Skip to content

Commit e9b83df

Browse files
committed
Migrate Helm installations to OCI
Signed-off-by: Erik Godding Boye <[email protected]>
1 parent a2c3cf7 commit e9b83df

File tree

19 files changed

+57
-59
lines changed

19 files changed

+57
-59
lines changed

content/docs/configuration/acme/http01/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ To enable the feature in cert-manager, turn on the `GatewayAPI` feature gate:
233233
- If you are using Helm:
234234

235235
```sh
236-
helm upgrade --install cert-manager jetstack/cert-manager --namespace cert-manager \
236+
helm upgrade --install cert-manager oci://quay.io/jetstack/charts/cert-manager --namespace cert-manager \
237237
--set "extraArgs={--enable-gateway-api}"
238238
```
239239

content/docs/contributing/policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ appVersion: "0.1.0"
109109
dependencies:
110110
- name: cert-manager
111111
version: [[VAR::cert_manager_latest_version]]
112-
repository: https://charts.jetstack.io
112+
repository: oci://quay.io/jetstack/charts
113113
alias: cert-manager
114114
condition: cert-manager.enabled
115115
```

content/docs/installation/compatibility.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Not ready: the cert-manager webhook CA bundle is not injected yet
7878

7979
```console
8080
helm install \
81-
cert-manager jetstack/cert-manager \
81+
cert-manager oci://quay.io/jetstack/charts/cert-manager \
8282
--namespace cert-manager \
8383
--create-namespace \
8484
--version ${CERT_MANAGER_VERSION} --set global.leaderElection.namespace=cert-manager

content/docs/installation/upgrade.md

Lines changed: 23 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,12 +35,6 @@ with the name of your Helm release for cert-manager (usually this is
3535
`cert-manager`) and replacing `<version>` with the version number you want to
3636
install.
3737

38-
Add the Jetstack Helm repository (if you haven't already) and update it.
39-
40-
```bash
41-
helm repo add jetstack https://charts.jetstack.io --force-update
42-
```
43-
4438
The helm upgrade command will upgrade cert-manager to the specified or latest version of cert-manager, as listed on the
4539
[cert-manager Helm chart documentation page](https://artifacthub.io/packages/helm/cert-manager/cert-manager).
4640

@@ -52,7 +46,7 @@ If you have installed the CRDs together with the helm install command (using `--
5246
Helm will upgrade the CRDs automatically when you upgrade the cert-manager Helm chart:
5347

5448
```bash
55-
helm upgrade --reset-then-reuse-values --version <version> <release_name> jetstack/cert-manager
49+
helm upgrade --reset-then-reuse-values --version <version> <release_name> oci://quay.io/jetstack/charts/cert-manager
5650
```
5751

5852
### CRDs managed separately
@@ -66,6 +60,28 @@ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/
6660

6761
And then upgrade the Helm chart:
6862

63+
```bash
64+
helm upgrade --reset-then-reuse-values --version <version> <release_name> oci://quay.io/jetstack/charts/cert-manager
65+
```
66+
67+
### Upgrading from the Legacy Helm Repository
68+
69+
The Helm charts for cert-manager have historically been published to the Jetstack repository at `https://charts.jetstack.io`.
70+
71+
This repository is still available and there are no current plans for it to change, but it is recommended to use OCI Helm charts for the latest versions of cert-manager.
72+
**Note that the legacy HTTP Helm repository is updated a few hours after the OCI Helm charts are published**, so you may experience a delay before new releases are available via this method.
73+
74+
To use the legacy repository instead of the OCI registry, you need to add the Jetstack Helm repository to your local Helm client
75+
and use a slightly different [Helm upgrade command](https://helm.sh/docs/helm/helm_upgrade/).
76+
77+
Add the Jetstack Helm repository (if you haven't already) and update it.
78+
79+
```bash
80+
helm repo add jetstack https://charts.jetstack.io --force-update
81+
```
82+
83+
And then upgrade the Helm chart:
84+
6985
```bash
7086
helm upgrade --reset-then-reuse-values --version <version> <release_name> jetstack/cert-manager
7187
```

content/docs/policy/approval/approver-policy/installation.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ will stop all issuance (as no certificate requests will be approved)!
3939
# ⚠️ DANGER: Only do this in a cluster if you're sure it's safe!
4040

4141
existing_cert_manager_version=$(helm get metadata -n cert-manager cert-manager | grep '^VERSION' | awk '{ print $2 }')
42-
helm upgrade cert-manager jetstack/cert-manager \
42+
helm upgrade cert-manager oci://quay.io/jetstack/charts/cert-manager \
4343
--reuse-values \
4444
--namespace cert-manager \
4545
--version $existing_cert_manager_version \
@@ -51,9 +51,7 @@ helm upgrade cert-manager jetstack/cert-manager \
5151
To install approver-policy:
5252

5353
```terminal
54-
helm repo add jetstack https://charts.jetstack.io --force-update
55-
56-
helm upgrade cert-manager-approver-policy jetstack/cert-manager-approver-policy \
54+
helm upgrade cert-manager-approver-policy oci://quay.io/jetstack/charts/cert-manager-approver-policy \
5755
--install \
5856
--namespace cert-manager \
5957
--wait
@@ -70,7 +68,7 @@ For example, if using approver-policy for the internal issuer types, along with
7068
set the following values when installing:
7169

7270
```terminal
73-
helm upgrade cert-manager-approver-policy jetstack/cert-manager-approver-policy \
71+
helm upgrade cert-manager-approver-policy oci://quay.io/jetstack/charts/cert-manager-approver-policy \
7472
--install \
7573
--namespace cert-manager \
7674
--wait \

content/docs/troubleshooting/webhook.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -463,7 +463,7 @@ listening on. Using Helm, we can use the parameter `webhook.securePort`:
463463

464464
```sh
465465
helm install \
466-
cert-manager jetstack/cert-manager \
466+
cert-manager oci://quay.io/jetstack/charts/cert-manager \
467467
--namespace cert-manager \
468468
--create-namespace \
469469
--version [[VAR::cert_manager_latest_version]] \
@@ -1080,7 +1080,8 @@ resources in the `kube-system` namespace, and cert-manager uses the well-known
10801080
can tell Helm to use a different namespace for the leader election:
10811081

10821082
```sh
1083-
helm install cert-manager jetstack/cert-manager --version 1.8.0 \
1083+
helm install cert-manager oci://quay.io/jetstack/charts/cert-manager \
1084+
--version [[VAR::cert_manager_latest_version]] \
10841085
--namespace cert-manager --create-namespace \
10851086
--set global.leaderElection.namespace=cert-manager
10861087
```

content/docs/trust/trust-manager/README.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -192,15 +192,13 @@ Next, we need to install trust-manager. You can follow the [installation guide](
192192
or use the commands below:
193193

194194
```bash
195-
helm repo add jetstack https://charts.jetstack.io --force-update
196-
197-
helm install cert-manager jetstack/cert-manager \
195+
helm install cert-manager oci://quay.io/jetstack/charts/cert-manager \
198196
--namespace cert-manager \
199197
--create-namespace \
200198
--version [[VAR::cert_manager_latest_version]] \
201199
--set crds.enabled=true
202200
203-
helm upgrade trust-manager jetstack/trust-manager \
201+
helm upgrade trust-manager oci://quay.io/jetstack/charts/trust-manager \
204202
--install \
205203
--namespace cert-manager \
206204
--wait
@@ -382,7 +380,7 @@ TRUST_MANAGER_VER=$(helm list --filter "^trust-manager$" -n cert-manager -ojson
382380
echo $TRUST_MANAGER_VER
383381
384382
# Run the upgrade
385-
helm upgrade -f values.yaml -n cert-manager trust-manager jetstack/trust-manager --version $TRUST_MANAGER_VER
383+
helm upgrade -f values.yaml -n cert-manager trust-manager oci://quay.io/jetstack/charts/trust-manager --version $TRUST_MANAGER_VER
386384
```
387385

388386
If an incorrect tag is used, your deployment will fail and you'll likely need to use `helm rollback` to get back

content/docs/trust/trust-manager/installation.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,6 @@ description: 'Installation guide for trust-manager'
1010
Helm is the easiest way to install trust-manager and comes with a publicly trusted certificate bundle package
1111
(for the`useDefaultCAs` source) derived from Debian containers.
1212

13-
```bash
14-
helm repo add jetstack https://charts.jetstack.io --force-update
15-
```
16-
1713
### 2. Install cert-manager (optional)
1814

1915
When installed via Helm, trust-manager has a dependency on cert-manager for provisioning an application certificate
@@ -25,7 +21,7 @@ If you haven't already installed cert-manager, you can install it using the foll
2521

2622
```bash
2723
# Run this command only if you haven't installed cert-manager already
28-
helm install cert-manager jetstack/cert-manager \
24+
helm install cert-manager oci://quay.io/jetstack/charts/cert-manager \
2925
--namespace cert-manager \
3026
--create-namespace \
3127
--version [[VAR::cert_manager_latest_version]] \
@@ -42,7 +38,7 @@ If you don't want to rely on cert-manager, you can install using a Helm-generate
4238
trust-manager is simple to install and is contained in a single Helm chart:
4339

4440
```bash
45-
helm upgrade trust-manager jetstack/trust-manager \
41+
helm upgrade trust-manager oci://quay.io/jetstack/charts/trust-manager \
4642
--install \
4743
--namespace cert-manager \
4844
--wait
@@ -72,7 +68,7 @@ As of trust-manager v0.6.0 you can choose to automatically add an approver-polic
7268
will approve the trust-manager webhook certificate:
7369

7470
```bash
75-
helm upgrade trust-manager jetstack/trust-manager \
71+
helm upgrade trust-manager oci://quay.io/jetstack/charts/trust-manager \
7672
--install \
7773
--namespace cert-manager \
7874
--wait \
@@ -111,7 +107,7 @@ Installing without cert-manager can be great for smaller, more resource-constrai
111107
Using a Helm-generated cert requires a single flag:
112108

113109
```bash
114-
helm upgrade trust-manager jetstack/trust-manager \
110+
helm upgrade trust-manager oci://quay.io/jetstack/charts/trust-manager \
115111
--install \
116112
--namespace cert-manager \
117113
--wait \

content/docs/tutorials/acme/migrating-from-kube-lego.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ upgrade` in order to add a few additional flags. Assuming you've named your
195195

196196
```bash
197197
$ helm upgrade cert-manager \
198-
jetstack/cert-manager \
198+
oci://quay.io/jetstack/charts/cert-manager \
199199
--namespace cert-manager \
200200
--set ingressShim.defaultIssuerName=letsencrypt-staging \
201201
--set ingressShim.defaultIssuerKind=ClusterIssuer

content/docs/tutorials/certificate-defaults/README.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -99,13 +99,12 @@ Once you have your cluster environment, install the required Kubernetes packages
9999
1. Install cert-manager
100100

101101
```shell
102-
helm upgrade --install cert-manager cert-manager \
102+
helm upgrade --install cert-manager oci://quay.io/jetstack/charts/cert-manager \
103103
--namespace cert-manager \
104104
--version $CERT_MANAGER_CHART_VERSION \
105105
--set crds.enabled=true \
106106
--set startupapicheck.enabled=false \
107-
--create-namespace \
108-
--repo https://charts.jetstack.io/
107+
--create-namespace
109108
```
110109

111110
1. Install Kyverno

0 commit comments

Comments
 (0)