Skip to content

Commit eccab71

Browse files
committed
Add bundle-v1.16.0 with stage cert-manager-operator-bundle
OPERATOR_BUNDLE_IMAGE=registry.stage.redhat.io/cert-manager/cert-manager-operator-bundle@sha256:d15f49b7293bd4b56c3727282647e4c7ef3adfb4dcac3f0575b96f9b945406ec * make update-catalog CATALOG_DIR=catalogs/v4./catalog BUNDLE_FILE_NAME=bundle-v1.16.0.yaml REPLICATE_BUNDLE_FILE_IN_CATALOGS=no USE_MIGRATE_LEVEL_FLAG=yes * make update-catalog CATALOG_DIR=catalogs/v4./catalog BUNDLE_FILE_NAME=bundle-v1.16.0.yaml REPLICATE_BUNDLE_FILE_IN_CATALOGS=no USE_MIGRATE_LEVEL_FLAG=yes Signed-off-by: Swarup Ghosh <[email protected]>
1 parent 2f98baf commit eccab71

File tree

6 files changed

+1482
-0
lines changed

6 files changed

+1482
-0
lines changed

catalogs/v4.14/catalog/openshift-cert-manager-operator/bundle-v1.16.0.yaml

Lines changed: 98 additions & 0 deletions
Large diffs are not rendered by default.

catalogs/v4.15/catalog/openshift-cert-manager-operator/bundle-v1.16.0.yaml

Lines changed: 98 additions & 0 deletions
Large diffs are not rendered by default.

catalogs/v4.16/catalog/openshift-cert-manager-operator/bundle-v1.16.0.yaml

Lines changed: 98 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 396 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,396 @@
1+
---
2+
image: registry.stage.redhat.io/cert-manager/cert-manager-operator-bundle@sha256:d15f49b7293bd4b56c3727282647e4c7ef3adfb4dcac3f0575b96f9b945406ec
3+
name: cert-manager-operator.v1.16.0
4+
package: openshift-cert-manager-operator
5+
properties:
6+
- type: olm.gvk
7+
value:
8+
group: acme.cert-manager.io
9+
kind: Challenge
10+
version: v1
11+
- type: olm.gvk
12+
value:
13+
group: acme.cert-manager.io
14+
kind: Order
15+
version: v1
16+
- type: olm.gvk
17+
value:
18+
group: cert-manager.io
19+
kind: Certificate
20+
version: v1
21+
- type: olm.gvk
22+
value:
23+
group: cert-manager.io
24+
kind: CertificateRequest
25+
version: v1
26+
- type: olm.gvk
27+
value:
28+
group: cert-manager.io
29+
kind: ClusterIssuer
30+
version: v1
31+
- type: olm.gvk
32+
value:
33+
group: cert-manager.io
34+
kind: Issuer
35+
version: v1
36+
- type: olm.gvk
37+
value:
38+
group: operator.openshift.io
39+
kind: CertManager
40+
version: v1alpha1
41+
- type: olm.gvk
42+
value:
43+
group: operator.openshift.io
44+
kind: IstioCSR
45+
version: v1alpha1
46+
- type: olm.package
47+
value:
48+
packageName: openshift-cert-manager-operator
49+
version: 1.16.0
50+
- type: olm.csv.metadata
51+
value:
52+
annotations:
53+
alm-examples: |-
54+
[
55+
{
56+
"apiVersion": "acme.cert-manager.io/v1",
57+
"kind": "Challenge",
58+
"metadata": {
59+
"name": "tls-cert-sample",
60+
"namespace": "default"
61+
},
62+
"spec": {
63+
"authorizationURL": "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX",
64+
"dnsName": "sample.dns.name",
65+
"issuerRef": {
66+
"kind": "Issuer",
67+
"name": "letsencrypt-staging"
68+
},
69+
"key": "XXX",
70+
"solver": {
71+
"dns01": {
72+
"route53": {
73+
"accessKeyID": "XXX",
74+
"hostedZoneID": "XXX",
75+
"region": "us-east-1",
76+
"secretAccessKeySecretRef": {
77+
"key": "awsSecretAccessKey",
78+
"name": "aws-secret"
79+
}
80+
}
81+
},
82+
"selector": {
83+
"dnsNames": [
84+
"sample.dns.name"
85+
]
86+
}
87+
},
88+
"token": "XXX",
89+
"type": "DNS-01",
90+
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX",
91+
"wildcard": false
92+
}
93+
},
94+
{
95+
"apiVersion": "acme.cert-manager.io/v1",
96+
"kind": "Order",
97+
"metadata": {
98+
"annotations": {
99+
"cert-manager.io/certificate-name": "tls-cert",
100+
"cert-manager.io/certificate-revision": "1",
101+
"cert-manager.io/private-key-secret-name": "tls-cert-sample"
102+
},
103+
"name": "tls-cert-sample",
104+
"namespace": "default"
105+
},
106+
"spec": {
107+
"commonName": "sample.dns.name",
108+
"dnsNames": [
109+
"sample.dns.name"
110+
],
111+
"issuerRef": {
112+
"kind": "Issuer",
113+
"name": "letsencrypt-staging"
114+
},
115+
"request": "XXX"
116+
}
117+
},
118+
{
119+
"apiVersion": "cert-manager.io/v1",
120+
"kind": "Certificate",
121+
"metadata": {
122+
"name": "selfsigned-ca",
123+
"namespace": "default"
124+
},
125+
"spec": {
126+
"commonName": "selfsigned-ca.dns.name",
127+
"isCA": true,
128+
"issuerRef": {
129+
"group": "cert-manager.io",
130+
"kind": "ClusterIssuer",
131+
"name": "selfsigned-issuer"
132+
},
133+
"privateKey": {
134+
"algorithm": "ECDSA",
135+
"size": 256
136+
},
137+
"secretName": "ca-root-secret"
138+
}
139+
},
140+
{
141+
"apiVersion": "cert-manager.io/v1",
142+
"kind": "Certificate",
143+
"metadata": {
144+
"name": "tls-cert",
145+
"namespace": "default"
146+
},
147+
"spec": {
148+
"commonName": "sample.dns.name",
149+
"dnsNames": [
150+
"sample.dns.name"
151+
],
152+
"isCA": false,
153+
"issuerRef": {
154+
"kind": "Issuer",
155+
"name": "letsencrypt-staging"
156+
},
157+
"secretName": "tls-cert"
158+
}
159+
},
160+
{
161+
"apiVersion": "cert-manager.io/v1",
162+
"kind": "CertificateRequest",
163+
"metadata": {
164+
"annotations": {
165+
"cert-manager.io/certificate-name": "tls-cert",
166+
"cert-manager.io/certificate-revision": "1",
167+
"cert-manager.io/private-key-secret-name": "tls-cert-sample"
168+
},
169+
"name": "tls-cert-sample",
170+
"namespace": "default"
171+
},
172+
"spec": {
173+
"groups": [
174+
"system:serviceaccounts",
175+
"system:serviceaccounts:cert-manager",
176+
"system:authenticated"
177+
],
178+
"issuerRef": {
179+
"kind": "Issuer",
180+
"name": "letsencrypt-staging"
181+
},
182+
"request": "XXX",
183+
"username": "system:serviceaccount:cert-manager:cert-manager"
184+
}
185+
},
186+
{
187+
"apiVersion": "cert-manager.io/v1",
188+
"kind": "ClusterIssuer",
189+
"metadata": {
190+
"name": "selfsigned-issuer"
191+
},
192+
"spec": {
193+
"selfSigned": {}
194+
}
195+
},
196+
{
197+
"apiVersion": "cert-manager.io/v1",
198+
"kind": "Issuer",
199+
"metadata": {
200+
"name": "ca-issuer",
201+
"namespace": "default"
202+
},
203+
"spec": {
204+
"ca": {
205+
"secretName": "ca-root-secret"
206+
}
207+
}
208+
},
209+
{
210+
"apiVersion": "cert-manager.io/v1",
211+
"kind": "Issuer",
212+
"metadata": {
213+
"name": "letsencrypt-staging",
214+
"namespace": "default"
215+
},
216+
"spec": {
217+
"acme": {
218+
"email": "[email protected]",
219+
"privateKeySecretRef": {
220+
"name": "letsencrypt-staging"
221+
},
222+
"server": "https://acme-staging-v02.api.letsencrypt.org/directory",
223+
"solvers": [
224+
{
225+
"dns01": {
226+
"route53": {
227+
"accessKeyID": "ACCESS_KEY_ID",
228+
"hostedZoneID": "HOSTED_ZONE_ID",
229+
"region": "AWS_REGION",
230+
"secretAccessKeySecretRef": {
231+
"key": "access-key",
232+
"name": "sample-aws-secret"
233+
}
234+
}
235+
},
236+
"selector": {
237+
"dnsNames": [
238+
"sample.dns.name"
239+
]
240+
}
241+
}
242+
]
243+
}
244+
}
245+
},
246+
{
247+
"apiVersion": "operator.openshift.io/v1alpha1",
248+
"kind": "CertManager",
249+
"metadata": {
250+
"name": "cluster"
251+
},
252+
"spec": {
253+
"logLevel": "Normal",
254+
"managementState": "Managed"
255+
}
256+
},
257+
{
258+
"apiVersion": "operator.openshift.io/v1alpha1",
259+
"kind": "IstioCSR",
260+
"metadata": {
261+
"annotations": {
262+
"kubernetes.io/description": "Creating this resource requires the istio-csr tech-preview feature to be enabled, which otherwise has no effect. Please refer to the cert-manager documentation for more information on enabling the istio-csr feature. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process"
263+
},
264+
"name": "default",
265+
"namespace": "istio-csr"
266+
},
267+
"spec": {
268+
"istioCSRConfig": {
269+
"certManager": {
270+
"issuerRef": {
271+
"group": "cert-manager.io",
272+
"kind": "Issuer",
273+
"name": "istio-csr-issuer"
274+
}
275+
},
276+
"istio": {
277+
"namespace": "istio-system"
278+
},
279+
"istiodTLSConfig": {
280+
"trustDomain": "cluster.local"
281+
}
282+
}
283+
}
284+
}
285+
]
286+
capabilities: Seamless Upgrades
287+
categories: Security
288+
console.openshift.io/disable-operand-delete: "true"
289+
containerImage: registry.stage.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:e26f59e17a1d652734db9251879438b5f7eb52545f8dfd470f2b5d855a4958a5
290+
createdAt: 2025-05-15T11:25:20
291+
features.operators.openshift.io/cnf: "false"
292+
features.operators.openshift.io/cni: "false"
293+
features.operators.openshift.io/csi: "false"
294+
features.operators.openshift.io/disconnected: "true"
295+
features.operators.openshift.io/fips-compliant: "true"
296+
features.operators.openshift.io/proxy-aware: "true"
297+
features.operators.openshift.io/tls-profiles: "false"
298+
features.operators.openshift.io/token-auth-aws: "true"
299+
features.operators.openshift.io/token-auth-azure: "true"
300+
features.operators.openshift.io/token-auth-gcp: "true"
301+
olm.skipRange: '>=1.15.1 <1.16.0'
302+
operator.openshift.io/uninstall-message: The cert-manager Operator for Red Hat
303+
OpenShift will be removed from cert-manager-operator namespace. If your Operator
304+
configured any off-cluster resources, these will continue to run and require
305+
manual cleanup. All operands created by the operator will need to be manually
306+
cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html
307+
for additional steps.
308+
operatorframework.io/cluster-monitoring: "true"
309+
operatorframework.io/suggested-namespace: cert-manager-operator
310+
operators.openshift.io/valid-subscription: '["OpenShift Kubernetes Engine",
311+
"OpenShift Container Platform", "OpenShift Platform Plus"]'
312+
operators.operatorframework.io/builder: operator-sdk-v1.25.1
313+
operators.operatorframework.io/project_layout: go.kubebuilder.io/v3
314+
repository: https://github.com/openshift/cert-manager-operator
315+
support: Red Hat, Inc.
316+
apiServiceDefinitions: {}
317+
crdDescriptions:
318+
owned:
319+
- kind: CertificateRequest
320+
name: certificaterequests.cert-manager.io
321+
version: v1
322+
- kind: Certificate
323+
name: certificates.cert-manager.io
324+
version: v1
325+
- description: CertManager is the Schema for the certmanagers API
326+
displayName: CertManager
327+
kind: CertManager
328+
name: certmanagers.operator.openshift.io
329+
version: v1alpha1
330+
- kind: Challenge
331+
name: challenges.acme.cert-manager.io
332+
version: v1
333+
- kind: ClusterIssuer
334+
name: clusterissuers.cert-manager.io
335+
version: v1
336+
- kind: Issuer
337+
name: issuers.cert-manager.io
338+
version: v1
339+
- kind: IstioCSR
340+
name: istiocsrs.operator.openshift.io
341+
version: v1alpha1
342+
- kind: Order
343+
name: orders.acme.cert-manager.io
344+
version: v1
345+
description: |
346+
The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.16.4](https://github.com/cert-manager/cert-manager/tree/v1.16.4), which automates certificate management.
347+
For more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).
348+
displayName: cert-manager Operator for Red Hat OpenShift
349+
installModes:
350+
- supported: true
351+
type: OwnNamespace
352+
- supported: true
353+
type: SingleNamespace
354+
- supported: false
355+
type: MultiNamespace
356+
- supported: true
357+
type: AllNamespaces
358+
keywords:
359+
- cert-manager
360+
- cert-manager-operator
361+
- cert
362+
- certificates
363+
- security
364+
- TLS
365+
labels:
366+
operatorframework.io/arch.amd64: supported
367+
operatorframework.io/arch.arm64: supported
368+
operatorframework.io/arch.ppc64le: supported
369+
operatorframework.io/arch.s390x: supported
370+
operatorframework.io/os.linux: supported
371+
links:
372+
- name: Documentation
373+
url: https://github.com/openshift/cert-manager-operator/blob/master/README.md
374+
maintainers:
375+
376+
name: Red Hat Support
377+
maturity: stable
378+
minKubeVersion: 1.25.0
379+
provider:
380+
name: Red Hat
381+
relatedImages:
382+
- image: registry.stage.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:9ea2c29a384b964cef14f853278821df3cd30320f25afab8823897192f67fc7e
383+
name: cert-manager-istiocsr
384+
- image: registry.stage.redhat.io/cert-manager/cert-manager-operator-bundle@sha256:d15f49b7293bd4b56c3727282647e4c7ef3adfb4dcac3f0575b96f9b945406ec
385+
name: ""
386+
- image: registry.stage.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:e26f59e17a1d652734db9251879438b5f7eb52545f8dfd470f2b5d855a4958a5
387+
name: ""
388+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:438d487c6b644319094f92250d43e0becf1bd0cc4b7d2864f4de72bacd1b9daf
389+
name: cert-manager-acmesolver
390+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:408a5c91e6066d33801456db5b0c214095ab7e47a0af1dcb91b5c88bfbcca4d4
391+
name: cert-manager-webhook
392+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:408a5c91e6066d33801456db5b0c214095ab7e47a0af1dcb91b5c88bfbcca4d4
393+
name: cert-manager-ca-injector
394+
- image: registry.stage.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:408a5c91e6066d33801456db5b0c214095ab7e47a0af1dcb91b5c88bfbcca4d4
395+
name: cert-manager-controller
396+
schema: olm.bundle

0 commit comments

Comments
 (0)