1
0
Fork 0
kubernetes/cert-manager
Dustin a443929c0c websites: Manage dcow cert via Ingress annotation
Now that the reverse proxy for Internet-facing sites uses TLS
passthrough, the certificate for the _darkchestofwonders.us_ Ingress
needs to be correct.  Since Ingress resources can only use either the
default certificate (_*.pyrocufflink.blue_) or a certificate from their
same namespace, we have to move the Certificate and its corresponding
Secret into the _websites_ namespace.  Fortunately, this is easy enoug
to do, by setting the appropriate annotations on the Ingress.

To keep the existing certificate (until it expires), I moved the Secret
manually:

```sh
kubectl get secret dcow-cert -o yaml | grep -v namespace | kubectl create -n websites -f -
```
2024-08-24 11:30:56 -05:00
..
.gitignore cert-manager: Add DNS.01 solver using Cloudflare 2023-05-09 21:13:08 -05:00
cert-exporter.yaml websites: Manage dcow cert via Ingress annotation 2024-08-24 11:30:56 -05:00
certificates.yaml websites: Manage dcow cert via Ingress annotation 2024-08-24 11:30:56 -05:00
cluster-issuer.yaml cert-manager: Drop acmeDNS solver 2023-08-28 12:00:23 -05:00
dch-ca-issuer.yaml cert-manager: Add dch-ca issuer 2024-07-26 20:59:00 -05:00
kustomization.yaml cert-manager, step-ca: Bypass cluster DNS 2024-07-29 20:58:18 -05:00
ssh_known_hosts cert-manager: cert-exporter: Static SSH host keys 2024-01-04 15:35:00 -06:00