Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

## Installation

Please [review the documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/) for the agent.
Please [review the documentation](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-tlspk-agent-overview/) for the agent.

Detailed installation instructions are available for a variety of methods.

Expand Down
2 changes: 1 addition & 1 deletion RELEASE.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ The release process is semi-automated.
or `venctl generate`.

9. Inform Michael McLoughlin of the new release so he can update the
documentation at <https://docs.venafi.cloud/>.
documentation at <https://docs.cyberark.com/>.

[tests-workflow]: https://github.com/jetstack/jetstack-secure/actions/workflows/tests.yaml?query=branch%3Amaster

Expand Down
6 changes: 3 additions & 3 deletions deploy/charts/venafi-kubernetes-agent/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,9 @@ description: |-
The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberArk Certificate Manager.

maintainers:
- name: Venafi
email: support@venafi.cloud
url: https://venafi.com
- name: CyberArk
email: mis.support@cyberark.com
url: https://www.cyberark.com

sources:
- https://github.com/jetstack/jetstack-secure
Expand Down
8 changes: 4 additions & 4 deletions deploy/charts/venafi-kubernetes-agent/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,9 @@ The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberAr
You will require a CyberArk Certificate Manager account to connect your cluster.
If you do not have one, you can sign up for a free trial now at:

- https://venafi.com/try-venafi/tls-protect/
- https://www.cyberark.com/try-buy/certificate-manager-saas-trial/

> 📖 Read the [Discovery Agent documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/),
> 📖 Read the [Discovery Agent documentation](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-tlspk-agent-overview/),
> to learn how install and configure this Helm chart.

## Values
Expand Down Expand Up @@ -226,7 +226,7 @@ Add Container specific SecurityContext settings to the container. Takes preceden

Set resource requests and limits for the pod.

Read [Venafi Kubernetes components deployment best practices](https://docs.venafi.cloud/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.
Read [Venafi Kubernetes components deployment best practices](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.

#### **nodeSelector** ~ `object`
> Default value:
Expand Down Expand Up @@ -343,7 +343,7 @@ Configure VenafiConnection authentication
> false
> ```

When set to true, the Discovery Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the
When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the
Discovery Agent Pod.
#### **authentication.venafiConnection.name** ~ `string`
> Default value:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ tests:
path: ca-certificates.crt

# Check proxy settings are additive not overriding and set to correct values.
# Values from our documentation: https://docs.venafi.cloud/vaas/k8s-components/c-vcp-network-requirements/#modifying-network-settings-for-kubernetes
# Values from our documentation: https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-vcp-network-requirements/#modifying-network-settings-for-kubernetes
- it: All environment variables present when all proxy settings are supplied
set:
http_proxy: "http://<proxy server>:<port>"
Expand Down
4 changes: 2 additions & 2 deletions deploy/charts/venafi-kubernetes-agent/values.schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -131,7 +131,7 @@
},
"helm-values.authentication.venafiConnection.enabled": {
"default": false,
"description": "When set to true, the Discovery Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the\nDiscovery Agent Pod.",
"description": "When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the\nDiscovery Agent Pod.",
"type": "boolean"
},
"helm-values.authentication.venafiConnection.name": {
Expand Down Expand Up @@ -525,7 +525,7 @@
"memory": "200Mi"
}
},
"description": "Set resource requests and limits for the pod.\n\nRead [Venafi Kubernetes components deployment best practices](https://docs.venafi.cloud/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.",
"description": "Set resource requests and limits for the pod.\n\nRead [Venafi Kubernetes components deployment best practices](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.",
"type": "object"
},
"helm-values.securityContext": {
Expand Down
10 changes: 5 additions & 5 deletions deploy/charts/venafi-kubernetes-agent/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -124,7 +124,7 @@ securityContext:
# Set resource requests and limits for the pod.
#
# Read [Venafi Kubernetes components deployment best
# practices](https://docs.venafi.cloud/vaas/k8s-components/c-k8s-components-best-practice/#scaling)
# practices](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-k8s-components-best-practice/#scaling)
# to learn how to choose suitable CPU and memory resource requests and limits.
# +docs:property
resources:
Expand Down Expand Up @@ -200,9 +200,9 @@ authentication:
# +docs:section=Venafi Connection
# Configure VenafiConnection authentication
venafiConnection:
# When set to true, the Discovery Agent will authenticate to
# Venafi using the configuration in a VenafiConnection resource.
# Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/).
# When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager
# using the configuration in a VenafiConnection resource.
# Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-install-tlspk-agent/).
# When set to true, the `authentication.secret` values will be ignored and the
# Secret with `authentication.secretName` will _not_ be mounted into the
# Discovery Agent Pod.
Expand Down Expand Up @@ -239,7 +239,7 @@ config:
# API server by omitting various common Secret types when listing Secrets.
# These Secret types will be added to a "type!=<type>" field selector in the
# agent config.
# * https://docs.venafi.cloud/vaas/k8s-components/t-cfg-tlspk-agent/#configuration
# * https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-cfg-tlspk-agent/#configuration
# * https://kubernetes.io/docs/concepts/configuration/secret/#secret-types
# * https://kubernetes.io/docs/concepts/overview/working-with-objects/field-selectors/#list-of-supported-fields
ignoredSecretTypes:
Expand Down
2 changes: 1 addition & 1 deletion hack/e2e/test.sh
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@
#
# Prerequisites:
# * kubectl: https://kubernetes.io/docs/tasks/tools/#kubectl
# * venctl: https://docs.venafi.cloud/vaas/venctl/t-venctl-install/
# * venctl: https://docs.cyberark.com/mis-saas/vaas/venctl/t-venctl-install/
# * jq: https://jqlang.github.io/jq/download/
# * step: https://smallstep.com/docs/step-cli/installation/
# * curl: https://www.man7.org/linux/man-pages/man1/curl.1.html
Expand Down
6 changes: 3 additions & 3 deletions make/00_mod.mk
Original file line number Diff line number Diff line change
Expand Up @@ -35,11 +35,11 @@ oci_preflight_image_name_development := jetstack.local/venafi-agent
oci_preflight_build_args := \
--image-annotation="org.opencontainers.image.vendor"="CyberArk Software Ltd." \
--image-annotation="org.opencontainers.image.licenses"="EULA - https://www.cyberark.com/contract-terms/" \
--image-annotation="org.opencontainers.image.authors"="support@venafi.cloud" \
--image-annotation="org.opencontainers.image.title"="Venafi Kubernetes Agent" \
--image-annotation="org.opencontainers.image.authors"="support@cyberark.com" \
--image-annotation="org.opencontainers.image.title"="Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments" \
--image-annotation="org.opencontainers.image.description"="Gathers machine identity data from Kubernetes clusters." \
--image-annotation="org.opencontainers.image.url"="https://www.cyberark.com/products/certificate-manager-for-kubernetes/" \
--image-annotation="org.opencontainers.image.documentation"="https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/" \
--image-annotation="org.opencontainers.image.documentation"="https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-tlspk-agent-overview/" \
--image-annotation="org.opencontainers.image.version"="$(VERSION)" \
--image-annotation="org.opencontainers.image.revision"="$(GITCOMMIT)"

Expand Down
2 changes: 1 addition & 1 deletion make/02_mod.mk
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@ helm-plugins: $(NEEDS_HELM)
echo "helm-diff plugin already installed"; \
fi

# https://docs.venafi.cloud/vaas/venctl/c-venctl-releases/
# https://docs.cyberark.com/mis-saas/vaas/venctl/c-venctl-releases/
venctl_linux_amd64_SHA256SUM=26e7b7a7e134f1cf1f3ffacf4ae53ec6849058db5007ce4088d51f404ededb4a
venctl_darwin_amd64_SHA256SUM=2e76693901abcb2c018f66d3a10558c66ca09d1a3be912258bcd6c58e89aae80
venctl_darwin_arm64_SHA256SUM=4350912d67683773302655e2a0151320514d1ccf82ee99c895e6780f86b6f031
Expand Down