diff --git a/components/docs/Sidebar/Dropdown.jsx b/components/docs/Sidebar/Dropdown.jsx index 63aa2ef1b16..b57ae2d39fe 100644 --- a/components/docs/Sidebar/Dropdown.jsx +++ b/components/docs/Sidebar/Dropdown.jsx @@ -36,12 +36,14 @@ export default function Dropdown({ {routes.routes.map((r, idx) => { if (!r.path) { return ( - +
  • + +
  • ) } else { return ( diff --git a/components/docs/VersionSelect.jsx b/components/docs/VersionSelect.jsx index 6f736cd69f3..255c4d10603 100644 --- a/components/docs/VersionSelect.jsx +++ b/components/docs/VersionSelect.jsx @@ -27,7 +27,7 @@ export default function VersionSelect({
    - version: {labelFromVersion(version)} + version: {labelFromVersion(version)} diff --git a/content/docs/cli/controller.md b/content/docs/cli/controller.md index 36661b86c0b..768ffb05ccd 100644 --- a/content/docs/cli/controller.md +++ b/content/docs/cli/controller.md @@ -20,6 +20,7 @@ Flags: --acme-http01-solver-resource-limits-memory string Defines the resource limits Memory size when spawning new ACME HTTP01 challenge solver pods. (default "64Mi") --acme-http01-solver-resource-request-cpu string Defines the resource request CPU size when spawning new ACME HTTP01 challenge solver pods. (default "10m") --acme-http01-solver-resource-request-memory string Defines the resource request Memory size when spawning new ACME HTTP01 challenge solver pods. (default "64Mi") + --acme-http01-solver-run-as-non-root Defines the ability to run the http01 solver as root for troubleshooting issues (default true) --add_dir_header If true, adds the file directory to the header of the log messages --alsologtostderr log to standard error as well as files (no effect when -logtostderr=true) --auto-certificate-annotations strings The annotation consumed by the ingress-shim controller to indicate a ingress is requesting a certificate (default [kubernetes.io/tls-acme]) @@ -45,6 +46,7 @@ Flags: LiteralCertificateSubject=true|false (ALPHA - default=false) ServerSideApply=true|false (ALPHA - default=false) StableCertificateRequestName=true|false (ALPHA - default=false) + UseCertificateRequestBasicConstraints=true|false (ALPHA - default=false) ValidateCAA=true|false (ALPHA - default=false) -h, --help help for cert-manager-controller --issuer-ambient-credentials Whether an issuer may make use of ambient credentials. 'Ambient Credentials' are credentials drawn from the environment, metadata services, or local files which are not explicitly configured in the Issuer API object. When this flag is enabled, the following sources for credentials are also used: AWS - All sources the Go SDK defaults to, notably including any EC2 IAM roles available via instance metadata. diff --git a/content/docs/cli/webhook.md b/content/docs/cli/webhook.md index d4d7d35d062..f4d6ef30c33 100644 --- a/content/docs/cli/webhook.md +++ b/content/docs/cli/webhook.md @@ -26,6 +26,7 @@ Flags: LiteralCertificateSubject=true|false (ALPHA - default=false) ServerSideApply=true|false (ALPHA - default=false) StableCertificateRequestName=true|false (ALPHA - default=false) + UseCertificateRequestBasicConstraints=true|false (ALPHA - default=false) ValidateCAA=true|false (ALPHA - default=false) --healthz-port int port number to listen on for insecure healthz connections (default 6080) -h, --help help for webhook diff --git a/content/docs/reference/api-docs.md b/content/docs/reference/api-docs.md index 1eccf291108..35d0f49d6ca 100644 --- a/content/docs/reference/api-docs.md +++ b/content/docs/reference/api-docs.md @@ -1,10 +1,10 @@ --- title: API Reference description: >- - Learn about the cert-manager API which includes Custom Resources such as - Certificate, CertificateRequest, Issuer and ClusterIssuer. + cert-manager API documentation, including Custom Resources such as + Certificate, CertificateRequest, Issuer and ClusterIssuer --- -Learn about the cert-manager API which includes Custom Resources such as Certificate, CertificateRequest, Issuer and ClusterIssuer. +

    cert-manager API documentation, including various Custom Resource Definitions

    Packages:

    • @@ -24,7 +24,7 @@ Learn about the cert-manager API which includes Custom Resources such as Certifi

      Package v1 is the v1 version of the API.

      -Resource Types: +

      Resource Types:

      • Challenge @@ -750,12 +750,12 @@ Resource Types: parentRefs
        - []sigs.k8s.io/gateway-api/apis/v1alpha2.ParentReference + []sigs.k8s.io/gateway-api/apis/v1beta1.ParentReference

        When solving an HTTP-01 challenge, cert-manager creates an HTTPRoute. cert-manager needs to know which parentRefs should be used when creating the HTTPRoute. Usually, the parentRef references a Gateway. See: - https://gateway-api.sigs.k8s.io/v1alpha2/api-types/httproute/#attaching-to-gateways + https://gateway-api.sigs.k8s.io/api-types/httproute/#attaching-to-gateways

        @@ -1231,6 +1231,17 @@ Resource Types:

        PreferredChain is the chain to use if the ACME server outputs multiple. PreferredChain is no guarantee that this one gets delivered by the ACME endpoint. For example, for Let’s Encrypt’s DST crosssign you would use: “DST Root CA X3” or “ISRG Root X1” for the newer Let’s Encrypt root CA. This value picks the first certificate bundle in the ACME alternative chains that has a certificate with this value as its issuer’s CN

        + + + caBundle +
        + []byte + + + (Optional) +

        Base64-encoded bundle of PEM CAs which can be used to validate the certificate chain presented by the ACME server. Mutually exclusive with SkipTLSVerify; prefer using CABundle to prevent various kinds of security vulnerabilities. If CABundle and SkipTLSVerify are unset, the system certificate bundle inside the container is used to validate the TLS connection.

        + + skipTLSVerify @@ -1239,7 +1250,7 @@ Resource Types: (Optional) -

        Enables or disables validation of the ACME server TLS certificate. If true, requests to the ACME server will not have their TLS certificate validated (i.e. insecure connections will be allowed). Only enable this option in development environments. The cert-manager system installed roots will be used to verify connections to the ACME server if this is false. Defaults to false.

        +

        INSECURE: Enables or disables validation of the ACME server TLS certificate. If true, requests to the ACME server will not have the TLS certificate chain validated. Mutually exclusive with CABundle; prefer using CABundle to prevent various kinds of security vulnerabilities. Only enable this option in development environments. If CABundle and SkipTLSVerify are unset, the system certificate bundle inside the container is used to validate the TLS connection. Defaults to false.

        @@ -2443,7 +2454,7 @@ Resource Types:

        Package v1 is the v1 version of the API.

        -Resource Types: +

        Resource Types:

        • Certificate @@ -4470,7 +4481,7 @@ Resource Types: bool -

          Create enables JKS keystore creation for the Certificate. If true, a file named keystore.jks will be created in the target Secret resource, encrypted using the password stored in passwordSecretRef. The keystore file will only be updated upon re-issuance. A file named truststore.jks will also be created in the target Secret resource, encrypted using the password stored in passwordSecretRef containing the issuing Certificate Authority

          +

          Create enables JKS keystore creation for the Certificate. If true, a file named keystore.jks will be created in the target Secret resource, encrypted using the password stored in passwordSecretRef. The keystore file will be updated immediately. A file named truststore.jks will also be created in the target Secret resource, encrypted using the password stored in passwordSecretRef containing the issuing Certificate Authority

          @@ -4668,7 +4679,7 @@ Resource Types: bool -

          Create enables PKCS12 keystore creation for the Certificate. If true, a file named keystore.p12 will be created in the target Secret resource, encrypted using the password stored in passwordSecretRef. The keystore file will only be updated upon re-issuance. A file named truststore.p12 will also be created in the target Secret resource, encrypted using the password stored in passwordSecretRef containing the issuing Certificate Authority

          +

          Create enables PKCS12 keystore creation for the Certificate. If true, a file named keystore.p12 will be created in the target Secret resource, encrypted using the password stored in passwordSecretRef. The keystore file will be updated immediately. A file named truststore.p12 will also be created in the target Secret resource, encrypted using the password stored in passwordSecretRef containing the issuing Certificate Authority

          @@ -4950,7 +4961,7 @@ Resource Types: (Optional) -

          PEM-encoded CA bundle (base64-encoded) used to validate Vault server certificate. Only used if the Server URL is using HTTPS protocol. This parameter is ignored for plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection. Mutually exclusive with CABundleSecretRef. If neither CABundle nor CABundleSecretRef are defined, the cert-manager controller system root certificates are used to validate the TLS connection.

          +

          Base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by Vault. Only used if using HTTPS to connect to Vault and ignored for HTTP connections. Mutually exclusive with CABundleSecretRef. If neither CABundle nor CABundleSecretRef are defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection.

          @@ -4963,7 +4974,7 @@ Resource Types: (Optional) -

          CABundleSecretRef is a reference to a Secret which contains the CABundle which will be used when connecting to Vault when using HTTPS. Mutually exclusive with CABundle. If neither CABundleSecretRef nor CABundle are defined, the cert-manager controller system root certificates are used to validate the TLS connection. If no key for the Secret is specified, cert-manager will default to ‘ca.crt’.

          +

          Reference to a Secret containing a bundle of PEM-encoded CAs to use when verifying the certificate chain presented by Vault when using HTTPS. Mutually exclusive with CABundle. If neither CABundle nor CABundleSecretRef are defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection. If no key for the Secret is specified, cert-manager will default to ‘ca.crt’.

          @@ -5148,7 +5159,7 @@ Resource Types: (Optional) -

          CABundle is a PEM encoded TLS certificate to use to verify connections to the TPP instance. If specified, system roots will not be used and the issuing CA for the TPP instance must be verifiable using the provided root. If not specified, the connection will be verified using the cert-manager system root certificates.

          +

          Base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by the TPP server. Only used if using HTTPS; ignored for HTTP. If undefined, the certificate bundle in the cert-manager controller container is used to validate the chain.

          @@ -5261,7 +5272,7 @@ Resource Types:

          Package v1 contains meta types for cert-manager APIs

          -Resource Types: +

          Resource Types:

            ConditionStatus (string alias)

            (Appears on: CertificateCondition, CertificateRequestCondition, IssuerCondition)

            @@ -5421,7 +5432,7 @@ Resource Types:

            Package v1alpha1 is the v1alpha1 version of the webhook config API.

            -Resource Types: +

            Resource Types:

              DynamicServingConfig

              (Appears on: TLSConfig)

              @@ -5659,5 +5670,5 @@ Resource Types:

              - Generated with gen-crd-api-reference-docs on git commit da3265115. + Generated with gen-crd-api-reference-docs on git commit 7ebb5f515.

              diff --git a/content/v1.10-docs/reference/api-docs.md b/content/v1.10-docs/reference/api-docs.md index 1eccf291108..534fdd7bc25 100644 --- a/content/v1.10-docs/reference/api-docs.md +++ b/content/v1.10-docs/reference/api-docs.md @@ -1,10 +1,10 @@ --- title: API Reference description: >- - Learn about the cert-manager API which includes Custom Resources such as - Certificate, CertificateRequest, Issuer and ClusterIssuer. + cert-manager API documentation, including Custom Resources such as + Certificate, CertificateRequest, Issuer and ClusterIssuer --- -Learn about the cert-manager API which includes Custom Resources such as Certificate, CertificateRequest, Issuer and ClusterIssuer. +

              cert-manager API documentation, including various Custom Resource Definitions

              Packages:

              • @@ -24,7 +24,7 @@ Learn about the cert-manager API which includes Custom Resources such as Certifi

                Package v1 is the v1 version of the API.

                -Resource Types: +

                Resource Types:

                • Challenge @@ -2443,7 +2443,7 @@ Resource Types:

                  Package v1 is the v1 version of the API.

                  -Resource Types: +

                  Resource Types:

                  • Certificate @@ -5261,7 +5261,7 @@ Resource Types:

                    Package v1 contains meta types for cert-manager APIs

                    -Resource Types: +

                    Resource Types:

                      ConditionStatus (string alias)

                      (Appears on: CertificateCondition, CertificateRequestCondition, IssuerCondition)

                      @@ -5421,7 +5421,7 @@ Resource Types:

                      Package v1alpha1 is the v1alpha1 version of the webhook config API.

                      -Resource Types: +

                      Resource Types:

                        DynamicServingConfig

                        (Appears on: TLSConfig)

                        @@ -5659,5 +5659,5 @@ Resource Types:

                        - Generated with gen-crd-api-reference-docs on git commit da3265115. + Generated with gen-crd-api-reference-docs on git commit 83791ee45.

                        diff --git a/content/v1.11-docs/cli/controller.md b/content/v1.11-docs/cli/controller.md index 36661b86c0b..768ffb05ccd 100644 --- a/content/v1.11-docs/cli/controller.md +++ b/content/v1.11-docs/cli/controller.md @@ -20,6 +20,7 @@ Flags: --acme-http01-solver-resource-limits-memory string Defines the resource limits Memory size when spawning new ACME HTTP01 challenge solver pods. (default "64Mi") --acme-http01-solver-resource-request-cpu string Defines the resource request CPU size when spawning new ACME HTTP01 challenge solver pods. (default "10m") --acme-http01-solver-resource-request-memory string Defines the resource request Memory size when spawning new ACME HTTP01 challenge solver pods. (default "64Mi") + --acme-http01-solver-run-as-non-root Defines the ability to run the http01 solver as root for troubleshooting issues (default true) --add_dir_header If true, adds the file directory to the header of the log messages --alsologtostderr log to standard error as well as files (no effect when -logtostderr=true) --auto-certificate-annotations strings The annotation consumed by the ingress-shim controller to indicate a ingress is requesting a certificate (default [kubernetes.io/tls-acme]) @@ -45,6 +46,7 @@ Flags: LiteralCertificateSubject=true|false (ALPHA - default=false) ServerSideApply=true|false (ALPHA - default=false) StableCertificateRequestName=true|false (ALPHA - default=false) + UseCertificateRequestBasicConstraints=true|false (ALPHA - default=false) ValidateCAA=true|false (ALPHA - default=false) -h, --help help for cert-manager-controller --issuer-ambient-credentials Whether an issuer may make use of ambient credentials. 'Ambient Credentials' are credentials drawn from the environment, metadata services, or local files which are not explicitly configured in the Issuer API object. When this flag is enabled, the following sources for credentials are also used: AWS - All sources the Go SDK defaults to, notably including any EC2 IAM roles available via instance metadata. diff --git a/content/v1.11-docs/cli/webhook.md b/content/v1.11-docs/cli/webhook.md index d4d7d35d062..f4d6ef30c33 100644 --- a/content/v1.11-docs/cli/webhook.md +++ b/content/v1.11-docs/cli/webhook.md @@ -26,6 +26,7 @@ Flags: LiteralCertificateSubject=true|false (ALPHA - default=false) ServerSideApply=true|false (ALPHA - default=false) StableCertificateRequestName=true|false (ALPHA - default=false) + UseCertificateRequestBasicConstraints=true|false (ALPHA - default=false) ValidateCAA=true|false (ALPHA - default=false) --healthz-port int port number to listen on for insecure healthz connections (default 6080) -h, --help help for webhook diff --git a/content/v1.11-docs/reference/api-docs.md b/content/v1.11-docs/reference/api-docs.md index 1eccf291108..35d0f49d6ca 100644 --- a/content/v1.11-docs/reference/api-docs.md +++ b/content/v1.11-docs/reference/api-docs.md @@ -1,10 +1,10 @@ --- title: API Reference description: >- - Learn about the cert-manager API which includes Custom Resources such as - Certificate, CertificateRequest, Issuer and ClusterIssuer. + cert-manager API documentation, including Custom Resources such as + Certificate, CertificateRequest, Issuer and ClusterIssuer --- -Learn about the cert-manager API which includes Custom Resources such as Certificate, CertificateRequest, Issuer and ClusterIssuer. +

                        cert-manager API documentation, including various Custom Resource Definitions

                        Packages:

                        • @@ -24,7 +24,7 @@ Learn about the cert-manager API which includes Custom Resources such as Certifi

                          Package v1 is the v1 version of the API.

                          -Resource Types: +

                          Resource Types:

                          • Challenge @@ -750,12 +750,12 @@ Resource Types: parentRefs
                            - []sigs.k8s.io/gateway-api/apis/v1alpha2.ParentReference + []sigs.k8s.io/gateway-api/apis/v1beta1.ParentReference

                            When solving an HTTP-01 challenge, cert-manager creates an HTTPRoute. cert-manager needs to know which parentRefs should be used when creating the HTTPRoute. Usually, the parentRef references a Gateway. See: - https://gateway-api.sigs.k8s.io/v1alpha2/api-types/httproute/#attaching-to-gateways + https://gateway-api.sigs.k8s.io/api-types/httproute/#attaching-to-gateways

                            @@ -1231,6 +1231,17 @@ Resource Types:

                            PreferredChain is the chain to use if the ACME server outputs multiple. PreferredChain is no guarantee that this one gets delivered by the ACME endpoint. For example, for Let’s Encrypt’s DST crosssign you would use: “DST Root CA X3” or “ISRG Root X1” for the newer Let’s Encrypt root CA. This value picks the first certificate bundle in the ACME alternative chains that has a certificate with this value as its issuer’s CN

                            + + + caBundle +
                            + []byte + + + (Optional) +

                            Base64-encoded bundle of PEM CAs which can be used to validate the certificate chain presented by the ACME server. Mutually exclusive with SkipTLSVerify; prefer using CABundle to prevent various kinds of security vulnerabilities. If CABundle and SkipTLSVerify are unset, the system certificate bundle inside the container is used to validate the TLS connection.

                            + + skipTLSVerify @@ -1239,7 +1250,7 @@ Resource Types: (Optional) -

                            Enables or disables validation of the ACME server TLS certificate. If true, requests to the ACME server will not have their TLS certificate validated (i.e. insecure connections will be allowed). Only enable this option in development environments. The cert-manager system installed roots will be used to verify connections to the ACME server if this is false. Defaults to false.

                            +

                            INSECURE: Enables or disables validation of the ACME server TLS certificate. If true, requests to the ACME server will not have the TLS certificate chain validated. Mutually exclusive with CABundle; prefer using CABundle to prevent various kinds of security vulnerabilities. Only enable this option in development environments. If CABundle and SkipTLSVerify are unset, the system certificate bundle inside the container is used to validate the TLS connection. Defaults to false.

                            @@ -2443,7 +2454,7 @@ Resource Types:

                            Package v1 is the v1 version of the API.

                            -Resource Types: +

                            Resource Types:

                            • Certificate @@ -4470,7 +4481,7 @@ Resource Types: bool -

                              Create enables JKS keystore creation for the Certificate. If true, a file named keystore.jks will be created in the target Secret resource, encrypted using the password stored in passwordSecretRef. The keystore file will only be updated upon re-issuance. A file named truststore.jks will also be created in the target Secret resource, encrypted using the password stored in passwordSecretRef containing the issuing Certificate Authority

                              +

                              Create enables JKS keystore creation for the Certificate. If true, a file named keystore.jks will be created in the target Secret resource, encrypted using the password stored in passwordSecretRef. The keystore file will be updated immediately. A file named truststore.jks will also be created in the target Secret resource, encrypted using the password stored in passwordSecretRef containing the issuing Certificate Authority

                              @@ -4668,7 +4679,7 @@ Resource Types: bool -

                              Create enables PKCS12 keystore creation for the Certificate. If true, a file named keystore.p12 will be created in the target Secret resource, encrypted using the password stored in passwordSecretRef. The keystore file will only be updated upon re-issuance. A file named truststore.p12 will also be created in the target Secret resource, encrypted using the password stored in passwordSecretRef containing the issuing Certificate Authority

                              +

                              Create enables PKCS12 keystore creation for the Certificate. If true, a file named keystore.p12 will be created in the target Secret resource, encrypted using the password stored in passwordSecretRef. The keystore file will be updated immediately. A file named truststore.p12 will also be created in the target Secret resource, encrypted using the password stored in passwordSecretRef containing the issuing Certificate Authority

                              @@ -4950,7 +4961,7 @@ Resource Types: (Optional) -

                              PEM-encoded CA bundle (base64-encoded) used to validate Vault server certificate. Only used if the Server URL is using HTTPS protocol. This parameter is ignored for plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection. Mutually exclusive with CABundleSecretRef. If neither CABundle nor CABundleSecretRef are defined, the cert-manager controller system root certificates are used to validate the TLS connection.

                              +

                              Base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by Vault. Only used if using HTTPS to connect to Vault and ignored for HTTP connections. Mutually exclusive with CABundleSecretRef. If neither CABundle nor CABundleSecretRef are defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection.

                              @@ -4963,7 +4974,7 @@ Resource Types: (Optional) -

                              CABundleSecretRef is a reference to a Secret which contains the CABundle which will be used when connecting to Vault when using HTTPS. Mutually exclusive with CABundle. If neither CABundleSecretRef nor CABundle are defined, the cert-manager controller system root certificates are used to validate the TLS connection. If no key for the Secret is specified, cert-manager will default to ‘ca.crt’.

                              +

                              Reference to a Secret containing a bundle of PEM-encoded CAs to use when verifying the certificate chain presented by Vault when using HTTPS. Mutually exclusive with CABundle. If neither CABundle nor CABundleSecretRef are defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection. If no key for the Secret is specified, cert-manager will default to ‘ca.crt’.

                              @@ -5148,7 +5159,7 @@ Resource Types: (Optional) -

                              CABundle is a PEM encoded TLS certificate to use to verify connections to the TPP instance. If specified, system roots will not be used and the issuing CA for the TPP instance must be verifiable using the provided root. If not specified, the connection will be verified using the cert-manager system root certificates.

                              +

                              Base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by the TPP server. Only used if using HTTPS; ignored for HTTP. If undefined, the certificate bundle in the cert-manager controller container is used to validate the chain.

                              @@ -5261,7 +5272,7 @@ Resource Types:

                              Package v1 contains meta types for cert-manager APIs

                              -Resource Types: +

                              Resource Types:

                                ConditionStatus (string alias)

                                (Appears on: CertificateCondition, CertificateRequestCondition, IssuerCondition)

                                @@ -5421,7 +5432,7 @@ Resource Types:

                                Package v1alpha1 is the v1alpha1 version of the webhook config API.

                                -Resource Types: +

                                Resource Types:

                                  DynamicServingConfig

                                  (Appears on: TLSConfig)

                                  @@ -5659,5 +5670,5 @@ Resource Types:

                                  - Generated with gen-crd-api-reference-docs on git commit da3265115. + Generated with gen-crd-api-reference-docs on git commit 7ebb5f515.

                                  diff --git a/content/v1.11-docs/reference/cmctl.md b/content/v1.11-docs/reference/cmctl.md index 09c8c6384d6..095c9dfe6e0 100644 --- a/content/v1.11-docs/reference/cmctl.md +++ b/content/v1.11-docs/reference/cmctl.md @@ -226,9 +226,9 @@ of these commands are subject to change or removal in future releases. Sub-commands are available to create different resources: ##### CertificateSigningRequest -To create a [CertificateSigningRequest](./kube-csr.md), use +To create a [CertificateSigningRequest](../usage/kube-csr.md), use ```console -cmctl x create csr` +cmctl x create csr ``` This command takes the name of the CertificateSigningRequest to be created, as well as a file containing a Certificate manifest (`-f, @@ -269,7 +269,7 @@ cmctl x install ``` This command makes sure that the required `CustomResourceDefinitions` are installed together with the cert-manager, cainjector and webhook components. -Under the hood, a procedure similar to the [Helm install procedure](../install/helm.md#steps) is used. +Under the hood, a procedure similar to the [Helm install procedure](../installation/helm.md#steps) is used. You can also use `cmctl x install` to customize the installation of cert-manager. @@ -282,7 +282,7 @@ cmctl x install \ ``` You can find [a full list of the install parameters on cert-manager's ArtifactHub page](https://artifacthub.io/packages/helm/cert-manager/cert-manager#configuration). These are the same parameters that are available when using the Helm chart. -Once you have deployed cert-manager, you can [verify](../install/verify.md) the installation. +Once you have deployed cert-manager, you can [verify](../installation/verify.md) the installation. The CLI also allows the user to output the templated manifest to `stdout`, instead of installing the manifest on the cluster. diff --git a/content/v1.8-docs/reference/api-docs.md b/content/v1.8-docs/reference/api-docs.md index 7c073c3cb68..d6c0a4e8e61 100644 --- a/content/v1.8-docs/reference/api-docs.md +++ b/content/v1.8-docs/reference/api-docs.md @@ -1,7 +1,10 @@ --- -title: API reference docs -description: cert-manager API reference documentation +title: API Reference +description: >- + cert-manager API documentation, including Custom Resources such as + Certificate, CertificateRequest, Issuer and ClusterIssuer --- +

                                  cert-manager API documentation, including various Custom Resource Definitions

                                  Packages: