@@ -15,7 +15,7 @@ metadata:
1515{{- end }}
1616 annotations :
1717 {{- if .Values.certManager.enabled }}
18- {{ .Values.certManager.apiGroup }} /inject-ca-from: {{ printf "%s/%s%s" .Release.Namespace .Release.Name "-root-certificate" | quote }}
18+ cert-manager.io /inject-ca-from : {{ printf "%s/%s%s" .Release.Namespace .Release.Name "-root-certificate" | quote }}
1919 {{- end }}
2020webhooks :
2121- name : federatedtypeconfigs.core.kubefed.io
@@ -152,15 +152,15 @@ stringData:
152152 tls.key : {{ $cert.Key | quote }}
153153{{- else }}
154154---
155- apiVersion : {{ .Values.certManager.apiGroup }}/{{ .Values.certManager.apiVersion }}
155+ apiVersion : cert-manager.io/v1
156156kind : Issuer
157157metadata :
158158 name : {{ .Release.Name }}-ca-issuer
159159spec :
160160 selfSigned : {}
161161---
162162# Generate a CA Certificate used to sign certificates for the webhook
163- apiVersion : {{ .Values.certManager.apiGroup }}/{{ .Values.certManager.apiVersion }}
163+ apiVersion : cert-manager.io/v1
164164kind : Certificate
165165metadata :
166166 name : {{ .Release.Name}}-root-certificate
@@ -173,7 +173,7 @@ spec:
173173 isCA : true
174174---
175175# Create an Issuer that uses the above generated CA certificate to issue certs
176- apiVersion : {{ .Values.certManager.apiGroup }}/{{ .Values.certManager.apiVersion }}
176+ apiVersion : cert-manager.io/v1
177177kind : Issuer
178178metadata :
179179 name : {{ .Release.Name }}-issuer
@@ -182,7 +182,7 @@ spec:
182182 secretName : {{ .Release.Name}}-root-ca
183183---
184184# Finally, generate a serving certificate for the webhook to use
185- apiVersion : {{ .Values.certManager.apiGroup }}/{{ .Values.certManager.apiVersion }}
185+ apiVersion : cert-manager.io/v1
186186kind : Certificate
187187metadata :
188188 name : {{ .Release.Name }}-certificate
0 commit comments