diff --git a/README.md b/README.md index 83ebe80a..94d3ed0c 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ ## Installation -Please [review the documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/) for the agent. +Please [review the documentation](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-tlspk-agent-overview/) for the agent. Detailed installation instructions are available for a variety of methods. diff --git a/RELEASE.md b/RELEASE.md index 6cce6548..d386a0a7 100644 --- a/RELEASE.md +++ b/RELEASE.md @@ -68,7 +68,7 @@ The release process is semi-automated. or `venctl generate`. 9. Inform Michael McLoughlin of the new release so he can update the - documentation at . + documentation at . [tests-workflow]: https://github.com/jetstack/jetstack-secure/actions/workflows/tests.yaml?query=branch%3Amaster diff --git a/deploy/charts/venafi-kubernetes-agent/Chart.yaml b/deploy/charts/venafi-kubernetes-agent/Chart.yaml index 45efd93a..706283ed 100644 --- a/deploy/charts/venafi-kubernetes-agent/Chart.yaml +++ b/deploy/charts/venafi-kubernetes-agent/Chart.yaml @@ -6,9 +6,9 @@ description: |- The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberArk Certificate Manager. maintainers: - - name: Venafi - email: support@venafi.cloud - url: https://venafi.com + - name: CyberArk + email: mis.support@cyberark.com + url: https://www.cyberark.com sources: - https://github.com/jetstack/jetstack-secure diff --git a/deploy/charts/venafi-kubernetes-agent/README.md b/deploy/charts/venafi-kubernetes-agent/README.md index 25259e3f..b99f89be 100644 --- a/deploy/charts/venafi-kubernetes-agent/README.md +++ b/deploy/charts/venafi-kubernetes-agent/README.md @@ -4,9 +4,9 @@ The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberAr You will require a CyberArk Certificate Manager account to connect your cluster. If you do not have one, you can sign up for a free trial now at: -- https://venafi.com/try-venafi/tls-protect/ +- https://www.cyberark.com/try-buy/certificate-manager-saas-trial/ -> 📖 Read the [Discovery Agent documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/), +> 📖 Read the [Discovery Agent documentation](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-tlspk-agent-overview/), > to learn how install and configure this Helm chart. ## Values @@ -226,7 +226,7 @@ Add Container specific SecurityContext settings to the container. Takes preceden Set resource requests and limits for the pod. -Read [Venafi Kubernetes components deployment best practices](https://docs.venafi.cloud/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits. +Read [Venafi Kubernetes components deployment best practices](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits. #### **nodeSelector** ~ `object` > Default value: @@ -343,7 +343,7 @@ Configure VenafiConnection authentication > false > ``` -When set to true, the Discovery Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the +When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the Discovery Agent Pod. #### **authentication.venafiConnection.name** ~ `string` > Default value: diff --git a/deploy/charts/venafi-kubernetes-agent/tests/deployment_test.yaml b/deploy/charts/venafi-kubernetes-agent/tests/deployment_test.yaml index 73418755..e44e5bcc 100644 --- a/deploy/charts/venafi-kubernetes-agent/tests/deployment_test.yaml +++ b/deploy/charts/venafi-kubernetes-agent/tests/deployment_test.yaml @@ -101,7 +101,7 @@ tests: path: ca-certificates.crt # Check proxy settings are additive not overriding and set to correct values. - # Values from our documentation: https://docs.venafi.cloud/vaas/k8s-components/c-vcp-network-requirements/#modifying-network-settings-for-kubernetes + # Values from our documentation: https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-vcp-network-requirements/#modifying-network-settings-for-kubernetes - it: All environment variables present when all proxy settings are supplied set: http_proxy: "http://:" diff --git a/deploy/charts/venafi-kubernetes-agent/values.schema.json b/deploy/charts/venafi-kubernetes-agent/values.schema.json index 876f4b5c..0b4076c7 100644 --- a/deploy/charts/venafi-kubernetes-agent/values.schema.json +++ b/deploy/charts/venafi-kubernetes-agent/values.schema.json @@ -131,7 +131,7 @@ }, "helm-values.authentication.venafiConnection.enabled": { "default": false, - "description": "When set to true, the Discovery Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the\nDiscovery Agent Pod.", + "description": "When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the\nDiscovery Agent Pod.", "type": "boolean" }, "helm-values.authentication.venafiConnection.name": { @@ -525,7 +525,7 @@ "memory": "200Mi" } }, - "description": "Set resource requests and limits for the pod.\n\nRead [Venafi Kubernetes components deployment best practices](https://docs.venafi.cloud/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.", + "description": "Set resource requests and limits for the pod.\n\nRead [Venafi Kubernetes components deployment best practices](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.", "type": "object" }, "helm-values.securityContext": { diff --git a/deploy/charts/venafi-kubernetes-agent/values.yaml b/deploy/charts/venafi-kubernetes-agent/values.yaml index 75010de4..a2eaaec6 100644 --- a/deploy/charts/venafi-kubernetes-agent/values.yaml +++ b/deploy/charts/venafi-kubernetes-agent/values.yaml @@ -124,7 +124,7 @@ securityContext: # Set resource requests and limits for the pod. # # Read [Venafi Kubernetes components deployment best -# practices](https://docs.venafi.cloud/vaas/k8s-components/c-k8s-components-best-practice/#scaling) +# practices](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-k8s-components-best-practice/#scaling) # to learn how to choose suitable CPU and memory resource requests and limits. # +docs:property resources: @@ -200,9 +200,9 @@ authentication: # +docs:section=Venafi Connection # Configure VenafiConnection authentication venafiConnection: - # When set to true, the Discovery Agent will authenticate to - # Venafi using the configuration in a VenafiConnection resource. - # Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). + # When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager + # using the configuration in a VenafiConnection resource. + # Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-install-tlspk-agent/). # When set to true, the `authentication.secret` values will be ignored and the # Secret with `authentication.secretName` will _not_ be mounted into the # Discovery Agent Pod. @@ -239,7 +239,7 @@ config: # API server by omitting various common Secret types when listing Secrets. # These Secret types will be added to a "type!=" field selector in the # agent config. - # * https://docs.venafi.cloud/vaas/k8s-components/t-cfg-tlspk-agent/#configuration + # * https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-cfg-tlspk-agent/#configuration # * https://kubernetes.io/docs/concepts/configuration/secret/#secret-types # * https://kubernetes.io/docs/concepts/overview/working-with-objects/field-selectors/#list-of-supported-fields ignoredSecretTypes: diff --git a/hack/e2e/test.sh b/hack/e2e/test.sh index dbf2195d..c76a2bae 100755 --- a/hack/e2e/test.sh +++ b/hack/e2e/test.sh @@ -10,7 +10,7 @@ # # Prerequisites: # * kubectl: https://kubernetes.io/docs/tasks/tools/#kubectl -# * venctl: https://docs.venafi.cloud/vaas/venctl/t-venctl-install/ +# * venctl: https://docs.cyberark.com/mis-saas/vaas/venctl/t-venctl-install/ # * jq: https://jqlang.github.io/jq/download/ # * step: https://smallstep.com/docs/step-cli/installation/ # * curl: https://www.man7.org/linux/man-pages/man1/curl.1.html diff --git a/make/00_mod.mk b/make/00_mod.mk index df1a1353..25dd3526 100644 --- a/make/00_mod.mk +++ b/make/00_mod.mk @@ -35,11 +35,11 @@ oci_preflight_image_name_development := jetstack.local/venafi-agent oci_preflight_build_args := \ --image-annotation="org.opencontainers.image.vendor"="CyberArk Software Ltd." \ --image-annotation="org.opencontainers.image.licenses"="EULA - https://www.cyberark.com/contract-terms/" \ - --image-annotation="org.opencontainers.image.authors"="support@venafi.cloud" \ - --image-annotation="org.opencontainers.image.title"="Venafi Kubernetes Agent" \ + --image-annotation="org.opencontainers.image.authors"="support@cyberark.com" \ + --image-annotation="org.opencontainers.image.title"="Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments" \ --image-annotation="org.opencontainers.image.description"="Gathers machine identity data from Kubernetes clusters." \ --image-annotation="org.opencontainers.image.url"="https://www.cyberark.com/products/certificate-manager-for-kubernetes/" \ - --image-annotation="org.opencontainers.image.documentation"="https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/" \ + --image-annotation="org.opencontainers.image.documentation"="https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-tlspk-agent-overview/" \ --image-annotation="org.opencontainers.image.version"="$(VERSION)" \ --image-annotation="org.opencontainers.image.revision"="$(GITCOMMIT)" diff --git a/make/02_mod.mk b/make/02_mod.mk index 12760fa0..17ca723b 100644 --- a/make/02_mod.mk +++ b/make/02_mod.mk @@ -76,7 +76,7 @@ helm-plugins: $(NEEDS_HELM) echo "helm-diff plugin already installed"; \ fi -# https://docs.venafi.cloud/vaas/venctl/c-venctl-releases/ +# https://docs.cyberark.com/mis-saas/vaas/venctl/c-venctl-releases/ venctl_linux_amd64_SHA256SUM=26e7b7a7e134f1cf1f3ffacf4ae53ec6849058db5007ce4088d51f404ededb4a venctl_darwin_amd64_SHA256SUM=2e76693901abcb2c018f66d3a10558c66ca09d1a3be912258bcd6c58e89aae80 venctl_darwin_arm64_SHA256SUM=4350912d67683773302655e2a0151320514d1ccf82ee99c895e6780f86b6f031