Skip to content

Commit 5284219

Browse files
author
Kiril Christov
committed
fix: init translation commit
1 parent 89599fc commit 5284219

File tree

9 files changed

+29
-30
lines changed

9 files changed

+29
-30
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Venafi Kubernetes Agent
1+
# Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments
22

33
[![tests](https://github.com/jetstack/jetstack-secure/actions/workflows/tests.yaml/badge.svg?branch=master&event=push)](https://github.com/jetstack/jetstack-secure/actions/workflows/tests.yaml)
44
[![Go Reference](https://pkg.go.dev/badge/github.com/jetstack/jetstack-secure.svg)](https://pkg.go.dev/github.com/jetstack/jetstack-secure)
@@ -8,7 +8,7 @@
88

99
## Installation
1010

11-
Please [review the documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/) for the agent.
11+
Please [review the documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/) for the Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments (formerly Venafi Kubernetes Agent).
1212

1313
Detailed installation instructions are available for a variety of methods.
1414

@@ -46,7 +46,7 @@ The agent exposes its metrics through a Prometheus server, on port 8081.
4646

4747
The Prometheus server is disabled by default but can be enabled by passing the `--enable-metrics` flag to the agent binary.
4848

49-
If you deploy the agent using the venafi-kubernetes-agent Helm chart, the metrics server will be enabled by default, on port 8081.
49+
If you deploy the agent using the venafi-kubernetes-agent Helm chart (Discovery Agent), the metrics server will be enabled by default, on port 8081.
5050

5151
If you use the Prometheus Operator, you can use `--set metrics.podmonitor.enabled=true` to deploy a `PodMonitor` resource,
5252
which will add the venafi-kubernetes-agent metrics to your Prometheus server.

RELEASE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The release process is semi-automated.
5959

6060
7. Publish the release.
6161

62-
8. Inform the `#venctl` channel that a new version of Venafi Kubernetes Agent has been
62+
8. Inform the `#venctl` channel that a new version of the Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments has been
6363
released. Make sure to share any breaking change that may affect `venctl connect`
6464
or `venctl generate`.
6565

deploy/charts/venafi-kubernetes-agent/Chart.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ name: venafi-kubernetes-agent
33
type: application
44

55
description: |-
6-
The Venafi Kubernetes Agent connects your Kubernetes or Openshift cluster to the Venafi Control Plane.
6+
The Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments connects your Kubernetes or OpenShift cluster to the CyberArk Control Plane.
77
88
maintainers:
9-
- name: Venafi
10-
email: support@venafi.cloud
11-
url: https://venafi.com
9+
- name: CyberArk
10+
email: support@cyberark.com
11+
url: https://www.cyberark.com
1212

1313
sources:
1414
- https://github.com/jetstack/jetstack-secure

deploy/charts/venafi-kubernetes-agent/README.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
# venafi-kubernetes-agent
1+
# discovery-agent-for-cyberark-certificate-manager-in-kubernetes-and-openshift-environments
22

3-
The Venafi Kubernetes Agent connects your Kubernetes or OpenShift cluster to the Venafi Control Plane.
4-
You will require a Venafi Control Plane account to connect your cluster.
3+
The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberArk Certificate Manager Control Plane.
4+
You will require a CyberArk Certificate Manager account to connect your cluster.
55
If you do not have one, you can sign up for a free trial now at:
66
- https://venafi.com/try-venafi/tls-protect/
77

8-
> 📖 Read the [Venafi Kubernetes Agent documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/),
9-
> to learn how install and configure this Helm chart.
8+
> 📖 Read the Discovery Agent documentation for CyberArk Certificate Manager (formerly Venafi Kubernetes Agent):
9+
> https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/
1010
1111
## Values
1212

@@ -282,7 +282,7 @@ extraArgs:
282282
> []
283283
> ```
284284
285-
Additional volumes to add to the Venafi Kubernetes Agent container. This is useful for mounting a custom CA bundle. For example:
285+
Additional volumes to add to the Discovery Agent container. This is useful for mounting a custom CA bundle. For example:
286286
287287
```yaml
288288
volumes:
@@ -303,7 +303,7 @@ In order to create the ConfigMap, you can use the following command:
303303
> []
304304
> ```
305305
306-
Additional volume mounts to add to the Venafi Kubernetes Agent container. This is useful for mounting a custom CA bundle. Any PEM certificate mounted under /etc/ssl/certs will be loaded by the Venafi Kubernetes Agent. For
306+
Additional volume mounts to add to the Discovery Agent container. This is useful for mounting a custom CA bundle. Any PEM certificate mounted under /etc/ssl/certs will be loaded by the Discovery Agent. For
307307
308308
```yaml
309309
example:
@@ -342,8 +342,7 @@ Configure VenafiConnection authentication
342342
> false
343343
> ```
344344
345-
When set to true, the Venafi Kubernetes Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the
346-
Venafi Kubernetes Agent Pod.
345+
When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the Secret with `authentication.secretName` will _not_ be mounted into the Discovery Agent Pod.
347346
#### **authentication.venafiConnection.name** ~ `string`
348347
> Default value:
349348
> ```yaml
@@ -438,7 +437,7 @@ Control Plane.
438437
> []
439438
> ```
440439
441-
You can configure Venafi Kubernetes Agent to exclude some annotations or labels from being pushed to the Venafi Control Plane. All Kubernetes objects are affected. The objects are still pushed, but the specified annotations and labels are removed before being sent to the Venafi Control Plane.
440+
You can configure Discovery Agent to exclude some annotations or labels from being pushed to the CyberArk Certificate Manager Control Plane. All Kubernetes objects are affected. The objects are still pushed, but the specified annotations and labels are removed before being sent to the CyberArk Certificate Manager Control Plane.
442441
443442
Dots is the only character that needs to be escaped in the regex. Use either double quotes with escaped single quotes or unquoted strings for the regex to avoid YAML parsing issues with `\.`.
444443

deploy/charts/venafi-kubernetes-agent/values.schema.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@
131131
},
132132
"helm-values.authentication.venafiConnection.enabled": {
133133
"default": false,
134-
"description": "When set to true, the Venafi Kubernetes Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the\nVenafi Kubernetes Agent Pod.",
134+
"description": "When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the Secret with `authentication.secretName` will _not_ be mounted into the Discovery Agent Pod.",
135135
"type": "boolean"
136136
},
137137
"helm-values.authentication.venafiConnection.name": {
@@ -214,7 +214,7 @@
214214
"helm-values.config.configmap.name": {},
215215
"helm-values.config.excludeAnnotationKeysRegex": {
216216
"default": [],
217-
"description": "You can configure Venafi Kubernetes Agent to exclude some annotations or labels from being pushed to the Venafi Control Plane. All Kubernetes objects are affected. The objects are still pushed, but the specified annotations and labels are removed before being sent to the Venafi Control Plane.\n\nDots is the only character that needs to be escaped in the regex. Use either double quotes with escaped single quotes or unquoted strings for the regex to avoid YAML parsing issues with `\\.`.\n\nExample: excludeAnnotationKeysRegex: ['^kapp\\.k14s\\.io/original.*']",
217+
"description": "You can configure Discovery Agent to exclude some annotations or labels from being pushed to the CyberArk Certificate Manager Control Plane. All Kubernetes objects are affected. The objects are still pushed, but the specified annotations and labels are removed before being sent to the CyberArk Certificate Manager Control Plane.\n\nDots is the only character that needs to be escaped in the regex. Use either double quotes with escaped single quotes or unquoted strings for the regex to avoid YAML parsing issues with `\\.`.\n\nExample: excludeAnnotationKeysRegex: ['^kapp\\.k14s\\.io/original.*']",
218218
"items": {},
219219
"type": "array"
220220
},
@@ -264,7 +264,7 @@
264264
},
265265
"helm-values.config.server": {
266266
"default": "https://api.venafi.cloud/",
267-
"description": "API URL of the Venafi Control Plane API. For EU tenants, set this value to https://api.venafi.eu/. If you are using the VenafiConnection authentication method, you must set the API URL using the field `spec.vcp.url` on the\nVenafiConnection resource instead.",
267+
"description": "API URL of the CyberArk Certificate Manager Control Plane API. For EU tenants, set this value to https://api.venafi.eu/. If you are using the VenafiConnection authentication method, you must set the API URL using the field `spec.vcp.url` on the\nVenafiConnection resource instead.",
268268
"type": "string"
269269
},
270270
"helm-values.crds": {

deploy/charts/venafi-kubernetes-agent/values.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ command: []
162162
# - --log-level=6 # To enable HTTP request logging
163163
extraArgs: []
164164

165-
# Additional volumes to add to the Venafi Kubernetes Agent container. This is
165+
# Additional volumes to add to the Discovery Agent container. This is
166166
# useful for mounting a custom CA bundle. For example:
167167
#
168168
# volumes:
@@ -178,7 +178,7 @@ extraArgs: []
178178
# --from-file=cabundle=./your/custom/ca/bundle.pem
179179
volumes: []
180180

181-
# Additional volume mounts to add to the Venafi Kubernetes Agent container.
181+
# Additional volume mounts to add to the Discovery Agent container.
182182
# This is useful for mounting a custom CA bundle. Any PEM certificate mounted
183183
# under /etc/ssl/certs will be loaded by the Venafi Kubernetes Agent. For
184184
# example:
@@ -190,7 +190,7 @@ volumes: []
190190
# readOnly: true
191191
volumeMounts: []
192192

193-
# Authentication details for the Venafi Kubernetes Agent
193+
# Authentication details for the Discovery Agent
194194
authentication:
195195
# Name of the secret containing the private key
196196
secretName: agent-credentials
@@ -200,8 +200,8 @@ authentication:
200200
# +docs:section=Venafi Connection
201201
# Configure VenafiConnection authentication
202202
venafiConnection:
203-
# When set to true, the Venafi Kubernetes Agent will authenticate to
204-
# Venafi using the configuration in a VenafiConnection resource.
203+
# When set to true, the Discovery Agent will authenticate to
204+
# CyberArk Certificate Manager using the configuration in a VenafiConnection resource.
205205
# Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/).
206206
# When set to true, the `authentication.secret` values will be ignored and the
207207
# Secret with `authentication.secretName` will _not_ be mounted into the
@@ -216,7 +216,7 @@ authentication:
216216

217217
# Configuration section for the Venafi Kubernetes Agent itself
218218
config:
219-
# API URL of the Venafi Control Plane API. For EU tenants, set this value to
219+
# API URL of the CyberArk Certificate Manager Control Plane API. For EU tenants, set this value to
220220
# https://api.venafi.eu/. If you are using the VenafiConnection authentication
221221
# method, you must set the API URL using the field `spec.vcp.url` on the
222222
# VenafiConnection resource instead.

internal/cyberark/dataupload/dataupload.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ func New(httpClient *http.Client, baseURL string, authenticateRequest func(req *
4747
// Snapshot is the JSON that the CyberArk Discovery and Context API expects to
4848
// be uploaded to the AWS presigned URL.
4949
type Snapshot struct {
50-
// AgentVersion is the version of the Venafi Kubernetes Agent which is uploading this snapshot.
50+
// AgentVersion is the version of the Discovery Agent which is uploading this snapshot.
5151
AgentVersion string `json:"agent_version"`
5252
// ClusterID is the unique ID of the Kubernetes cluster which this snapshot was taken from.
5353
ClusterID string `json:"cluster_id"`

make/00_mod.mk

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ oci_preflight_build_args := \
3333
--image-annotation="org.opencontainers.image.vendor"="CyberArk Software Ltd." \
3434
--image-annotation="org.opencontainers.image.licenses"="EULA - https://www.cyberark.com/contract-terms/" \
3535
--image-annotation="org.opencontainers.image.authors"="[email protected]" \
36-
--image-annotation="org.opencontainers.image.title"="Venafi Kubernetes Agent" \
36+
--image-annotation="org.opencontainers.image.title"="Discovery Agent for CyberArk Certificate Manager" \
3737
--image-annotation="org.opencontainers.image.description"="Gathers machine identity data from Kubernetes clusters." \
3838
--image-annotation="org.opencontainers.image.url"="https://www.cyberark.com/products/certificate-manager-for-kubernetes/" \
3939
--image-annotation="org.opencontainers.image.documentation"="https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/" \

pkg/client/client_venafi_cloud.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,7 @@ func (c *VenafiCloudClient) sendHTTPRequest(request *http.Request, responseObjec
308308

309309
if response.StatusCode != http.StatusOK && response.StatusCode != http.StatusCreated {
310310
body, _ := io.ReadAll(response.Body)
311-
return fmt.Errorf("failed to execute http request to Venafi Control Plane. Request %s, status code: %d, body: [%s]", request.URL, response.StatusCode, body)
311+
return fmt.Errorf("failed to execute http request to CyberArk Certificate Manager Control Plane. Request %s, status code: %d, body: [%s]", request.URL, response.StatusCode, body)
312312
}
313313

314314
body, err := io.ReadAll(response.Body)

0 commit comments

Comments
 (0)