From e1e7f4602c045bf817ed7b5edd04d4ee23ee985d Mon Sep 17 00:00:00 2001 From: Marcus Geiger Date: Sat, 29 Feb 2020 00:30:40 +0100 Subject: [PATCH] Update documentation about Issuer, prod and staging Add details about showing the key details --- README.md | 54 +++++++++++++++++++++++++++++++----------------------- 1 file changed, 31 insertions(+), 23 deletions(-) diff --git a/README.md b/README.md index ecb9b871f..3da4fc46a 100644 --- a/README.md +++ b/README.md @@ -102,29 +102,29 @@ This webhook has been tested with [cert-manager] v0.13.1 and Kubernetes v0.17.x 6. Create a staging issuer (email addresses with the suffix `example.com` are forbidden): cat << EOF | sed "s/invalid@example.com/$email/" | kubectl apply -f - - apiVersion: cert-manager.io/v1alpha2 - kind: Issuer - metadata: - name: letsencrypt-staging - namespace: default - spec: - acme: - # The ACME server URL - server: https://acme-staging-v02.api.letsencrypt.org/directory - # Email address used for ACME registration - email: invalid@example.com - # Name of a secret used to store the ACME account private key - privateKeySecretRef: - name: letsencrypt-staging - solvers: - - dns01: - webhook: - groupName: acme.bwolf.me - solverName: gandi - config: - apiKeySecretRef: - key: api-token - name: gandi-credentials + apiVersion: cert-manager.io/v1alpha2 + kind: Issuer + metadata: + name: letsencrypt-staging + namespace: default + spec: + acme: + # The ACME server URL + server: https://acme-staging-v02.api.letsencrypt.org/directory + # Email address used for ACME registration + email: invalid@example.com + # Name of a secret used to store the ACME account private key + privateKeySecretRef: + name: letsencrypt-staging + solvers: + - dns01: + webhook: + groupName: acme.bwolf.me + solverName: gandi + config: + apiKeySecretRef: + key: api-token + name: gandi-credentials EOF Check status of the Issuer: @@ -152,6 +152,10 @@ This webhook has been tested with [cert-manager] v0.13.1 and Kubernetes v0.17.x kubectl describe certificate $DOMAIN + Display the details like the common name and subject alternative names: + + kubectl get secret $DOMAIN-tls -o yaml + 8. Issue a wildcard Certificate for your `$DOMAIN`: cat << EOF | sed "s/example-com/$DOMAIN/" | kubectl apply -f - @@ -171,6 +175,10 @@ This webhook has been tested with [cert-manager] v0.13.1 and Kubernetes v0.17.x kubectl describe certificate $DOMAIN + Display the details like the common name and subject alternative names: + + kubectl get secret wildcard-$DOMAIN-tls -o yaml + 99. Uninstall this webhook: helm uninstall cert-manager-webhook-gandi --namespace cert-manager