Skip to content

Commit 8e1b020

Browse files
committed
make generate
Signed-off-by: Richard Wall <[email protected]>
1 parent c848b84 commit 8e1b020

File tree

2 files changed

+41
-41
lines changed

2 files changed

+41
-41
lines changed

deploy/charts/istio-csr/README.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@
88

99
#### **nameOverride** ~ `string`
1010

11-
nameOverride replaces the name of the chart in the Chart.yaml file, when this is used to construct Kubernetes object names.
11+
nameOverride replaces the name of the chart in the Chart.yaml file when this is used to construct Kubernetes object names.
1212

1313
#### **replicaCount** ~ `number`
1414
> Default value:
1515
> ```yaml
1616
> 1
1717
> ```
1818
19-
Number of replicas of istio-csr to run.
19+
The number of replicas of istio-csr to run.
2020
#### **image.registry** ~ `string`
2121
2222
Target image registry. This value is prepended to the target image repository, if set.
@@ -67,17 +67,17 @@ Optional secrets used for pulling the istio-csr container image.
6767
> ClusterIP
6868
> ```
6969
70-
Service type to expose istio-csr gRPC service.
70+
Service type to expose the istio-csr gRPC service.
7171
#### **service.port** ~ `number`
7272
> Default value:
7373
> ```yaml
7474
> 443
7575
> ```
7676
77-
Service port to expose istio-csr gRPC service.
77+
Service port to expose the istio-csr gRPC service.
7878
#### **service.nodePort** ~ `number`
7979
80-
Service nodePort to expose istio-csr gRPC service.
80+
Service nodePort to expose the istio-csr gRPC service.
8181
8282
8383
#### **app.logLevel** ~ `number`
@@ -107,7 +107,7 @@ Port for exposing Prometheus metrics on 0.0.0.0 on path '/metrics'.
107107
> true
108108
> ```
109109
110-
Create a Service resource to expose metrics endpoint.
110+
Create a Service resource to expose the metrics endpoint.
111111
#### **app.metrics.service.type** ~ `string`
112112
> Default value:
113113
> ```yaml
@@ -135,7 +135,7 @@ The value for the "prometheus" label on the ServiceMonitor. This allows for mult
135135
> 10s
136136
> ```
137137
138-
The interval that the Prometheus will scrape for metrics.
138+
The interval at which Prometheus will scrape for metrics.
139139
#### **app.metrics.service.servicemonitor.scrapeTimeout** ~ `string`
140140
> Default value:
141141
> ```yaml
@@ -165,7 +165,7 @@ Create the runtime-configuration ConfigMap.
165165
166166
Name of a ConfigMap in the installation namespace to watch, providing runtime configuration of an issuer to use.
167167
168-
If create is set to true then this name is used to create the ConfigMap, otherwise the ConfigMap must exist and the "issuer-name", "issuer-kind" and "issuer-group" keys must be present in it.
168+
If create is set to true, then this name is used to create the ConfigMap, otherwise the ConfigMap must exist, and the "issuer-name", "issuer-kind" and "issuer-group" keys must be present in it.
169169
#### **app.runtimeConfiguration.issuer.name** ~ `string`
170170
> Default value:
171171
> ```yaml
@@ -193,14 +193,14 @@ Issuer group name set on created CertificateRequests for both istio-csr's servin
193193
> 6060
194194
> ```
195195
196-
Container port to expose istio-csr HTTP readiness probe on default network interface.
196+
Container port to expose the istio-csr HTTP readiness probe on the default network interface.
197197
#### **app.readinessProbe.path** ~ `string`
198198
> Default value:
199199
> ```yaml
200200
> /readyz
201201
> ```
202202
203-
Path to expose istio-csr HTTP readiness probe on default network interface.
203+
Path to expose the istio-csr HTTP readiness probe on the default network interface.
204204
#### **app.certmanager.namespace** ~ `string`
205205
> Default value:
206206
> ```yaml
@@ -214,7 +214,7 @@ Namespace to create CertificateRequests for both istio-csr's serving certificate
214214
> false
215215
> ```
216216
217-
Don't delete created CertificateRequests once they have been signed. WARNING: do not enable this option in production, or environments with any non-trivial number of workloads for an extended period of time. Doing so will balloon the resource consumption of both ETCD and the API server, leading to errors and slow down. This option is intended for debugging purposes only, for limited periods of time.
217+
Don't delete created CertificateRequests once they have been signed. WARNING: Do not enable this option in production, or environments with any non-trivial number of workloads for an extended period of time. Doing so will balloon the resource consumption of both ETCD and the API server, leading to errors and slow down. This option is intended for debugging purposes only, for limited periods of time.
218218
#### **app.certmanager.additionalAnnotations** ~ `array`
219219
> Default value:
220220
> ```yaml
@@ -237,9 +237,9 @@ additionalAnnotations:
237237
238238
Enable the default issuer, this is the issuer used when no runtime configuration is provided.
239239
240-
When enabled the istio-csr Pod will not be "Ready" until the issuer has been used to issue the istio-csr GRPC certificate.
240+
When enabled, the istio-csr Pod will not be "Ready" until the issuer has been used to issue the istio-csr GRPC certificate.
241241
242-
For istio-csr to function either this or runtime configuration must be enabled.
242+
For istio-csr to function, either this or runtime configuration must be enabled.
243243
#### **app.certmanager.issuer.name** ~ `string`
244244
> Default value:
245245
> ```yaml
@@ -286,7 +286,7 @@ An optional file location to a PEM encoded root CA that the root CA. ConfigMap i
286286
> 1h
287287
> ```
288288
289-
Requested duration of gRPC serving certificate. Will be automatically renewed. Based on [NIST 800-204A recommendations (SM-DR13)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf).
289+
Requested duration of the gRPC serving certificate. Will be automatically renewed. Based on [NIST 800-204A recommendations (SM-DR13)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf).
290290
#### **app.tls.istiodCertificateEnable** ~ `boolean,string,null`
291291
> Default value:
292292
> ```yaml
@@ -323,7 +323,7 @@ Private key algorithm to use. For backwards compatibility, defaults to the same
323323
> 2048
324324
> ```
325325
326-
Parameter for istiod certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.
326+
Parameter for the istiod certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.
327327
#### **app.tls.istiodAdditionalDNSNames** ~ `array`
328328
> Default value:
329329
> ```yaml
@@ -358,21 +358,21 @@ Maximum validity duration that can be requested for a certificate. istio-csr wil
358358
> 0.0.0.0
359359
> ```
360360
361-
Container address to serve istio-csr gRPC service.
361+
Container address to serve the istio-csr gRPC service.
362362
#### **app.server.serving.port** ~ `number`
363363
> Default value:
364364
> ```yaml
365365
> 6443
366366
> ```
367367
368-
Container port to serve istio-csr gRPC service.
368+
Container port to serve the istio-csr gRPC service.
369369
#### **app.server.serving.certificateKeySize** ~ `number`
370370
> Default value:
371371
> ```yaml
372372
> 2048
373373
> ```
374374
375-
Parameter for serving certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.
375+
Parameter for the serving certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.
376376
#### **app.server.serving.signatureAlgorithm** ~ `string`
377377
> Default value:
378378
> ```yaml
@@ -386,7 +386,7 @@ The type of private key to generate for the serving certificate. Only RSA (defau
386386
> ""
387387
> ```
388388
389-
A comma-separated list of service accounts that are allowed to use node authentication for CSRs, eg. "istio-system/ztunnel".
389+
A comma-separated list of service accounts that are allowed to use node authentication for CSRs, e.g. "istio-system/ztunnel".
390390
#### **app.istio.revisions[0]** ~ `string`
391391
> Default value:
392392
> ```yaml
@@ -406,7 +406,7 @@ The namespace where the istio control-plane is running.
406406
> ```
407407
#### **app.controller.configmapNamespaceSelector** ~ `string`
408408
409-
If set, limit where istio-csr creates configmaps with root ca certificates. If unset, configmap created in ALL namespaces.
409+
If set, limit where istio-csr creates configmaps with root CA certificates. If unset, configmap created in ALL namespaces.
410410
Example: maistra.io/member-of=istio-system
411411
412412
@@ -416,7 +416,7 @@ Example: maistra.io/member-of=istio-system
416416
> false
417417
> ```
418418
419-
Allows you to disable the default Kubernetes client rate limiter if istio-csr is exceeding the default QPS (5) and Burst (10) limits. For example in large clusters with many Istio workloads, restarting the Pods may cause istio-csr to send bursts Kubernetes API requests that exceed the limits of the default Kubernetes client rate limiter and istio-csr will become slow to issue certificates for your workloads. Only disable client rate limiting if the Kubernetes API server supports
419+
Allows you to disable the default Kubernetes client rate limiter if istio-csr is exceeding the default QPS (5) and Burst (10) limits. For example, in large clusters with many Istio workloads, restarting the Pods may cause istio-csr to send bursts of Kubernetes API requests that exceed the limits of the default Kubernetes client rate limiter, and istio-csr will become slow to issue certificates for your workloads. Only disable client rate limiting if the Kubernetes API server supports
420420
[API Priority and Fairness](https://kubernetes.io/docs/concepts/cluster-administration/flow-control/),
421421
to avoid overloading the server.
422422
#### **deploymentLabels** ~ `object`

deploy/charts/istio-csr/values.schema.json

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@
157157
},
158158
"helm-values.app.certmanager.issuer.enabled": {
159159
"default": true,
160-
"description": "Enable the default issuer, this is the issuer used when no runtime configuration is provided.\n\nWhen enabled the istio-csr Pod will not be \"Ready\" until the issuer has been used to issue the istio-csr GRPC certificate.\n\nFor istio-csr to function either this or runtime configuration must be enabled.",
160+
"description": "Enable the default issuer, this is the issuer used when no runtime configuration is provided.\n\nWhen enabled, the istio-csr Pod will not be \"Ready\" until the issuer has been used to issue the istio-csr GRPC certificate.\n\nFor istio-csr to function, either this or runtime configuration must be enabled.",
161161
"type": "boolean"
162162
},
163163
"helm-values.app.certmanager.issuer.group": {
@@ -182,7 +182,7 @@
182182
},
183183
"helm-values.app.certmanager.preserveCertificateRequests": {
184184
"default": false,
185-
"description": "Don't delete created CertificateRequests once they have been signed. WARNING: do not enable this option in production, or environments with any non-trivial number of workloads for an extended period of time. Doing so will balloon the resource consumption of both ETCD and the API server, leading to errors and slow down. This option is intended for debugging purposes only, for limited periods of time.",
185+
"description": "Don't delete created CertificateRequests once they have been signed. WARNING: Do not enable this option in production, or environments with any non-trivial number of workloads for an extended period of time. Doing so will balloon the resource consumption of both ETCD and the API server, leading to errors and slow down. This option is intended for debugging purposes only, for limited periods of time.",
186186
"type": "boolean"
187187
},
188188
"helm-values.app.controller": {
@@ -201,12 +201,12 @@
201201
"type": "object"
202202
},
203203
"helm-values.app.controller.configmapNamespaceSelector": {
204-
"description": "If set, limit where istio-csr creates configmaps with root ca certificates. If unset, configmap created in ALL namespaces.\nExample: maistra.io/member-of=istio-system",
204+
"description": "If set, limit where istio-csr creates configmaps with root CA certificates. If unset, configmap created in ALL namespaces.\nExample: maistra.io/member-of=istio-system",
205205
"type": "string"
206206
},
207207
"helm-values.app.controller.disableKubernetesClientRateLimiter": {
208208
"default": false,
209-
"description": "Allows you to disable the default Kubernetes client rate limiter if istio-csr is exceeding the default QPS (5) and Burst (10) limits. For example in large clusters with many Istio workloads, restarting the Pods may cause istio-csr to send bursts Kubernetes API requests that exceed the limits of the default Kubernetes client rate limiter and istio-csr will become slow to issue certificates for your workloads. Only disable client rate limiting if the Kubernetes API server supports\n[API Priority and Fairness](https://kubernetes.io/docs/concepts/cluster-administration/flow-control/),\nto avoid overloading the server.",
209+
"description": "Allows you to disable the default Kubernetes client rate limiter if istio-csr is exceeding the default QPS (5) and Burst (10) limits. For example, in large clusters with many Istio workloads, restarting the Pods may cause istio-csr to send bursts of Kubernetes API requests that exceed the limits of the default Kubernetes client rate limiter, and istio-csr will become slow to issue certificates for your workloads. Only disable client rate limiting if the Kubernetes API server supports\n[API Priority and Fairness](https://kubernetes.io/docs/concepts/cluster-administration/flow-control/),\nto avoid overloading the server.",
210210
"type": "boolean"
211211
},
212212
"helm-values.app.controller.leaderElectionNamespace": {
@@ -284,7 +284,7 @@
284284
},
285285
"helm-values.app.metrics.service.enabled": {
286286
"default": true,
287-
"description": "Create a Service resource to expose metrics endpoint.",
287+
"description": "Create a Service resource to expose the metrics endpoint.",
288288
"type": "boolean"
289289
},
290290
"helm-values.app.metrics.service.servicemonitor": {
@@ -315,7 +315,7 @@
315315
},
316316
"helm-values.app.metrics.service.servicemonitor.interval": {
317317
"default": "10s",
318-
"description": "The interval that the Prometheus will scrape for metrics.",
318+
"description": "The interval at which Prometheus will scrape for metrics.",
319319
"type": "string"
320320
},
321321
"helm-values.app.metrics.service.servicemonitor.labels": {
@@ -352,12 +352,12 @@
352352
},
353353
"helm-values.app.readinessProbe.path": {
354354
"default": "/readyz",
355-
"description": "Path to expose istio-csr HTTP readiness probe on default network interface.",
355+
"description": "Path to expose the istio-csr HTTP readiness probe on the default network interface.",
356356
"type": "string"
357357
},
358358
"helm-values.app.readinessProbe.port": {
359359
"default": 6060,
360-
"description": "Container port to expose istio-csr HTTP readiness probe on default network interface.",
360+
"description": "Container port to expose the istio-csr HTTP readiness probe on the default network interface.",
361361
"type": "number"
362362
},
363363
"helm-values.app.runtimeConfiguration": {
@@ -412,7 +412,7 @@
412412
},
413413
"helm-values.app.runtimeConfiguration.name": {
414414
"default": "",
415-
"description": "Name of a ConfigMap in the installation namespace to watch, providing runtime configuration of an issuer to use.\n\nIf create is set to true then this name is used to create the ConfigMap, otherwise the ConfigMap must exist and the \"issuer-name\", \"issuer-kind\" and \"issuer-group\" keys must be present in it.",
415+
"description": "Name of a ConfigMap in the installation namespace to watch, providing runtime configuration of an issuer to use.\n\nIf create is set to true, then this name is used to create the ConfigMap, otherwise the ConfigMap must exist, and the \"issuer-name\", \"issuer-kind\" and \"issuer-group\" keys must be present in it.",
416416
"type": "string"
417417
},
418418
"helm-values.app.runtimeIssuanceConfigMap": {
@@ -457,7 +457,7 @@
457457
},
458458
"helm-values.app.server.caTrustedNodeAccounts": {
459459
"default": "",
460-
"description": "A comma-separated list of service accounts that are allowed to use node authentication for CSRs, eg. \"istio-system/ztunnel\".",
460+
"description": "A comma-separated list of service accounts that are allowed to use node authentication for CSRs, e.g. \"istio-system/ztunnel\".",
461461
"type": "string"
462462
},
463463
"helm-values.app.server.clusterID": {
@@ -490,17 +490,17 @@
490490
},
491491
"helm-values.app.server.serving.address": {
492492
"default": "0.0.0.0",
493-
"description": "Container address to serve istio-csr gRPC service.",
493+
"description": "Container address to serve the istio-csr gRPC service.",
494494
"type": "string"
495495
},
496496
"helm-values.app.server.serving.certificateKeySize": {
497497
"default": 2048,
498-
"description": "Parameter for serving certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.",
498+
"description": "Parameter for the serving certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.",
499499
"type": "number"
500500
},
501501
"helm-values.app.server.serving.port": {
502502
"default": 6443,
503-
"description": "Container port to serve istio-csr gRPC service.",
503+
"description": "Container port to serve the istio-csr gRPC service.",
504504
"type": "number"
505505
},
506506
"helm-values.app.server.serving.signatureAlgorithm": {
@@ -556,7 +556,7 @@
556556
},
557557
"helm-values.app.tls.certificateDuration": {
558558
"default": "1h",
559-
"description": "Requested duration of gRPC serving certificate. Will be automatically renewed. Based on [NIST 800-204A recommendations (SM-DR13)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf).",
559+
"description": "Requested duration of the gRPC serving certificate. Will be automatically renewed. Based on [NIST 800-204A recommendations (SM-DR13)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf).",
560560
"type": "string"
561561
},
562562
"helm-values.app.tls.istiodAdditionalDNSNames": {
@@ -586,7 +586,7 @@
586586
},
587587
"helm-values.app.tls.istiodPrivateKeySize": {
588588
"default": 2048,
589-
"description": "Parameter for istiod certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.",
589+
"description": "Parameter for the istiod certificate key. For RSA, must be a number of bits >= 2048. For ECDSA, can only be 256 or 384, corresponding to P-256 and P-384 respectively.",
590590
"type": "number"
591591
},
592592
"helm-values.app.tls.rootCAFile": {
@@ -671,7 +671,7 @@
671671
"type": "array"
672672
},
673673
"helm-values.nameOverride": {
674-
"description": "nameOverride replaces the name of the chart in the Chart.yaml file, when this is used to construct Kubernetes object names.",
674+
"description": "nameOverride replaces the name of the chart in the Chart.yaml file when this is used to construct Kubernetes object names.",
675675
"type": "string"
676676
},
677677
"helm-values.nodeSelector": {
@@ -693,7 +693,7 @@
693693
},
694694
"helm-values.replicaCount": {
695695
"default": 1,
696-
"description": "Number of replicas of istio-csr to run.",
696+
"description": "The number of replicas of istio-csr to run.",
697697
"type": "number"
698698
},
699699
"helm-values.resources": {
@@ -766,17 +766,17 @@
766766
"type": "object"
767767
},
768768
"helm-values.service.nodePort": {
769-
"description": "Service nodePort to expose istio-csr gRPC service.",
769+
"description": "Service nodePort to expose the istio-csr gRPC service.",
770770
"type": "number"
771771
},
772772
"helm-values.service.port": {
773773
"default": 443,
774-
"description": "Service port to expose istio-csr gRPC service.",
774+
"description": "Service port to expose the istio-csr gRPC service.",
775775
"type": "number"
776776
},
777777
"helm-values.service.type": {
778778
"default": "ClusterIP",
779-
"description": "Service type to expose istio-csr gRPC service.",
779+
"description": "Service type to expose the istio-csr gRPC service.",
780780
"type": "string"
781781
},
782782
"helm-values.tolerations": {

0 commit comments

Comments
 (0)