddba9ab20c135fa5b
356+
name: cert-manager-ca-injector
357+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:5df082f8e3787e6ac2edf395113806999ae192425ce18b4ddba9ab20c135fa5b
358+
name: cert-manager-controller
359+
schema: olm.bundle

catalogs/v4.17/catalog/openshift-cert-manager-operator/channel.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,9 @@ entries:
2323
- name: cert-manager-operator.v1.14.1
2424
replaces: cert-manager-operator.v1.14.0
2525
skipRange: '>=1.14.0 <1.14.1'
26+
- name: cert-manager-operator.v1.14.2
27+
replaces: cert-manager-operator.v1.14.1
28+
skipRange: '>=1.14.1 <1.14.2'
2629
name: stable-v1.14
2730
package: openshift-cert-manager-operator
2831
schema: olm.channel

0 commit comments

Comments
 (0)