|
|
@@ -21,38 +21,48 @@ spec:
|
|
21
|
21
|
helm:
|
|
22
|
22
|
releaseName: cert-manager
|
|
23
|
23
|
---
|
|
24
|
|
-apiVersion: argoproj.io/v1alpha1
|
|
25
|
|
-kind: Application
|
|
|
24
|
+apiVersion: cert-manager.io/v1
|
|
|
25
|
+kind: ClusterIssuer
|
|
26
|
26
|
metadata:
|
|
27
|
|
- name: cert-manager-hetzner-webhook
|
|
28
|
|
- namespace: {{ .Values.spec.namespace }}
|
|
29
|
|
- finalizers:
|
|
30
|
|
- - resources-finalizer.argocd.argoproj.io
|
|
|
27
|
+ name: letsencrypt-staging
|
|
|
28
|
+ namespace: cert-manager
|
|
31
|
29
|
spec:
|
|
32
|
|
- destination:
|
|
33
|
|
- namespace: cert-manager
|
|
34
|
|
- name: {{ .Values.spec.destination.name }}
|
|
35
|
|
- project: {{ .Values.spec.project }}
|
|
36
|
|
- syncPolicy:
|
|
37
|
|
- automated:
|
|
38
|
|
- prune: true
|
|
39
|
|
- selfHeal: true
|
|
40
|
|
- source:
|
|
41
|
|
- chart: cert-manager-webhook-hetzner
|
|
42
|
|
- repoURL: https://deyaeddin.github.io/cert-manager-webhook-hetzner/chart/
|
|
43
|
|
- targetRevision: 0.2.1
|
|
44
|
|
- helm:
|
|
45
|
|
- releaseName: cert-manager-hetzner-webhook
|
|
46
|
|
- parameters:
|
|
47
|
|
- - name: "groupName"
|
|
48
|
|
- value: "acme.kaisers.info"
|
|
49
|
|
- - name: "certManager.namespace"
|
|
50
|
|
- value: {{ .Values.spec.namespace }}
|
|
|
30
|
+ acme:
|
|
|
31
|
+ email: "admin@kaisers.info" # replace this
|
|
|
32
|
+ privateKeySecretRef:
|
|
|
33
|
+ name: "staging-issuer-account-key"
|
|
|
34
|
+ server: "https://acme-staging-v02.api.letsencrypt.org/directory"
|
|
|
35
|
+ solvers:
|
|
|
36
|
+ - http01:
|
|
|
37
|
+ ingress:
|
|
|
38
|
+ class: "traefik"
|
|
|
39
|
+ ingressTemplate:
|
|
|
40
|
+ metadata:
|
|
|
41
|
+ annotations:
|
|
|
42
|
+ kubernetes.io/ingress.class: "traefik"
|
|
|
43
|
+ traefik.ingress.kubernetes.io/router.tls: "true"
|
|
|
44
|
+ traefik.ingress.kubernetes.io/frontend-entry-points: "https"
|
|
|
45
|
+ traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
|
51
|
46
|
---
|
|
52
|
|
-apiVersion: v1
|
|
53
|
|
-kind: Secret
|
|
|
47
|
+apiVersion: cert-manager.io/v1
|
|
|
48
|
+kind: ClusterIssuer
|
|
54
|
49
|
metadata:
|
|
55
|
|
- name: hetzner-secret
|
|
56
|
|
-type: Opaque
|
|
57
|
|
-data:
|
|
58
|
|
- api-key: M21TS3N1bzAzTVNld1JQeW12aVFpSU5TbFhPc0lBOFU=
|
|
|
50
|
+ name: letsencrypt-prod
|
|
|
51
|
+ namespace: cert-manager
|
|
|
52
|
+spec:
|
|
|
53
|
+ acme:
|
|
|
54
|
+ email: "admin@kaisers.info" # replace this
|
|
|
55
|
+ privateKeySecretRef:
|
|
|
56
|
+ name: "prod-issuer-account-key"
|
|
|
57
|
+ server: "https://acme-v02.api.letsencrypt.org/directory"
|
|
|
58
|
+ solvers:
|
|
|
59
|
+ - http01:
|
|
|
60
|
+ ingress:
|
|
|
61
|
+ class: "traefik"
|
|
|
62
|
+ ingressTemplate:
|
|
|
63
|
+ metadata:
|
|
|
64
|
+ annotations:
|
|
|
65
|
+ kubernetes.io/ingress.class: "traefik"
|
|
|
66
|
+ traefik.ingress.kubernetes.io/router.tls: "true"
|
|
|
67
|
+ traefik.ingress.kubernetes.io/frontend-entry-points: "https"
|
|
|
68
|
+ traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|