Skip to content

Commit 8606fa9

Browse files
Kiril Christovinteon
authored andcommitted
fix: init translation commit
1 parent 7eade8a commit 8606fa9

File tree

9 files changed

+21
-21
lines changed

9 files changed

+21
-21
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Discovery Agent
1+
# Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments
22

33
[![tests](https://github.com/jetstack/jetstack-secure/actions/workflows/tests.yaml/badge.svg?branch=master&event=push)](https://github.com/jetstack/jetstack-secure/actions/workflows/tests.yaml)
44
[![Go Reference](https://pkg.go.dev/badge/github.com/jetstack/jetstack-secure.svg)](https://pkg.go.dev/github.com/jetstack/jetstack-secure)
@@ -8,7 +8,7 @@
88

99
## Installation
1010

11-
Please [review the documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/) for the agent.
11+
Please [review the documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/) for the Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments (formerly Venafi Kubernetes Agent).
1212

1313
Detailed installation instructions are available for a variety of methods.
1414

@@ -47,7 +47,7 @@ The agent exposes its metrics through a Prometheus server, on port 8081.
4747

4848
The Prometheus server is disabled by default but can be enabled by passing the `--enable-metrics` flag to the agent binary.
4949

50-
If you deploy the agent using the venafi-kubernetes-agent Helm chart, the metrics server will be enabled by default, on port 8081.
50+
If you deploy the agent using the venafi-kubernetes-agent Helm chart (Discovery Agent), the metrics server will be enabled by default, on port 8081.
5151

5252
If you use the Prometheus Operator, you can use `--set metrics.podmonitor.enabled=true` to deploy a `PodMonitor` resource,
5353
which will add the venafi-kubernetes-agent metrics to your Prometheus server.

RELEASE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The release process is semi-automated.
6363

6464
7. Publish the release.
6565

66-
8. Inform the `#venctl` channel that a new version of Discovery Agent has been
66+
8. Inform the `#venctl` channel that a new version of the Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments has been
6767
released. Make sure to share any breaking change that may affect `venctl connect`
6868
or `venctl generate`.
6969

deploy/charts/venafi-kubernetes-agent/Chart.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ name: venafi-kubernetes-agent
33
type: application
44

55
description: |-
6-
The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberArk Certificate Manager.
6+
The Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments connects your Kubernetes or OpenShift cluster to the CyberArk Control Plane.
77
88
maintainers:
9-
- name: Venafi
10-
email: support@venafi.cloud
11-
url: https://venafi.com
9+
- name: CyberArk
10+
email: support@cyberark.com
11+
url: https://www.cyberark.com
1212

1313
sources:
1414
- https://github.com/jetstack/jetstack-secure

deploy/charts/venafi-kubernetes-agent/README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
# venafi-kubernetes-agent
1+
# discovery-agent-for-cyberark-certificate-manager-in-kubernetes-and-openshift-environments
22

3-
The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberArk Certificate Manager (formerly Venafi Control Plane).
3+
The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberArk Certificate Manager Control Plane.
44
You will require a CyberArk Certificate Manager account to connect your cluster.
55
If you do not have one, you can sign up for a free trial now at:
66

77
- https://venafi.com/try-venafi/tls-protect/
88

9-
> 📖 Read the [Discovery Agent documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/),
10-
> to learn how install and configure this Helm chart.
9+
> 📖 Read the Discovery Agent documentation for CyberArk Certificate Manager (formerly Venafi Kubernetes Agent):
10+
> https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/
1111
1212
## Values
1313

@@ -343,7 +343,7 @@ Configure VenafiConnection authentication
343343
> false
344344
> ```
345345
346-
When set to true, the Discovery Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the
346+
When set to true, the Discovery Agent will authenticate to. CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the
347347
Discovery Agent Pod.
348348
#### **authentication.venafiConnection.name** ~ `string`
349349
> Default value:
@@ -365,7 +365,7 @@ The namespace of a VenafiConnection resource which contains the configuration fo
365365
> https://api.venafi.cloud/
366366
> ```
367367
368-
API URL of the CyberArk Certificate Manager API. For EU tenants, set this value to https://api.venafi.eu/. If you are using the VenafiConnection authentication method, you must set the API URL using the field `spec.vcp.url` on the
368+
API URL of the CyberArk Certificate Manager Control Plane API. For EU tenants, set this value to https://api.venafi.eu/. If you are using the VenafiConnection authentication method, you must set the API URL using the field `spec.vcp.url` on the
369369
VenafiConnection resource instead.
370370
#### **config.clientId** ~ `string`
371371
> Default value:

deploy/charts/venafi-kubernetes-agent/values.schema.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@
131131
},
132132
"helm-values.authentication.venafiConnection.enabled": {
133133
"default": false,
134-
"description": "When set to true, the Discovery Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the\nDiscovery Agent Pod.",
134+
"description": "When set to true, the Discovery Agent will authenticate to. CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the\nDiscovery Agent Pod.",
135135
"type": "boolean"
136136
},
137137
"helm-values.authentication.venafiConnection.name": {
@@ -264,7 +264,7 @@
264264
},
265265
"helm-values.config.server": {
266266
"default": "https://api.venafi.cloud/",
267-
"description": "API URL of the CyberArk Certificate Manager API. For EU tenants, set this value to https://api.venafi.eu/. If you are using the VenafiConnection authentication method, you must set the API URL using the field `spec.vcp.url` on the\nVenafiConnection resource instead.",
267+
"description": "API URL of the CyberArk Certificate Manager Control Plane API. For EU tenants, set this value to https://api.venafi.eu/. If you are using the VenafiConnection authentication method, you must set the API URL using the field `spec.vcp.url` on the\nVenafiConnection resource instead.",
268268
"type": "string"
269269
},
270270
"helm-values.crds": {

deploy/charts/venafi-kubernetes-agent/values.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ authentication:
201201
# Configure VenafiConnection authentication
202202
venafiConnection:
203203
# When set to true, the Discovery Agent will authenticate to
204-
# Venafi using the configuration in a VenafiConnection resource.
204+
# CyberArk Certificate Manager using the configuration in a VenafiConnection resource.
205205
# Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/).
206206
# When set to true, the `authentication.secret` values will be ignored and the
207207
# Secret with `authentication.secretName` will _not_ be mounted into the
@@ -216,7 +216,7 @@ authentication:
216216

217217
# Configuration section for the Discovery Agent itself
218218
config:
219-
# API URL of the CyberArk Certificate Manager API. For EU tenants, set this value to
219+
# API URL of the CyberArk Certificate Manager Control Plane API. For EU tenants, set this value to
220220
# https://api.venafi.eu/. If you are using the VenafiConnection authentication
221221
# method, you must set the API URL using the field `spec.vcp.url` on the
222222
# VenafiConnection resource instead.

internal/cyberark/dataupload/dataupload.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ func New(httpClient *http.Client, baseURL string, authenticateRequest func(req *
4747
// Snapshot is the JSON that the CyberArk Discovery and Context API expects to
4848
// be uploaded to the AWS presigned URL.
4949
type Snapshot struct {
50-
// AgentVersion is the version of the Venafi Kubernetes Agent which is uploading this snapshot.
50+
// AgentVersion is the version of the Discovery Agent which is uploading this snapshot.
5151
AgentVersion string `json:"agent_version"`
5252
// ClusterID is the unique ID of the Kubernetes cluster which this snapshot was taken from.
5353
ClusterID string `json:"cluster_id"`

make/00_mod.mk

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ oci_preflight_build_args := \
3636
--image-annotation="org.opencontainers.image.vendor"="CyberArk Software Ltd." \
3737
--image-annotation="org.opencontainers.image.licenses"="EULA - https://www.cyberark.com/contract-terms/" \
3838
--image-annotation="org.opencontainers.image.authors"="[email protected]" \
39-
--image-annotation="org.opencontainers.image.title"="Venafi Kubernetes Agent" \
39+
--image-annotation="org.opencontainers.image.title"="Discovery Agent for CyberArk Certificate Manager" \
4040
--image-annotation="org.opencontainers.image.description"="Gathers machine identity data from Kubernetes clusters." \
4141
--image-annotation="org.opencontainers.image.url"="https://www.cyberark.com/products/certificate-manager-for-kubernetes/" \
4242
--image-annotation="org.opencontainers.image.documentation"="https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/" \

pkg/client/client_venafi_cloud.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -317,7 +317,7 @@ func (c *VenafiCloudClient) sendHTTPRequest(request *http.Request, responseObjec
317317

318318
if response.StatusCode != http.StatusOK && response.StatusCode != http.StatusCreated {
319319
body, _ := io.ReadAll(response.Body)
320-
return fmt.Errorf("failed to execute http request to the Control Plane. Request %s, status code: %d, body: [%s]", request.URL, response.StatusCode, body)
320+
return fmt.Errorf("failed to execute http request to CyberArk Certificate Manager Control Plane. Request %s, status code: %d, body: [%s]", request.URL, response.StatusCode, body)
321321
}
322322

323323
body, err := io.ReadAll(response.Body)

0 commit comments

Comments
 (0)